Advanced Professional Certification Programme in Cybersecurity and Ethical hacking

—E&ICT, IIT Guwahati

  • Home
  • Programs
  • Advanced Professional Certification Programme in Cybersecurity and Ethical Hacking – E&ICT, IIT Guwahati
Course Duration
10-12 Months*
Application Closure Date
Closing Soon
Commencement Date
To be announced
Session Timings
2.00 PM to 5.00 PM

Programme Overview

Combat cyber heist challenges and eliminate security threats. Upskill and transform into well-suited and skilled Cyber Security Experts by learning to prevent organisations’ cybersecurity mesh by developing security architecture with India’s top IIT. Unlock fundamental concepts in cybersecurity, ethical hacking, and their applications to reimagine organisational goals. Explore IIT’s cutting-edge curriculum, which includes a mix of theory, capstone project, case-based learning, and much more. Join E&ICT’s, IIT Guwahati’s revolutionary Advanced Professional Certification Programme in Cybersecurity and Ethical hacking to help you establish a benchmark in your cybersecurity career.

Programme Highlights

Certificate of Completion from E&ICT, IIT Guwahati


Live Classes by Highly Experienced Faculty Members from IITs & Industry Experts


3 Days of Intensive Campus Immersion Modules


Pedagogy includes Case Discussions


Hands on Training and Project Work


Peer-to-peer Learning and Industry Experts Mentorship

Admission Criteria

Eligibility Criteria

  • Graduates (10+2+3 or equivalent) in any discipline recognised by UGC/AICTE with minimum 50% aggregate marks at either UG/PG level.
  • Minimum 2 years of work experience is desirable.

Syllabus Breakdown

  • Python Environment Setup and Essentials
  • Python Language Basic Constructs
  • Introduction to Linux and File Management
  • What is Cyber Security
  • Overview
  • Need and Importance
  • Different Verticals
  • Introduction to Kali Linux
  • Services in Kali (HTTP, SSH)
  • Wget, curl, grep, awk, tail, head, watch, find, locate
  • Piping and Redirection
  • Python and Bash Scripting
  • Netcat, Socat, Powercat, Powershell, Wireshark, tcpdump
  • Note taking
  • Security Controls
  • Networking Concepts
  • Traffic Analysis
  • Packet Analyzers
  • Sniffers
  • Firewalls
  • SIEM
  • VLAN
  • VPN
  • Understand the Basic Concepts of Security
  • Information and Event
  • Management (SIEM)
  • Discuss the Different SIEM Solutions
  • Understand the SIEM Deployment
  • Learn Different Use Case Examples for Application
  • Level Incident Detection
  • Learn Different Use Case Examples for Insider Incident Detection
  • Learn Different Use Case Examples for Network Level Incident Detection
  • Learn Different Use Case Examples for Host Level Incident Detection
  • Learn Different Use Case Examples for Compliance
  • Understand the Concept of Handling Alert Triaging and Analysis
  • Understand the SOC Fundamentals
  • Discuss the Components of SOC: People, Processes and Technology
  • Understand the Implementation of SOC
  • Logical/Physical Access to Assets Management
  • Authentication and Identification Management
  • Integrating Identity as a Third-Party Service
  • Mechanism of Authorization
  • Provisioning Life Cycle’s Identity and Access
  • OWASP Tools and Methodologies
  • Insecure Deserialization
  • Clickjacking
  • Black Box Testing
  • White Box Testing
  • Fuzzing
  • Cryptograph
  • Symmetric/Asymmetric Cryptography
  • Hashing
  • Digital Signatures
  • API Security
  • Patch Management
  • Types
  • Ransomware
  • Detection
  • Analysis
  • Introduction
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • Vulnerability Analysis
  • System Hacking
  • Sniffing
  • Social Engineering
  • Denial-of-Service
  • Session Hijacking
  • Evading IDS
  • Firewalls and Honeypots
  • Hacking Web Servers
  • SQL Injection
  • Hacking – Wireless Networks
  • Mobile Platforms
  • IoT
  • Infrastructure Security: Network level security, Host level security, Application-level security
  • Data security and Storage: Data privacy and security Issues, Jurisdictional issues raised by Data location
  • Access Control
  • Trust, Reputation, Risk
  • Authentication in cloud computing, Client access in cloud, Cloud contracting Model, Commercial and business considerations
  • Security Controls for The Development Environment
  • Life Cycle Security
  • Impact of Acquired Software Security
  • Effectiveness of Software Security

In this module, you will learn how to prevent a web application from being hacked as well as what key points to be considered for making a web application secure. This capstone project will give you exposure to both the blue team and red team work profile and help you gain exposure on both sides.

