https://eict.iitg.ac.in/user/user_login
An employer-driven professional certification with live mentorship, explicit hands-on training, real projects, and a portfolio-grade capstone.
This Professional Certification Programme in Cyber Security covers foundational to advanced topics such as network security, ethical hacking, cloud security, cryptography, incident response, and forensics.
7–8 hours weekly engagement through live, queries, and hands-on sessions. Total 4 semesters of three months each.
Kali Linux, Nmap, Metasploit Framework, Wireshark, OpenVAS, Snort, ELK Stack (Elasticsearch, Logstash, Kibana)
Resume building, portfolio preparation, mock interviews, and interview strategy tips.
Active cohort groups with E&ICT Academy IIT Guwahati alumni network.
On-campus orientation and immersion at the beginning and completion of the program.
Showcase-ready project reviewed by mentors and research paper guidance from IIT Guwahati veterans.
Our cybersecurity solutions provide comprehensive protection for systems, networks, and sensitive data against modern cyber threats such as malware, ransomware, phishing attacks, and unauthorized access. Led by experienced professionals, we use AI-driven threat detection and industry best practices to ensure proactive monitoring and rapid incident response. We help organizations reduce risks, maintain compliance, and protect business continuity. Additionally, focus on user training and awareness strengthens the human layer of security, making your organization resilient against evolving challenges.
Cybersecurity is a critical and rapidly evolving field focused on protecting computer systems, networks, and data from cyber threats. With increasing digital adoption, organizations face growing risks such as data breaches, cyberattacks, and identity theft. Cybersecurity combines IT, networking, cryptography, and risk management principles to ensure confidentiality, integrity, and availability of information. Professionals in this field safeguard digital assets, maintain trust, and ensure secure operations across industries such as healthcare, finance, government, and education.
Hands-on learning with real-world tools, labs, simulations, and case studies. Build problem-solving skills, technical confidence, and industry readiness.
Covers core and advanced cybersecurity concepts: network & system security, threat analysis, vulnerability assessment, risk management, incident response, and compliance. Balanced theory + practical insights.
Learn from industry practitioners and academics with real-world insights.
Career counseling, interview preparation, and a capstone project to enhance job readiness.
Earn certificates after each semester to showcase progressive skill development.
Build a strong project portfolio, culminating with a Capstone Project that demonstrates your expertise.
Designed to make you employer-ready and prepared for future studies.
Project-based learning with real-world, portfolio-ready deliverables.
One-to-one mentor reviews and query assistance via email and live sessions.
Weekly interactive sessions and masterclasses by eminent domain experts.
Industry-recognized certificates awarded after completion of each semester.
Open to professionals with 0+ years experience. Applicants with demonstrable project work preferred. Need-based scholarships available.
Step-by-step path from fundamentals to capstone and research covering 15 detailed Modules.
Initial 3 Modules of 90 Hours duration forming Semester I of the course.
Intermediate 3 Modules of 90 Hours duration forming Semester II of the course.
Advanced 3 Modules of 90 Hours duration forming Semester III of the course.
Portfolio-grade final capstone project + mock interviews + Research Paper Writing.
Detailed module breakdown — expand to view topics and resources.
Module 101 Python & Linux Foundation: Python Environment Setup and Essentials, Python Language Basic Constructs, Introduction to Linux and File Management.
Module 102 Introduction to Cyber Security & Information Security: What is Cyber Security, Overview, Need and Importance, Different Verticals.
Module 103 Working with Kali Linux 2021.1: Introduction to Kali Linux, Services in Kali (HTTP, SSH), Wget, curl, grep, awk, tail, head, watch, find, locate, Piping and Redirection, Python and Bash Scripting, Netcat, Socat, Powercat, Powershell, Wireshark, tcpdump, Note taking.
Module 201 Network Security: Security Controls, Networking Concepts, Traffic Analysis, Packet Analyzers, Sniffers, Firewalls, SIEM, VLAN, VPN.
Module 202 Incident Detection with SIEM: Understand the basic concepts of Security Information and Event Management (SIEM), Different SIEM Solutions, Deployment, Alert Triaging and Analysis, Use Case Examples for Application, Network, Host Level, and Compliance Incident Detection.
Module 203 Security Operations and Management: Understand SOC fundamentals, components (People, Processes, Technology), and SOC implementation.
Module 301 Identity and Access Management (IAM): Logical/Physical Access Management, Authentication, Authorization, Identity as Third-Party Service, Provisioning Lifecycle.
Module 302 Web Application Penetration Testing: OWASP Tools & Methodologies, Insecure Deserialization, Clickjacking, Black/White Box Testing, Fuzzing, Cryptography, Hashing, Digital Signatures, API Security, Patch Management.
Module 303 Malware Analysis: Types, Ransomware, Detection, Analysis.
Module 401 Ethical Hacking: Footprinting, Reconnaissance, Scanning, Enumeration, Vulnerability Analysis, System Hacking, Sniffing, Social Engineering, DoS, Session Hijacking, Evading IDS/Firewalls, Web Servers, SQL Injection, Wireless Networks, Mobile Platforms, IoT.
Module 402 Cloud Security: Infrastructure Security, Host/Application Security, Data Security & Storage, Authentication, Cloud Access, Cloud Contracting, Security Controls, Life Cycle Security.
Module 403 Software Development Security: Career Counselling, Interview Tips, Final Project Presentation.
Experienced practitioners from IIT Guwahati in this field.
Research Areas: Circuit Simulation (Analog, RF & Digital), VLSI CAD, Electronics System Design, Computer Architecture, Semiconductor Devices, Hardware Security, Embedded Systems & IoT, High Performance Computing, Optimization & Machine Learning.
Research Areas: Control Systems, Cryptography.
Research Areas: Multicore (Architecture, Scheduling and Programming) and Computational Social Systems.
Instructors of this course are IIT Guwahati Research Scholars and Staff in this field.
Questions about the course or eligibility? Drop us a message and we'll respond within 48 hours.