Learn Cyber Security & Ethical Hacking | Zen Class | GUVI
logo

Master Cyber Security & Ethical Hacking

Master Cyber Security & Ethical Hacking

  • 100% Job Guaranteed Program with Pre-offer letter before starting of the main program
  • IIT-M Python Certification
  • World 1st Virtual Lab
  • Hands on Smart City Simulator
  • Government of India Approved Certification
  • 100% Job Guaranteed Program with pre-offer letter before starting of the main program
  • IIT-M Python Certification
  • World 1st Virtual Lab
  • Hands on Smart City Simulator
  • Government of India Approved Certification

 5 Months | Live Classes

5 Months | Live Online Classes

Program Fee: Rs 1,18,000
EMI Options: Rs 4900/m (24 Months)

25% of Program Fee (Rs 29,000) pay while you study & 75% of Program Fee (Rs 89,000) pay while you are on the Job

I’m Interested in this Program
Name*
Phone*
Educational Qualification*
Current Profile*
Please fill all the required fields!
Please accept terms and conditions to proceed

Description

Smart City Simulator, Skillsda Centre

This leading-edge Technological Program is aligned to Competency Standards developed by SSC NASSCOM in collaboration with Industry and approved by the Government. Our Essential Cybersecurity Course delivers the top-notch cybersecurity skills inevitable in the current tech industry. Instructed by industry’s best subject matter experts at SkillsDA, Centre for Advanced Training, and incorporated by GUVI- an IIT-Madras incubated company, this Certification Program imparts all-around skills in Cybersecurity.

The program is a foundation for many other job roles including Security Information and Event Management (SIEM), Computer Forensics, Web Application Security, ISO 27001 Compliance, PCI-DSS, Internal IT Security Audit, etc.

Smart City Simulator, Skillsda Centre

About IIT-M & GUVI

IIT-M Research Park, Chennai

Expand your digital footprint by gaining end-to-end expertise in Cyber Security & Ethical Hacking. This leading-edge Technological Program delivers the top-notch Cyber Security & Ethical Hacking skills imbibed in the state of art technology. Curated by subject matter experts at GUVI- an IIT-Madras incubated company, and instructed by the industry’s best Technical Experts & Founders(Ex-Paypal Employees), this Certification Program imparts all-around skills in Cyber Security & Ethical Hacking. This Program incorporates pedagogical tools focusing on industry expectations directing you to the Fortune 500 companies.

IIT-M Research Park, Chennai

We are Accredited by

We are officially authorized as

Collaboration with Skillsda®

Always on a new venture, GUVI, an IIT-M incubated company driven by Industry-Experts and tech Geeks, has collaborated with SkillsDA, the Centre for Advanced Training. Visioning skills development, this collaboration intends to upskill the aspirants in Cybersecurity and other emerging technology, thereby delivering a secure digital India. GUVI, in association with SkillsDA, aims at improving the hands-on capability and efficiency of all cyber security professionals.

Bringing the industry and skilled staff together, SkillsDA is a unique platform that focuses on training and upskilling eco-system, thereby delivering delight to the end customers. SkillsDA takes pride in being accredited by TUV SUD ISO 9001 Certified Training Company & Training Partner of NASSCOM IT – ITeS SSC. SkillsDA is also associated with the All India Council for Technical Education (AICTE), National Security Database (NSD), National Critical Information Infrastructure Protection Centre (NCIIPC), and ISAC. In addition, they have collaborated with Cyberange and aim at training & upskilling eco-system that caters to all 4 stakeholders across several sectors that are in dire need of high-quality experience.

Why Cybersecurity?

One of the lethal weapons against humanity is Cyberwars. Railways, Shipping, Transport, Nuclear, Power, Banking, Aviation, Healthcare or Telecom; you never know where you will come across the next threat. Also, in a place where our network connectivity is only growing, posing another news headline about a cyber attack every day. 

