IIT Mumbai

Cyber Security

0 Ratings
  • Threat Detection & Prevention
  • Network & System Security
  • Data Protection & Privacy
  • Risk Assessment & Management
Cyber Security
Course Introduction

Key Highlights

24/7 Lifetime Support

Overview

Cyber Security involves protecting computers, networks, applications, and data from cyber threats such as hacking, malware, and unauthorized access. It focuses on implementing security measures, monitoring vulnerabilities, and ensuring data confidentiality, integrity, and availability. Cyber security plays a critical role in safeguarding digital infrastructure and maintaining trust in modern technology-driven environments.

Talk To Us

We are happy to help you 24/7

Cyber Security Career Transitions

% Average Salary Hike

45 LPA Highest Salary

+ Career Transitions

+ Hiring Partners

*Past record is no guarantee of future job prospects

What role does a Data Scientist play?

Fees

The credit facility is provided by a third-party financing company and any arrangement with such financing companies is outside the platform's purview.

Corporate Training

Customized Learning
Enterprise Grade Learning Management System (LMS)
24x7 Support
Enterprise Grade Reporting

Data Science Course Syllabus

Live Course Self-Paced Industry Expert Academic Faculty

Advanced Mathematics (5 ECTS)

  • Calculus
    00:00:00

    Calculus 

  • Integral transformations
    00:00:00
  • Vector algebra
    00:00:00
  • Vector calculus
    00:00:00
  • Matrices and vector spaces
    00:00:00
  • Information theory
    00:00:00
  • Data protection and privacy
    00:00:00

    Data protection and privacy

  • Cyber security building blocks
    00:00:00
  • Cyber security management
    00:00:00
  • Cryptography concepts
    00:00:00
  • Cryptography applications
    00:00:00
  • IT Governance: Motivation and Challenges
    00:00:00

    IT Governance: Motivation and Challenges

  • COBIT Framework
    00:00:00
  • IT Compliance
    00:00:00
  • IT basic protection according to BSI IT law
    00:00:00
  • Social science and research paradigms
    00:00:00

    Social science and research paradigms

  • Case study research
    00:00:00
  • Specific topics of qualitative research
    00:00:00
  • Advanced issues of qualitative research conceptualization and data analysis
    00:00:00
  • Underlying assumptions of quantitative research: concepts and consequences
    00:00:00
  • Evaluation research
    00:00:00
  • The seminar covers different advanced topics regarding cyber security. Each participant must prepare a research essay on a topic assigned to them.
    00:00:00

    The seminar covers different advanced topics regarding cyber security. Each participant must prepare a research essay on a topic assigned to them.

  • Symmetric and asymmetric cryptosystems
    00:00:00

    Symmetric and asymmetric cryptosystems

  • Authentication
    00:00:00
  • Cryptanalysis
    00:00:00
  • Cryptology in the internet
    00:00:00
  • Applications
    00:00:00
  • Organizational IT Risk Management
    00:00:00

    Organizational IT Risk Management 

  • Measuring the Cyber Threat
    00:00:00
  • Threat Modeling
    00:00:00
  • Standardization and Compliance
    00:00:00
  • Risk Assessment
    00:00:00
  • The Cyber-Resilient Organization
    00:00:00
  • Basics of software development
    00:00:00

    Basics of software development 

  • Data formats and coding
    00:00:00
  • Firmware and operating systems
    00:00:00
  • Classification and application areas of desktop applications
    00:00:00
  • Databases
    00:00:00
  • Application-specific software systems in the company
    00:00:00
  • Ergonomic aspects of computer workstation design and human-machine interaction
    00:00:00
  • Computer Arithmetics
    00:00:00

    Computer Arithmetics 

  • Integrated Circuits
    00:00:00
  • Storage systems
    00:00:00
  • Input/output systems
    00:00:00
  • Fundamentals of data transmission
    00:00:00
  • Computer networks
    00:00:00
  • Server and data centers
    00:00:00
  • Operating systems
    00:00:00

    Operating systems 

  • Networking
    00:00:00
  • Forensics
    00:00:00
  • Cryptography
    00:00:00
  • Cyber attacks
    00:00:00
  • Cryptographic protocols
    00:00:00

    Cryptographic protocols

  • Network security controls
    00:00:00
  • Application layer security issues
    00:00:00
  • Wireless security
    00:00:00
  • Intrusion detection and prevention
    00:00:00
  • Algorithms and Data Structures
    00:00:00

    Algorithms and Data Structures

  • Formal Languages and Automata Theory
    00:00:00
  • Computability, Decidability and Complexity
    00:00:00
  • Logic
    00:00:00
  • Algorithm and Program Verification
    00:00:00
  • Artificial Intelligence and Machine Learning
    00:00:00

Free Career Counselling

We are happy to help you 24/7

Data Science Projects

Career Services

Career Services
View More

Certification

Online Data Science Course Reviews

(95,629)

Experience Campus Immersion at iHub IIT Roorkee & Build Formidable Networks With Peers & IIT Faculty

Campus Immersion

Land Your Dream Job Like Our Alumni

Hiring Partners

Cyber Security Training FAQs

View More