Course Title: Post Graduate Diploma (PGD) in Cyber Security & IT Infrastructure
Course Introduction: In today’s digital-first world, cyber threats are escalating rapidly making
cybersecurity and IT infrastructure two of the most in-demand skill areas globally. This PGD
program is designed to equip learners with hands-on expertise in securing systems, networks,
and data, while also mastering essential infrastructure tools and technologies such as CCNA,
AWS, Linux, CEH, CISA, and more. Developed in collaboration with industry experts and aligned
with global certification standards, this one-year weekend program offers a perfect balance of
theoretical knowledge and practical experience.
Semester-Wise Subject & Course List:
Suggested
Semester Course Title Certification Alignment
Hours
Cisco Certified Network
CCNA (200:301) 40 hours
Associate (CCNA)
Linux Administration (RHCSA & Red Hat Certified Engineer
1st 40 hours
RHCE) (RHCE)
Semester
Certified Ethical Hacker (CEH) 40 hours EC-Council CEH
AWS Solutions Architect AWS Solutions Architect
40 hours
Associate Associate
Total 160 hours
Penetration Testing 30 hours Offensive Security/CEH Track
Digital Forensics & Investigation 30 hours EnCase/Nuix/CEH
2nd Certified Information System
40 hours ISACA CISA
Semester Auditor (CISA)
Network & Software Security NIST/ISO/CompTIA Security+
40 hours
with Incident Response Framework
Total 140 hours
Grand Total 300 hours
Course Objectives:
● To develop foundational to advanced knowledge in cybersecurity principles, network
security, and infrastructure management.
● To train participants in ethical hacking, penetration testing, and digital forensics to
identify and mitigate real-world cyber threats.
● To build hands-on skills in administering Linux servers, configuring network devices, and
deploying cloud infrastructure securely.
● To prepare participants for globally recognized certifications like CCNA, CEH, AWS, CISA,
and Linux RHCE.
● To ensure learners can design and manage secure IT systems aligned with global best
practices and compliance standards.
Learning Outcomes: By the end of this course, participants will be able to:
● Configure, manage, and secure enterprise-level networks using Cisco technologies
(CCNA).
● Administer Linux-based systems with RHCSA & RHCE-level proficiency.
● Identify vulnerabilities and perform ethical hacking and penetration testing ethically and
legally.
● Secure cloud environments using AWS security tools and best practices.
● Conduct digital forensic investigations and implement incident response protocols.
● Audit IT systems and processes in line with CISA global standards.
● Prepare and appear for certification exams with confidence in real-world application
scenarios.
Who Should Join:
● Graduates and professionals from IT, Engineering, or Computer Science backgrounds.
● System administrators, network engineers, and IT support staff seeking to upskill in
security and cloud infrastructure.
● Cybersecurity enthusiasts or career switchers aiming for ethical hacking, cloud security,
or IT audit roles.
● Fresh graduates looking for globally recognized, job-ready training in 4IR technologies.
● Professionals in banking, telecom, defense, education, or e-commerce sectors dealing
with critical data or infrastructure.
Career Opportunities / Occupations: Upon completion, learners will be job-ready for roles such
as:
● Cyber Security Analyst
● Network Security Engineer
● Ethical Hacker / Penetration Tester
● IT Infrastructure Engineer
● Cloud Security Specialist (AWS)
● Digital Forensics Investigator
● System Administrator (Linux/Windows)
● Information Security Auditor (CISA Track)
Industry-Standard Alignment & Certification Readiness: This PGD course is aligned with
international curriculum standards and prepares learners for the following global certifications:
Certification Coverage in Course
CCNA (Cisco Certified Network Associate) Full module in Semester 1
CEH (Certified Ethical Hacker) Full module in Semester 1
AWS Cloud Practitioner/Associate AWS Cloud module in Semester 1
RHCSA & RHCE (Red Hat Linux) Linux module in Semester 1
CISA (Certified Information Systems
CISA module in Semester 2
Auditor)
Course Module: CCNA (200-301)
Program: PGD in Cyber Security & IT Infrastructure
Total Duration: 40 Hours
Sessions: 20 (2 hours each)
Delivery Mode: Instructor-led + Hands-on Labs (Packet Tracer/GNS3/CLI)
Course Objectives: The objective of the CCNA (200-301) module is to:
1. Build a solid foundation in network infrastructure and protocols using Cisco standards.
2. Develop hands-on skills in routing, switching, subnetting, and configuring Cisco devices.
3. Familiarize learners with IPv4 and IPv6 addressing, NAT, ACLs, DHCP, DNS, and WAN
technologies.
4. Introduce network security fundamentals, automation, and device hardening practices.
5. Prepare learners for the Cisco Certified Network Associate (CCNA) global certification
exam.