At a close, Cybersecurity undeniably will be necessary expertise. And the need for skilled technicians is likely to increase, making it a good long-term bet for a career. Become a Security Analyst, Security Engineer, Security Architect, Security Administrator, Security Researcher, Pen Tester, Information Security Auditor, Jr Threat Hunter, or opt for any similar Cybersecurity profession and protect the nation from cyber threats. Get deep insights into the functioning of various critical sectors and take upon any challenge as a security professional to protect your company.

Good Salary Packages

 Skills that no one knows

Cyber Security is an Evergreen Industry

Opportunities to work with High Profile Agencies

Create awareness to people

High Demand for Cyber Security Experts

Unlimited Career Growth Options

Work with Government Officials

Good Salary Packages

 Skills that no one knows

Cyber Security is an Evergreen Industry

Opportunities to work with High Profile Agencies

Create awareness to people

High Demand for Cyber Security Experts

Unlimited Career Growth Options

Work with Government Officials

Job Guaranteed Cyber Security Program

Job Guaranteed Cyber Security Program

What Will You Learn?

Learn how to gather information

Understand social engineering

Gain an understanding of malware 

Conduct network audits 

Creating professional reports

Learn about password security

Gain skills in Vulnerability analysis

Learn about system security

Conduct web security audits

Learn about exploitation

Learn how to gather information

Understand social engineering

Gain an understanding of malware 

Conduct network audits 

Creating professional reports

Learn about password security

Gain skills in Vulnerability analysis

Learn about system security

Conduct web security audits

Learn about exploitation

Program Eligibility
  • Any Graduates from & above 2019 passed outs
  • Current Final years students
  • Candidates with no arrears
  • Not more than a year of gap being unemployed
  • CGPA Should be above 6.0

The Selected Candidate should attend the program with 90% more attendance to be eligible for pre offer letter

  • Working professionals who wish to explore their career options and interests with regards to Cyber Security
  • Working Professionals in IT as well as non-IT Industries are eligibile
  • Candidates with no arrears
  • Not more than a year of gap being unemployed
  • CGPA Should be above 6.0

The Selected Candidate should attend the program with 90% more attendance to be eligible for pre offer letter

Note: Enthusiasts curious about understanding the hype behind Cybersecurity, who don't fit in the above eligibility can join too. However, placements will purely depend on your performance. In this case alone, we can not guarantee placement.

Learn from Industry Experts

Learn from Industry Experts

Get personalized mentorship and guidance from several Industry experts who work in leading companies such as

Curriculum

Curriculum

This program’s curriculum is comprehensively designed to help learners acquire skills that helps get hired as Cyber Security Expert. The Curriculum is designed with officials from Government of India & other top Cyber Security Experts.

Live Classes with Mentor Support

Live Classes


Python - Basic
  • Why python ?
  • Python IDE
  • Hello World Program
  • Variables & Names
  • String Basics
  • List
  • Tuple
  • Dictionaries
  • Conditional Statements
  • For and While Loop
  • Functions
  • Numbers and Math Functions
  • Common Errors in Python
Python - Advanced
  • Functions as Arguments
  • List Comprehension
  • File Handling
  • Debugging in Python
  • Class and Objects
  • Lambda, Filters and Map
  • Regular Expressions
  • Python PIP
  • Read Excel Data in Python
  • Python MySQL
  • Iterators
  • Pickling
  • Python JSON
Algorithmic thinking with Python
  • Introduction to Algorithmic Thinking
  • Algorithm Efficiency and time complexity
  • Example algorithms - binary search, Euclid’s algorithm
  • Data structures - stack, heap, and binary trees
    Memory
  • Management/Technologies
  • Best Practices – Keeping it simple, dry code, naming Conventions, Comments, and docs.
  • Assessment
AWS
  • Introduction to AWS.
  • How to register/create a AWS account.
  • Best practices on your account, security issues, IAM ( identity & access managemnt)
  • How to create users, roles and assign policies to them.
  • Overview on the Networking services, VPC, subnets, security groups, Route53 and CertificateManager
  • ComputingServices: EC2
  • Storage: S3
Fundamental of Cyber Security
  • Cyber security and its importance
  • Different disciplines of cyber security
  • Cyber security threats and their types
  • Cyber security attacks and their applications
Fundamentals of Networking - eLearning & Lab
  • Basic concepts of networking
    Network ports, Network protocols, Types of network devices and key networking terminologies
  • Basics of ping & traceroute and types of network
  • Fundamental concepts of OSI model
  • Network sharing and subnetting
  • Fundamental concepts of network infrastructure