Direct to Device
Online Live Sessions
Capstone Project
Real time Case Studies

*The above given is an indicative list of modules and is subject to change as per E&ICT, IIT Guwahati’s discretion.

About IIT Guwahati

Indian Institute of Technology Guwahati is the sixth member of the IIT fraternity. The academic programme of IIT Guwahati commenced in 1995. The Institute has eleven departments, five inter-disciplinary academic centres and four schools covering all the major engineering, science and humanities disciplines, offering BTech, BDes, MA, MDes, MTech, MSc and PhD programmes. This IIT fraternity is ranked among the top 100 world universities—under 50 years of age—by the London-based Times Higher Education in 2014. It continues to maintain its superior position even today in various international rankings.

About E&ICT Academy

IIT Guwahati’s E&ICT Academy (An initiative of the Ministry of Electronics & Information Technology, Government of India) aims to provide specialised training to the faculties of Engineering, Arts, Commerce & Science colleges, Polytechnics, etc. by developing state-of-the-art facilities. Academy has planned short term training programmes on fundamental and advanced topics in IT, Electronics & Communication, Product Design, Manufacturing with hands on training and project work using the latest software tools and systems.
Furthermore, the Academy will provide specialised/customised training programmes as well as research promotion workshops for the corporate sector and educational institutions. The Electronics and ICT Academy is intended to serve as a central hub for training, consulting, and entrepreneurship programmes.

as per NIRF 2022

globally in the ‘Research Citations per Faculty’

Overall in the QS World University Rankings 2022

Learn Live From Top IIT Guwahati’s Faculty

*The above list of faculties is indicative and partial and is subject to change or update as per E&ICT, IIT Guwahati’s discretion.

Programme Certification

Upon successful completion of the “Advanced Professional Certification Programme in Cybersecurity and Ethical Hacking” programme and meeting all other academic requirements, participants will be awarded a certificate from E&ICT, IIT Guwahati.

Fee Structure

Programme fee
Fee Structure
Total Programme Fee
INR 1,80,000/- + GST
Easy EMI options available
Installment Pattern
Installment Pattern
Initial Payment
INR 80,000/- + GST

1st Instalment

(Payable – April 10th 2023)

INR 50,000/- + GST

2nd Instalment

(Payable – July 10th 2023)

INR 50,000/- + GST

Easy EMI options available

Admission Process

Talk to our Expert

Fill the form to get more information.

(Privacy and Security Guaranteed)

The Jaro Advantage

Learning Support
Doubt Resolution

Jaro Expedite - Career Booster

Profile Building

Rigorously building the candidate’s profiles and resume scrutinizing their LinkedIn profiles. Jaro Education enables personalised feedback to boost overall virtual presence.

Resume Review

Moving forward with carefully curated resume reviews that ensures you are interview-ready for the workplace of tomorrow.

Placement Assistance

Get career assistance as per the profile and preferences. On average, get 5-6 job recommendations to enhance quality employment opportunities.

Career Enhancement Sessions

Bridging connectivity to link the best talent with organizations through eminent sessions from top-class industry speakers.


Note: E&ICT, IIT Guwahati or Jaro Education do not guarantee or promise you a job or advancement in your existing position. Career Services is simply provided as a service to help you manage your career in a proactive manner. Jaro Education provides the Career Services described here. E&ICT, IIT Guwahati is not involved in any way with the Career Services described above and offer no commitments.

Build 21st-Century Skill set to Gain Career Edge in the VUCA World

Learn from the best minds and eminent faculty to become the next industry expert.
By clicking Start Application, you agree to our terms and conditions and our privacy policy.

You’ll learn

Frequently Asked Questions
Will I receive a certificate from IIT Guwahati?

After completing the programme criterias, all eligible participants will be awarded with a certificate of completion by E&ICT, IIT Guwahati.

What is the mode of delivery to engage participants?

The Advanced Professional Certification Programme in Cybersecurity and Ethical hacking will be delivered in an engaging Direct to Device mode, allowing participants to immerse themselves in an enriching learning experience.

What is the eligibility for the programme?

Here’s the minimum eligibility criteria for Advanced Professional Certification Programme in Cybersecurity and Ethical hacking :

  • Graduates (10+2+3 or equivalent) in any UGC/AICTE-recognized discipline with a minimum of 50% aggregate marks at the UG/PG level.
  • Must have a prior work experience of at least two years is required.
What is the fee structure of the Advanced Professional Certification Programme in Cybersecurity and Ethical hacking?

The total programme fee is INR 1,80,000/- + GST.

Program Counsellor

Program Manager


Program Counsellor Number

Connect with our Program Advisor

Program Counsellor

Program Counsellor

Ms. Betsy Basil

Program Counsellor Number

Program Counsellor Email Id

Coming Soon