
- Course Duration
10-12 Months
- Session Timings
Sunday 2.00 PM to 5.00 PM
Admission Criteria

Eligibility Criteria
- Graduates (10+2+3 or equivalent) in any discipline recognised by UGC/AICTE with minimum 50% aggregate marks at either UG/PG level.
- Minimum 2 years of work experience is desirable.
About
About IIT Guwahati
Indian Institute of Technology Guwahati is the sixth member of the IIT fraternity. The academic programme of IIT Guwahati commenced in 1995. The Institute has eleven departments, five inter-disciplinary academic centres and four schools covering all the major engineering, science and humanities disciplines, offering BTech, BDes, MA, MDes, MTech, MSc and PhD programmes. This IIT fraternity is ranked among the top 100 world universities—under 50 years of age—by the London-based Times Higher Education in 2014. It continues to maintain its superior position even today in various international rankings.
About E&ICT Academy
IIT Guwahati’s E&ICT Academy (An initiative of the Ministry of Electronics & Information Technology, Government of India) aims to provide specialised training to the faculties of Engineering, Arts, Commerce & Science colleges, Polytechnics, etc. by developing state-of-the-art facilities. Academy has planned short term training programmes on fundamental and advanced topics in IT, Electronics & Communication, Product Design, Manufacturing with hands on training and project work using the latest software tools and systems. Furthermore, the Academy will provide specialised/customised training programmes as well as research promotion workshops for the corporate sector and educational institutions. The Electronics and ICT Academy is intended to serve as a central hub for training, consulting, and entrepreneurship programmes.
- 7th as per NIRF 2022
- 41st globally in the ‘Research Citations per Faculty’
- 395th Overall in the QS World University Rankings 2022