Learning Outcomes: By the end of this module, learners will be able to:
● Design and implement small to medium-sized LAN/WAN networks using Cisco routers
and switches.
● Configure and troubleshoot Layer 2 and Layer 3 technologies, including VLANs, STP,
OSPF, EIGRP.
● Apply IP addressing schemes using subnetting and VLSM.
● Implement network services like DHCP, NAT, DNS, and ACLs.
● Use diagnostic tools to identify and resolve connectivity and configuration issues.
● Understand basic concepts of wireless, cloud computing, and network automation.
Session-wise Module Breakdown (with Expanded Descriptions)
Session Topic Detailed Description
- Understanding OSI & TCP/IP Models
- Functions of Routers, Switches, Hubs
Introduction to Networking & - Network Types: LAN, WAN, MAN
1
CCNA Exam Overview - Devices: NICs, Access Points, Firewalls
- CCNA Exam Syllabus & Pattern
- Introduction to Cisco CLI
- Ethernet Frame Structure
- MAC Addressing & ARP
LANs, Switches & Ethernet - Collision vs Broadcast Domains
2
Standards - Duplex & Speed Settings
- CSMA/CD and CSMA/CA
- Introduction to Switch Forwarding
- Console Access & CLI Modes
- Hostname and Banner Setup
- IP Address and Default Gateway Config
3 Basic Switch Configuration
- Password Protection and Encryption
- Saving Configs (startup-config vs running-config)
- Interface Description & VLAN Assignment
- Purpose and Benefits of VLANs
- Static VLAN Configuration
- Trunk Links & Allowed VLANs
4 VLANs & Inter-VLAN Routing
- Inter-VLAN Routing using Router-on-a-Stick
- Native VLAN and VLAN Mismatches
- VLAN Verification and Troubleshooting
5 Spanning Tree Protocol (STP) - STP Function and Loop Prevention
- Port States and Roles
- BPDU Process and Root Bridge Election
- STP Timers and Topology Changes
- PVST+ and RSTP Overview
- STP Troubleshooting Scenarios
- Concept and Benefits of EtherChannel
- LACP vs PAgP Protocols
- Static and Dynamic Configuration
6 EtherChannel Configuration
- Port Channel Load Balancing
- Misconfiguration Detection
- Interface Bundle Verification
- Binary Conversion and Decimal Notation
- Subnet Mask and CIDR Notation
- Subnetting Techniques and Practice
7 IPv4 Addressing & Subnetting
- VLSM and IP Planning
- Reserved IPs and Private IP Ranges
- Subnet Design Lab
- IPv6 Address Types: Unicast, Multicast, Anycast
- Global vs Link-Local Addresses
IPv6 Addressing & - Stateless Address Autoconfiguration (SLAAC)
8
Configuration - IPv6 Routing Basics
- ICMPv6 Overview
- IPv6 Addressing Lab
- Purpose of Static Routes
- Configuring IP Routes in Cisco Devices
Static Routing & Default - Next-Hop vs Exit Interface
9
Routes - Default Route Setup
- Floating Static Routes
- Troubleshooting Routing Tables
- Understanding Distance Vector vs Hybrid
Protocols
- RIP v1/v2 Features & Config
Dynamic Routing – RIP &
10 - EIGRP Metrics and DUAL Algorithm
EIGRP
- Auto-summarization and Manual Summary
- Passive Interfaces
- Routing Table Verification
- Link State Protocol Overview
OSPFv2 & OSPFv3 - OSPF Area Concepts
11
Configuration - OSPF Router ID Selection
- DR/BDR Election Process
- OSPF in IPv4 & IPv6 (OSPFv3)
- Show Commands and Troubleshooting
- Purpose and Types of ACLs (Standard/Extended)
- Numbered vs Named ACLs
- Wildcard Masks in ACLs
12 Access Control Lists (ACLs)
- ACL Placement and Direction
- Implicit Deny and ACL Order
- ACL Configuration and Testing
- Need for NAT and Address Translation
- Static NAT Configuration
NAT & PAT (Port Address - Dynamic NAT Pools
13
Translation) - PAT with Overloaded NAT
- Inside vs Outside Interfaces
- NAT Verification Commands
- DHCP Process and Operation
- Configuring DHCP on Routers
- Excluded Addresses and Pools
14 DHCP & DNS in Cisco Devices
- DNS Lookup and Static Mapping
- DHCP Relay (ip helper-address)
- Troubleshooting IP Addressing Issues
- WAN Types and Technologies
- HDLC & PPP Encapsulation
WAN Technologies & - PPP Authentication (PAP/CHAP)
15
PPP/HDLC - Frame Relay Overview
- Serial Link Configuration
- Bandwidth Commands and Troubleshooting
- Securing User Access with Passwords
- Enable Secret vs Enable Password
- SSH Configuration for Secure Remote Access
16 Router & Switch Security
- Port Security on Switches
- Login Banners and VTY Access Control
- Best Practices for Device Hardening
- Using Syslog and Log Buffers
- SNMP Configuration Basics