Lab

  • The module demonstrates how to set up a LAN (Local Area Network) network using a standard router and 3-4 personal computers installed with Windows/ Linux based operating system. 
  • Demonstrates how to look for IP Address and MAC addresses of devices connected in the network. 
  • Explains how to change the IPv4/IPv6 addresses of devices and systems connected to the network.
Basics of Security Testing - eLearning & Lab
  • Basics of security testing and its importance
  • Basics of vulnerability scanning
  • Penetration testing and risk assessment
  • Risk assessment test
  • Security Audit and Posture Assessment Test
  • Ethical Hacking and Network Monitoring
  • Security Testing Tools

Lab

  • The module demonstrates how to penetrate a dummy website using standard web penetration tool. And, demonstrates how to scan for vulnerabilities in the website using a standard vulnerability assessment tool. 
Fundamentals of Access Management - eLearning & Lab
  • Basics of Identity and Access Management & its Importance
  • Basic concepts of User Identification, Authentication and Authorization
  • User Identification and Access Management Policies
  • Tools used for Identity and Access Management in a public cloud platform
  • Access Control Models
  • Security Authorization And Encryption
  • Single Sign-On and Access Management Best Practices

Lab

  • The module demonstrates Identity and Access Management in practise using standards tools provided by a public cloud platform provider (such as AWS, Azure, Google Cloud etc.). Also, demonstrates the method to create access policies and enable or disable access for specific users.
Fundamentals of Incident Management and Response - eLearning & Lab
  • Basics of security controls
  • Security Policy and Frameworks
  • Basics of Incident Management and Incident Response
  • Basics of Incident Response Plan and Incident Communications Plan
  • Fundamental Concepts of Incident Monitoring and Identification
  • Disaster Mitigation and Containment
  • Business Continuity Planning and Disaster Recovery
  • Cyber Security Investigation
  • Basics of a Backup and Recovery Plan
  • Basic concepts of RTO (Recovery Time Objective) and RPO (Recovery Point Objective)

Lab

  • The module demonstrates how to create a disaster recovery plan for a web application where the database server is affected by a malware. Also, explains the use of standard software, tools, and packages such as MySQL, Linux, Apache etc. to create the web application and back-up for the web application’s database.
Fundamentals of Security Operations - elearning & Lab
  • Basics of security forensics & its types
  • Understanding of system logging and security monitoring
  • Fundamentals of Continuous Security Monitoring
  • Techniques for Continuous Security Monitoring
  • Basics of Data Loss Prevention and its importance
  • Basic understanding of change and configuration management
  • Security monitoring tools
Introduction to IAM
  • Course Overview
  • Introduction to IAM
    What is IAM
    Components of IAM
  • Importance of IAM
    Why is IAM Important
    What does IAM Provide to the Enterprise
    How IAM Works?
    IAM’s Role in Organizational Security
    IAM and Compliance
  • Basics & Terminologies and Concepts in IAM 
    Basics
    Terminologies
    Security Assertion Markup Language
    OAuth
    OpenID Connect
    Lightweight Directory Access Protocol
    Active Directory
Advanced concepts in IAM
  • IAM in Enterprise and Cloud Environments
    What is and Enterprise?
    What is a Cloud?
    Enterprise and Cloud
    IAM in Enterprise Cloud
    IAM and Compliance in Cloud
    IAM and Directory Services in Cloud
  • IAM Architecture
    Challenges of IAM
    IAM Architecture
    IAM Architecture – Typical Implementation
    IAM Services to Enterprises
    IAM Practices
    IAM Architecture Example
    IAM Architecture Implementation
  • IAM Lifecycle
    What is Lifecycle
    Lifecycle of IAM
    Centralization of IAM


