IIT Jammu Post Graduate Diploma in Cyber Security – Batch 02

By user Categories: B2C, Cybersecurity
Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

With the increasing reliance on digital technologies across various sectors, there
is a growing demand for professionals who can effectively safeguard sensitive
information and systems from cyber threats. The Post Graduate Diploma in
Cyber Security from IIT Jammu is a comprehensive programme designed to
equip learners with the knowledge, skills, and expertise required to address the
complex challenges of cyber security in today’s digital world.

Get ready for an interactive journey where you’ll explore various symmetric and
asymmetric cipher schemes through practical assignments and gain invaluable
experience in applying these concepts in the real world.

IIT Jammu PGD in Cyber Security – Batch 02_Brochure

IIT Jammu Post Graduate Diploma in Cyber Security – Batch 02

Show More

What Will You Learn?

  • Understand essential cyber security fundamentals, terms, and technologies
  • Comprehend CIA principles, cyber kill chain, threats, attacks, vulnerabilities, and security principles
  • Explore Confidentiality, Integrity, and Availability across Network Security Models, System Security Models, and Frameworks
  • Develop skills to detect and investigate data breaches and cyber attacks

Course Content

Semester 1

Module 1: Mathematical Foundations and Cryptography
Learning Outcomes: 1. Understand the mathematical concepts of number theory, abstract algebra, linear algebra, and probability. 2. Get a thorough understanding of various symmetric and asymmetric cipher schemes and a hands-on experience of applying them in the real world through practical assignments. 3. Understand the fundamental mathematical concepts of cryptography and will be able to implement and understand the commonly used symmetric and asymmetric cryptography schemes such as AES, DES, DH and EC and hashing schemes such as MD5, SHA256 etc. 4. Applied cryptography will help the learner develop new solutions that either test cryptographic protocols and their strength and architecture better confidentiality and integrity approaches and solutions.

Module 2: Computer Networking
Learning Outcomes: 1. The learner will be able to set up a network, perform subnetting, configure switches and routers, and will be able to perform passing sniffing on TCP/IP networks. 2. The learner will be able to perform network programming. Learners will be able to configure VLAN and Wireless systems. 3. The learners will be able to learn IOT Architecture, SDN and NFV concepts and apply them.

Operating Systems Fundamental
1. This course on operating systems will give a deep and fundamental understanding of the variety of operating systems we use and how the operating systems work and provide a bridge between the software we see and the hardware we rely on. The objective of the course is to let the candidate understand the concepts of process, memory management, storage management, CPU scheduling, etc. for an overall understanding of the system's domain. 2. The course will help understand the program in execution and how call stacks function and the memory is managed. Details of security-specific implementations and policies will make the learner understand the ecosystem of defense in depth in the OS environment.

Module 4: Introduction to Cyber Security
The learner will be able to understand a specific topic of study chosen for a technical seminar in a greater depth and will be able to generate knowledge through a systematic process. The candidate will learn technical report writing, knowledge generation, and technical presentation skills. The candidates will submit the technical studies performed during the course as survey papers in Journals and/or conferences or host them as knowledge for others.

Module 5: Technical Seminar
The learner will be able to understand a specific topic of study chosen for a technical seminar in a greater depth and will be able to generate knowledge through a systematic process. The candidate will learn technical report writing, knowledge generation, and technical presentation skills. The candidates will submit the technical studies performed during the course as survey papers in Journals and/or conferences or host them as knowledge for others.

Semester 2

Module 1: Web Application and Network Security
The candidates will be able to perform basic network and web application penetration testing and will be able to develop new tools from the knowledge made available through network programming exercises that can do packet crafting and sniffing and scanning activities.

Module 2: Multimedia and Digital Forensics
After completion of this course, students will be able to understand: An overview of the major problems and recent developments in the field of multimedia security & forensics. Effective forensic tools to authenticate digital media and detect tampering operations, will be able to do mobile and disk forensics.

Module 3: Systems and Software Security
After the end of the course, the learner will be able to get a detailed understanding of attacks on operating systems security and counter measures that should be taken care of while designing an operating system or configuring an existing one. The learner will understand secure software development, threat modelling, software code flow analysis and best programming practices to avoid well known flaws.

Module 4: Special Topics in Cyber Security
After completion of this course, the learner will be able to understand attacks in the multi-tenancy architectures and configure security measures and defences in cloud environments, VMs, develop multi-factor authentication schemes, understand and apply side channel attacks.

Module 5: Applied Cyber Security Project
After completion of this course, it is expected that the learner will be able to take up bigger cyber security projects along the same lines in the industry. Learner will be able to prototype at least one usable and novel cyber security solution from his learnings of PGDCS.

Tools

Assignments/Case-studies/Projects