Overview
In just 20 days, dive into the critical world of cybersecurity and learn how to safeguard digital systems in an era where cyber threats are growing more complex and dangerous every day. This short-term, intensive course is designed to provide a strong foundation in cybersecurity concepts, tools, and practices that are essential in the modern digital landscape.
Covering everything from basic cyber hygiene to advanced threat detection techniques, this course blends theory with hands-on learning. Participants will explore key topics such as network security, malware analysis, ethical hacking, cryptography, cyber laws, and real-world case studies. Each day focuses on a targeted theme, ensuring consistent progress and practical understanding.
Our Trainers
Prof. Chiranjeevee Dohare
Prof. Chiranjeevee Dohare
Assistant Professor
SAGE University Indore
Certified in Cybersecurity
Prof. Harish Sharma
Prof. Harish Sharma (Assistant Professor, 9 year of Experiance in IT Company)
Modules
Introduction to Cybersecurity & Threat Landscape (Days 1–2)
- What is Cybersecurity?
- CIA Triad (Confidentiality, Integrity, Availability)
- Importance of Cybersecurity in the Modern Era
- Types of Threats: Malware, Phishing, Ransomware, etc.
- Real-World Cyber Attacks & Their Impact
- Cybersecurity Terminologies and Roles
Networking & Network Security Basics (Days 3–4)
- Basics of Networking (IP, DNS, Ports, Protocols)
- OSI & TCP/IP Models
- Network Security Concepts
- Firewalls, IDS/IPS, and VPNs
- Secure Network Design Principles
Operating System Security & Access Control (Days 5–6)
- OS Security Fundamentals (Windows & Linux)
- User Accounts, Permissions, and Hardening Techniques
- Access Control Models (DAC, MAC, RBAC)
- Authentication & Authorization Methods
- Security Best Practices for OS
Cryptography & Data Protection (Days 7–8)
- Introduction to Cryptography
- Symmetric vs Asymmetric Encryption
- Hashing, Digital Signatures, and Certificates
- SSL/TLS and Secure Communication
- Data Protection Techniques
Ethical Hacking & Tools (Days 9–10)
- Introduction to Ethical Hacking
- Phases: Reconnaissance, Scanning, Gaining Access
- Demo: Tools like Nmap, Wireshark, Metasploit (basic usage)
- Legal and Ethical Boundaries of Hacking
Cyber Laws, Policies & Governance (Days 11–12)
- Overview of Cyber Laws (Local & Global)
- IT Act, GDPR, and Compliance Basics
- Cybersecurity Policies and Frameworks
- Organizational Security Practices
- Roles of CERTs and Cybersecurity Governance
Incident Response & Real-World Case Studies (Days 13–14)
- Incident Detection & Response
- Cybersecurity Kill Chain & Risk Management
- Famous Case Studies (e.g., Equifax, WannaCry)
- Lessons Learned & Mitigation Strategies
Day 15: Wrap-Up, Revision & Assessment
- Course Recap
- Interactive Q&A Session
- Hands-on Quiz or Practical Assignment
- Feedback Collection
- Certificate Distribution
Outcomes
Demonstrate foundational knowledge of cybersecurity concepts including types of cyber threats, attack vectors, and defense mechanisms.
Identify and assess common security vulnerabilities in computer systems and networks.
used in cybersecurity such as firewalls, antivirus software, and ethical hacking utilities
Analyze and interpret real-world cyber attack scenarios to understand their causes, consequences, and prevention strategies.
Implement essential network and data protection strategies including secure configurations, encryption, and access control.
Exhibit awareness of legal, ethical, and professional responsibilities related to cybersecurity practices and digital forensics.
Develop a proactive security mindset to identify potential risks and apply best practices for cyber hygiene in personal and professional contexts.
Collaborate in group activities or simulations to develop incident response plans and cyber defense strategies.
Communicate cybersecurity concepts and solutions effectively, both in written and verbal form, for technical and non-technical audiences.
Receive a course completion certificate validating their foundational skills in cybersecurity, enhancing employability and readiness for further specialization.