User & Privilege Access Management
  • User Access Management
    Users of Enterprise
    Roles in Enterprise
    Typical Roles in an Enterprise
    Basics of User Access Management
    Effective User Access Management
    Examples of User Access Management
    User Access Management Details
    SSO and User Access Management
    MFA and User Access Management
    SAML and User Access Management
    Active Directory and User Access Management
  • Privilege Access Management
    What are Privileges?
    What is Privilege Access Management
    Workings of PAM
    How is PAM different from IAM?
    Benefits of PAM


Access Provisioning & Multi-factor Authentication

 Access Provisioning 

  • What is Access Provisioning?
  • Types of Access Provisioning
  • Access Provisioning via SAML, SSO, OAuth or OpenID Connect
    Comparing and Contrasting SSO, SAML, OAuth and OpenID Connect
  • Access Provisioning Best Practices


Multi-factor Authentication

  • Importance of MFA
  • Methods of Multi-Factor Authentication
  • Process and Cons of Factors in MFA
    Best Practices


Session Management & Monitoring

  • What is Session Management?
  • What is Privileged Session Management?
  • Active Session Monitoring
    Tools for Session Monitoring
  • Best Practices


User Activity Compliance

  • What is User Activity Compliance?
  • Benefits of User Activity Compliance
  • User Activity Monitoring Tools
  • Best Practices


Case Studies

  • Case Study 1
  • Case Study 2


Summary


Conclusion

SAILPOINT IDENTITY IQ Tool Training
  • PREVIEW ON IDENTITY IQ
  • PRODUCT ARCHITECTURE – INSTALLATION & DEPLOYMENT
  • INTRODUCTION TO APPLICATION ON-BOARDING, CORRELATION
  • CONCEPTS OF RISKS & POLICIES
  • CERTIFICATIONS
  • ABOUT ROLES
  • CONCEPTS OF TROUBLESHOOTING, DEBUG, CONSOLE
  • INTRODUCTION TO RULES, TASKS, API
  • REPORTING
  • OVERVIEW TO LIFECYCLE MANAGER
  • INTRODUCTION TO WORKFLOW
  • INTRODUCTION TO PROVISIONING BROKER & ENGINE
  • OVERVIEW ON PERFORMANCE
  • KEY CAPABILITIES OF THE SAILPOINT
  • COMPLIANCE MANAGER
  • LIFECYCLE MANAGER
  • USER PROVISIONING
    IDENTITY
  • INTELLIGENCE

Take your learnings to next step

Get Hands on training with World's 1st Vitual Lab

Get trained in World Class Simulators from the World’s 1st Virtual Lab.  Grab a first-hand experience in understanding a hack attack, malware creation, network intrusion/exploitation, web exploitation, and more. This comprehensive program intends to provide deliberate insights on how various IT infrastructures are laid, helping you underline the possible loopholes or vulnerabilities in every system. It ensures to provide competency to be able to detect and mitigate cyber security threats promptly. Also, develop a foundation in Cybersecurity with hands-on proven experience in vulnerability analysis and penetration testing.

Get Hands on training with Virtual Smart City Simulator Setup

The state-of-the-art simulator set up and the learning experience of international standards will make you ready for advanced job roles including Security Information and Event Management (SIEM), Computer Forensics, Web Application Security, ISO 27001 Compliance, PCI-DSS, Internal IT Security Audit, and more.

 

Program Overview

A program designed by Subject-Matter Experts

100% Job Guaranteed course + Pre-offer letter

LIVE classes + Lifetime recorded videos

Get Hands on with World's 1st Virtual Lab

NASSCOM approved program with Government-approved Certification

₹21 Lakhs Highest Salary 

EMI options available

7-Day Refund Policy

Unlimited access to practice CodeKata, Webkata and IDE

Work on World's 1st Smart City Simulator

175% Highest Hike

500+ Hiring Partners

Benefits of Zen Class

100% Job Gauranteed Program with Pre-offer letter

A program designed by Subject-Matter Experts

LIVE classes + Lifetime recorded videos

Get Hands on with World's 1st Virtual Lab

NASSCOM approved program with Government-approved Certification

Work on World's 1st Smart City Simulator

7-Day Refund Policy

EMI options available

Certification

Certification

  • Certificate will be issued after the successful completion of the Program by GUVI & Skillsda
  • Certificate is issued in association with NASSCOM FutureSkills
  • Globally recognized enough to outshine in Interviews.
  • Our Certification is recognized in all Government & Private Sector Companies
  • Get IIT-M Certification for Python
  • Certified Cyber Crime Investigation Officer License Card

Where do our Students work?