Pedagogical Methodology
Learning Outcomes
Jaro Expedite - Career Booster
Note: E&ICT, IIT Guwahati or Jaro Education do not guarantee or promise you a job or advancement in your existing position. Career Services is simply provided as a service to help you manage your career in a proactive manner. Jaro Education provides the Career Services described here. E&ICT, IIT Guwahati is not involved in any way with the Career Services described above and offer no commitments.
Admission Process
- 1
Eligibility of Applicant
- 2
Application Submission
- 3
Screening & Shortlisting
- 4
Admission & Fee Payment
- 5
Book your Seat
Unleash the benefits that await you with Jaro Value adds.
%
higher employee retention rate
%
increase in employee productivity
%
higher incomes per employee
%
businesses achieved measurable growth
Companies that already trust us!
Syllabus Breakdown
- Python Environment Setup and Essentials
- Python Language Basic Constructs
- Introduction to Linux and File Management
- What is Cyber Security
- Overview
- Need and Importance
- Different Verticals
*The above given is an indicative list of modules and is subject to change as per E&ICT, IIT Guwahati’s discretion.
- Introduction to Kali Linux
- Services in Kali (HTTP, SSH)
- Wget, curl, grep, awk, tail, head, watch, find, locate
- Piping and Redirection
- Python and Bash Scripting
- Netcat, Socat, Powercat, Powershell, Wireshark, tcpdump
- Note taking
*The above given is an indicative list of modules and is subject to change as per E&ICT, IIT Guwahati’s discretion.
- Security Controls
- Networking Concepts
- Traffic Analysis
- Packet Analyzers
- Sniffers
- Firewalls
- SIEM
- VLAN
- VPN
*The above given is an indicative list of modules and is subject to change as per E&ICT, IIT Guwahati’s discretion.
- Understand the Basic Concepts of Security
- Information and Event
- Management (SIEM)
- Discuss the Different SIEM Solutions
- Understand the SIEM Deployment
- Learn Different Use Case Examples for Application
- Level Incident Detection
- Learn Different Use Case Examples for Insider Incident Detection
- Learn Different Use Case Examples for Network Level Incident Detection
- Learn Different Use Case Examples for Host Level Incident Detection
- Learn Different Use Case Examples for Compliance
- Understand the Concept of Handling Alert Triaging and Analysis
*The above given is an indicative list of modules and is subject to change as per E&ICT, IIT Guwahati’s discretion.
- Understand the SOC Fundamentals
- Discuss the Components of SOC: People, Processes and Technology
- Understand the Implementation of SOC
*The above given is an indicative list of modules and is subject to change as per E&ICT, IIT Guwahati’s discretion.
- Logical/Physical Access to Assets Management
- Authentication and Identification Management
- Integrating Identity as a Third-Party Service
- Mechanism of Authorization
- Provisioning Life Cycle’s Identity and Access
*The above given is an indicative list of modules and is subject to change as per E&ICT, IIT Guwahati’s discretion.
- OWASP Tools and Methodologies
- Insecure Deserialization
- Clickjacking
- Black Box Testing
- White Box Testing
- Fuzzing
- Cryptograph
- Symmetric/Asymmetric Cryptography
- Hashing
- Digital Signatures
- API Security
- Patch Management
*The above given is an indicative list of modules and is subject to change as per E&ICT, IIT Guwahati’s discretion.
- Types
- Ransomware
- Detection
- Analysis
*The above given is an indicative list of modules and is subject to change as per E&ICT, IIT Guwahati’s discretion.
- Introduction
- Footprinting and Reconnaissance
- Scanning Networks
- Enumeration
- Vulnerability Analysis
- System Hacking
- Sniffing
- Social Engineering
- Denial-of-Service
- Session Hijacking
- Evading IDS
- Firewalls and Honeypots
- Hacking Web Servers
- SQL Injection
- Hacking – Wireless Networks
- Mobile Platforms
- IoT
*The above given is an indicative list of modules and is subject to change as per E&ICT, IIT Guwahati’s discretion.
- Infrastructure Security: Network level security, Host level security, Application-level security
- Data security and Storage: Data privacy and security Issues, Jurisdictional issues raised by Data location
- Access Control
- Trust, Reputation, Risk
- Authentication in cloud computing, Client access in cloud, Cloud contracting Model, Commercial and business considerations
*The above given is an indicative list of modules and is subject to change as per E&ICT, IIT Guwahati’s discretion.
- Security Controls for The Development Environment
- Life Cycle Security
- Impact of Acquired Software Security
- Effectiveness of Software Security
*The above given is an indicative list of modules and is subject to change as per E&ICT, IIT Guwahati’s discretion.
- In this module, you will learn how to prevent a web application from being hacked as well as what key points to be considered for making a web application secure. This capstone project will give you exposure to both the blue team and red team work profile and help you gain exposure on both sides.
*The above given is an indicative list of modules and is subject to change as per E&ICT, IIT Guwahati’s discretion.
Programme Fee Details

- Easy EMI options available
Total Programme Fee
INR 1,80,000/- + GSTInstalment Pattern

Initial Payment
INR 80,000/- + GST1st Instalment
INR 50,000/- + GST2nd Instalment
INR 50,000/- + GSTProgramme Certification
Upon successful completion of the “Advanced Professional Certification Programme in Cybersecurity and Ethical Hacking” programme and meeting all other academic requirements, participants will be awarded a certificate from E&ICT, IIT Guwahati.

Know the Facilitators
Unlock Your Path to Success
Unsure about which course to choose? We understand—selecting the right programme can feel overwhelming. That’s why our intuitive Course Finder is here to help you discover the perfect match based on your skills, goals, and interests. Let us guide you toward your next career milestone with confidence.
Find My Ideal Course Find My Ideal Course

Refer & Earn – Amazing Rewards Await!
Share the gift of education—refer your friends and colleagues now! Earn fantastic rewards for every successful referral and empower others to advance their careers while you benefit.
Start Referring Today! Start Referring Today!Frequently Asked Questions
Here’s the minimum eligibility criteria for Advanced Professional Certification Programme in Cybersecurity and Ethical hacking :
- Graduates (10+2+3 or equivalent) in any UGC/AICTE-recognized discipline with a minimum of 50% aggregate marks at the UG/PG level.
- Must have a prior work experience of at least two years is required.






