July 19, 2016

Advance Programme for Cybersecurity Specialist (APCS)

Advance Programme for Cybersecurity Specialist course is a professionally designed and developed for research oriented IT professionals under the supervision of renowned experts.

The Program is meant for talented, motivated individuals who enjoy to be creative in working, stimulating environments with other world-class researchers on cutting-edge cybersecurity technologies to solve the world’s problems. You will conceive and conduct in-depth research on topics in cyber defense, cyber attack, cyber experimentation. You will gain insights into technologies that will enable you to be part of the explosive growth in cyber security that is currently taking place in the world.

Career & Job Responsibilities

Security Specialist can take up jobs

  • REVERSE-ENGINEERING
  • MALWARE ANALSYSIS
  • VULNERABILITY ANALYSIS
  • INTRUSION DETECTION & PROTECTION DEVELOPERS
  • CRYPTOGRAPHER
  • FORENSICS EXPERT
  • SECURITY SOFTWARE DEVELOPER
  • SECURITY AUDITOR

At its core, the course provides deeper training in malware and vulnerability analysis in software and hardware. After developing a solid foundation, the Program enables students to specialize in areas related to corporate IT infrastructure, Internet of Things, public, private networks, and applications. The Program develops research capabilities, analysis skills and software tools that are needed to succeed as an IT Security Analyst and beyond. The objective is to develop broad-based malware and vulnerabilities problem-solving abilities for future global leaders.

Our unique teaching methods focus on applied learning and case studies rather than on rote learning. Students will participate in workshops and seminars with top IT security and risk audits professionals. Given our corporate connections, students will get the opportunity to participate in live projects. Further, upon completion of the Program, we aim to provide students with internship opportunities with firms across the country.

In addition to the above, students will enhance their communication skills through class discussions and presentations, where they will be trained to present security information in a concise manner. Students will also improve their writing skills through research papers, teaching them how to express intricate ideas and analysis eloquently and effectively. Students will expand their security detection and protection skills pertaining to handling complex IT environments.

Course Structure

  • Consists of a 10 week Foundations course in Networking, Application and Cyber security fundamentals.
  • Advance course for remaining 15 weeks.

Course Benefits (USPs)

  • Creating worldclass cyber security scientist
  • Building individual skills for scientific jobs in the industry
  • Containing Job Ready Foundation and Specialized Courses
  • Learning new tools and techniques for vulnerability & malware analysis
  • Future CISO and leadership roles
  • World-class Certification

Course Modules

  1. Networking Fundamentals
  2. Application Development Cycle
  3. Cyber Security Fundamentals
  4. Vulnerability Analysis
  5. Exploits Development
  6. Malware Analysis
  7. Reverse Engineering
  8. Job Readyness

Risks Assessment Labs

  1. Security R&D Labs – Across industry and technology domains
  2. Binary Code Analysis Lab – Mobile Programming Technologies (Android, iOS and Windows)
  3. Static Analysis Lab – Unix, Android, iOS and Windows
  4. Dynamic Analysis Lab – Unix, Android, iOS and Windows
  5. Forensics Analysis Lab – Unix, Android, iOS and Windows

Methodologies and Techniques

  1. Reverse-engineering
  2. Content Pattern based Analysis and techniques
  3. Sand-box Analysis and techniques

Course Contents

  • Networking Fundamentals Module: 
    • Basics of OSI and TCP/IP Stacks, Routers, Firewall
    • Common networked applications including web applications
    • LAN/WAN operation and features
    • Configuration and network connectivity using ping, traceroute, telnet, SSH or other utilities
    • Implement an IP addressing scheme and IP Services to meet network requirements
    • Operation and benefits of using private and public IP addressing
    • Static and dynamic addressing services for hosts in a LAN environment
    • Basic router security
    • Wireless media
    • configure on a wireless network
  • Application Development Module
    • APPLICATION Development Environment
      • Programming Language: Android, C, .Net, HTML5, JAVA and so on…
      • SDKs, IDEs, so on…
    • Client Applications:
      • Web Server Applications
      • Mobile Android Applications
      • Mobile iOS Applications
      • Mobile Windows Applications
    • Web Server Applications:
      • Web based applications
      • APIs based Middleware applications
      • TCP/IP based server applications
  • Vulnerability Analysis Module
    • Anti-malware Lab Setups and Configurations
    • Sandboxing and Reverse Engineering
    • Risks/Threat Modelling
    • Installations of Security Analysis tools
    • LIVE Sample Analysis
    • Hardening of Client Devices:
      • Laptop/Desktop Devices
      • Mobile/Tablet Android Devices
      • Mobile/Tablet iOS Devices
      • Mobile/Tablet Windows Devices
    • Hardening of Servers Devices:
      • Cloud based Servers
        • Windows/Linux/Unix
          • Cloud Hosted Servers
          • Virtualized Servers
        • Mobile Android Devices
        • Mobile iOS Devices
        • Mobile Windows Devices
    • Vulnerability Reporting Frameworks
    • Vulnerability Severity Rating Frameworks
    • Best Practice Security Standards and Frameworks
      • OWASP Framework Report Generations
  • Malware Analysis Module
    • Source of Malware samples
    • Installation and configurations of Analysis tools
    • Reverse engineering of malware samples
    • Executing Mobile malwares under surveillance
    • Network Traffic Observation and analysis
    • Observation of Static behaviour of malware
    • Observations of Dynamic behaviour of malware
    • Observations of Forensic changes on systems and devices
    • Detection of content patterns in malware sample
    • Protection logic/techniques development for malware
  • LIVE Projects on selected track
    • Vulnerability/Malware Researching
    • Project walk-through
    • Hand-over of Security Report
    • Sign-off
  • Final Evaluation Exams & Interviews
  • Certifications with grading
  • Resume Enhancements and submission 
  • Placement Interviews
  • Internship Opportunities
  • Entrepreneurship Opportunities