& more

Pay just Rs 5000 (Refundable) and Pre-Book your seat

Program Fee INR 1,18,000 (incl. taxes)

Upto 24 Months EMI options available. Prebook of Rs 5000 is 100% refundable.

Pay Only 25% (Approx Rs 29,000 - Rs 4834/ Month for 6 Months )of the program fee while you study. 
&
Pay rest of the 75%(Approx Rs 89,000 - Rs 4945 / Month for 18 Months ) of the program fee while you are on your Job.

Hurry up. Limited seats only!

We are associated with

& more

Official Hiring Partner of

Unlimited Access to all our Practise Platforms

Codekata

A tool-kit specifically developed to boost the coding skills and makes you ever-ready to crack interviews.

WebKata

A cloud-based module to hone your front end skills without any hassle of local environment setup.

IDE

GUVI IDE is an Integrated Development Environment that lets you write, edit, run, test & debug your code. 

Our Learners

Author

"The training process that has been following in GUVI is so systematic and well programmed. The hands-on tasks are prepared so well. Mentors are so friendly and most talented and can answer any kind of doubt & available all the time throughout your course. My overall experience was so good and I thank GUVI again for helping me to get into the best company.

 

Vishnu
Author

I joined GUVI through my friends. During the course of which I learnt a lot of technologies in detail. I also got the opportunity to be placed in good product based companies. It had an enriching experience on the whole.

Akshay

Frequently Asked Question

Who can take this course?
  • Any Graduates from & above 2018 passed outs
  • Any working professional from IT or Non-IT
  • Current Final years students
  • Seeking for Jobs but have to meet the eligibility criteria below


Note: must have this eligibility: No arrears, not more than a year gap in work, should attend the program with 90% more attendance & should successfully complete all assessment & Evaluation.


Candidates who don't fit in the above eligibility but are willing to study the tools & get skilled can join. But we will not guarantee placement for them.

What is the Course Duration?

Essential Cybersecurity Course is a program of 5 months with weekend live classes. 

How do I complete this course?

Being a project-based curriculum, every student has to submit 1/2 projects with industry experts’ guidance. MCQs help evaluate the performance. After the successful completion of the course, Guvi will grant a course completion globally recognized certificate. 

What is the format of the course?

We currently offer only an Online format for this course.

What is the Job Placement process? Will I get a Placement offer?

This is a 100% Job Placement Guarantee program. You will recieve the preoffer letter when you join the program, but you need to complete the course with 90% more attendance

Guvi has 200+ product-based companies tied up for placement Support. Being a Guvian, you deserve all the support and training from the team experts!

 

What is the Seat Blocking Procedure? Any Pre-booking charges?

You can book your seats with a ₹5000 Pre-book charge. It is a refundable amount. It is for booking your slot so that you may not miss your preferred batch.

What if I miss any live classes? How long do I have access to the learning contents and practice platforms?

We provides you with a recording of every class with unlimited access to all the practice platforms.  So, you barely get a chance to miss out on anything while being a Guvian!

I want to know about Certification?

You will get multiple Industry-Recognised Certificates from GUVI, industry-recognized, NASSCOM & Government approved Certificate from SkillsDA,  Centre for Advanced Training which you will get from the IIT MADRAS address.

What is the EMI payment process?

You exercise an EMI payment option up to 12 months.

Still have queries? Contact Us

Request a Callback. An expert from the admissions office will call you in the next 24 working hours. You can also reach out to us at [email protected] or 9344419057

Fill your details

Name*
Phone*
Educational Qualification*
Current Profile*
Please fill all the required fields!
Please accept terms and conditions to proceed
Please wait