Learn Cyber Security With hands on session on preventing cyber attacks

In just 20 days, dive into the critical world of cybersecurity and learn how to safeguard digital systems in an era where cyber threats are growing more complex and dangerous every day.

Duration

2 Weeks

Skill Level

Moderate

Starts From:

14/07/2025

Category

Science And Technology

Overview

In just 20 days, dive into the critical world of cybersecurity and learn how to safeguard digital systems in an era where cyber threats are growing more complex and dangerous every day. This short-term, intensive course is designed to provide a strong foundation in cybersecurity concepts, tools, and practices that are essential in the modern digital landscape.

Covering everything from basic cyber hygiene to advanced threat detection techniques, this course blends theory with hands-on learning. Participants will explore key topics such as network security, malware analysis, ethical hacking, cryptography, cyber laws, and real-world case studies. Each day focuses on a targeted theme, ensuring consistent progress and practical understanding.


Our Trainers

Prof. Chiranjeevee Dohare

Prof. Chiranjeevee Dohare

Assistant Professor 

SAGE University Indore

Certified in Cybersecurity

 

Prof. Harish Sharma

Prof. Harish Sharma (Assistant Professor, 9 year of Experiance in IT Company)

Modules

Introduction to Cybersecurity & Threat Landscape (Days 1–2)

  • What is Cybersecurity?
  • CIA Triad (Confidentiality, Integrity, Availability)
  • Importance of Cybersecurity in the Modern Era
  • Types of Threats: Malware, Phishing, Ransomware, etc.
  • Real-World Cyber Attacks & Their Impact
  • Cybersecurity Terminologies and Roles

Networking & Network Security Basics (Days 3–4)

  • Basics of Networking (IP, DNS, Ports, Protocols)
  • OSI & TCP/IP Models
  • Network Security Concepts
  • Firewalls, IDS/IPS, and VPNs
  • Secure Network Design Principles

Operating System Security & Access Control (Days 5–6)

  • OS Security Fundamentals (Windows & Linux)
  • User Accounts, Permissions, and Hardening Techniques
  • Access Control Models (DAC, MAC, RBAC)
  • Authentication & Authorization Methods
  • Security Best Practices for OS

Cryptography & Data Protection (Days 7–8)

  • Introduction to Cryptography
  • Symmetric vs Asymmetric Encryption
  • Hashing, Digital Signatures, and Certificates
  • SSL/TLS and Secure Communication
  • Data Protection Techniques

Ethical Hacking & Tools (Days 9–10)

  • Introduction to Ethical Hacking
  • Phases: Reconnaissance, Scanning, Gaining Access
  • Demo: Tools like Nmap, Wireshark, Metasploit (basic usage)
  • Legal and Ethical Boundaries of Hacking

Cyber Laws, Policies & Governance (Days 11–12)

  • Overview of Cyber Laws (Local & Global)
  • IT Act, GDPR, and Compliance Basics
  • Cybersecurity Policies and Frameworks
  • Organizational Security Practices
  • Roles of CERTs and Cybersecurity Governance

Incident Response & Real-World Case Studies (Days 13–14)

  • Incident Detection & Response
  • Cybersecurity Kill Chain & Risk Management
  • Famous Case Studies (e.g., Equifax, WannaCry)
  • Lessons Learned & Mitigation Strategies

Day 15: Wrap-Up, Revision & Assessment

  • Course Recap
  • Interactive Q&A Session
  • Hands-on Quiz or Practical Assignment
  • Feedback Collection
  • Certificate Distribution

Outcomes

Demonstrate foundational knowledge of cybersecurity concepts including types of cyber threats, attack vectors, and defense mechanisms.

Identify and assess common security vulnerabilities in computer systems and networks.

 used in cybersecurity such as firewalls, antivirus software, and ethical hacking utilities

Analyze and interpret real-world cyber attack scenarios to understand their causes, consequences, and prevention strategies.

Implement essential network and data protection strategies including secure configurations, encryption, and access control.

Exhibit awareness of legal, ethical, and professional responsibilities related to cybersecurity practices and digital forensics.

Develop a proactive security mindset to identify potential risks and apply best practices for cyber hygiene in personal and professional contexts.

Collaborate in group activities or simulations to develop incident response plans and cyber defense strategies.

Communicate cybersecurity concepts and solutions effectively, both in written and verbal form, for technical and non-technical audiences.

Receive a course completion certificate validating their foundational skills in cybersecurity, enhancing employability and readiness for further specialization.


Contact

Name: Prof. Sumer Singh Shaktawat

Mobile No: 8349733093

Email: [email protected]


Best Cybersecurity Courses & Certificates Online - SageX

This Premium course is included in plans

1000/- ₹1000

Registration Closed

Copyright ©2026 SageX