Device Management & - NTP Server Setup
17
Troubleshooting Tools - Cisco Discovery Protocol (CDP) vs LLDP
- Ping, Traceroute, and Debug Commands
- Interface and Routing Debug Labs
- 802.11 Standards and Frequencies
- WLAN Components (AP, WLC, SSID)
Wireless Fundamentals & - Wireless Security (WEP, WPA, WPA2)
18
Network Architecture - Roaming and Signal Interference
- Cloud Computing and Virtualization Basics
- Controller-Based Network Architecture
- Basics of SDN and Network Controllers
- APIs and REST APIs in Networking
Network Automation & - Introduction to JSON and YANG
19
Programmability - Python Scripting in Network Tasks (concept)
- Cisco DNA Center Overview
- Real-World Use Cases
- Simulation-based CCNA Practice Test
- Hands-on Lab Exam in Packet Tracer
Final Assessment & Lab - Scenario-Based Troubleshooting
20
Practicum - Exam Tips and Time Management
- Feedback and Career Counseling
- Certification Registration Guidelines
Course Module: Linux Administration (RHCSA & RHCE)
Total Duration: 40 Hours
Sessions: 20 (2 Hours Each)
Mode: Instructor-led with Hands-on Labs (VirtualBox / RHEL / CentOS / Rocky Linux)
Course Objectives:
This module aims to:
1. Develop a strong foundation in Linux operating system administration.
2. Enable learners to perform essential system tasks like user management, disk
partitioning, and service configuration.
3. Equip participants with the skills to configure and secure Linux servers.
4. Introduce scripting and automation using Bash for RHCE-level tasks.
5. Prepare learners for the RHCSA and RHCE certification exams with lab-oriented training.
Learning Outcomes:
By the end of this course, learners will be able to:
● Install and manage Linux systems (RHEL-based distros).
● Perform administrative tasks such as user/group management, permissions, and
SELinux.
● Configure firewalls, storage, boot processes, and system services.
● Write shell scripts and automate system administration tasks.
● Manage networking and troubleshoot Linux system issues.
● Demonstrate RHCSA and RHCE-level readiness through hands-on configurations.
20-Session Course Module Breakdown
Session Topic Detailed Description (Each 2 hrs)
- What is Linux? Kernel vs Shell
- RHCSA vs RHCE exam format
Introduction to Linux & Filesystem - CLI & Desktop usage
1
Structure - Filesystem tree (/, /etc, /var, /home, /usr)
- Basic commands: pwd, ls, cd, man
- User & root privileges
- System requirements
- Installation via ISO/bootable USB
- Graphical vs Text-based install
2 Installation of Linux (RHEL/CentOS)
- Partitioning (LVM, standard)
- Setting hostname and time
- Post-install initial setup
- Adding/modifying/deleting users
- passwd, /etc/passwd, /etc/shadow
- Managing groups and group permissions
3 User and Group Management
- usermod, groupadd, gpasswd
- Sudoers file and admin roles
- Account expiration and security
4 File and Directory Permissions - File permission basics (rwx)
- Ownership using chown and chgrp
- Using chmod (symbolic & numeric)
- umask and default permissions
- Special permissions: SUID, SGID, Sticky Bit
- ACLs (Access Control Lists)
- cp, mv, rm, touch, mkdir
- File content: cat, more, less, head, tail
- Locate files using find, locate
5 File and Directory Management
- Wildcards and patterns
- du, df, stat usage
- File links: hard vs symbolic
- Understanding .rpm packages
- Installing & removing packages: yum, dnf
- Using repositories and repo config
Package Management
6 - rpm command for verification
(RPM/YUM/DNF)
- Updating systems and checking
dependencies
- Package groups
- Boot process: BIOS → GRUB → Kernel →
Init
- GRUB2 configuration
7 System Boot and Shutdown - Runlevels vs systemd targets
- Using systemctl, journalctl
- Managing startup services
- Reboot, shutdown, and logs
- Understanding processes and PIDs
- Foreground vs background jobs
- ps, top, htop, kill, nice
8 Process and Job Management
- Scheduling with cron, at, systemd timer
- Creating user-defined jobs
- Log management
- Partitioning with fdisk and parted
- File systems: ext4, xfs, btrfs
- Creating and mounting partitions
9 Disk Partitioning & File Systems
- Using mkfs, mount, umount
- Persistent mounts via /etc/fstab
- UUIDs and labels
- LVM Concepts: PV, VG, LV
10 LVM (Logical Volume Management) - Creating and resizing volumes
- Snapshots in LVM
- Mounting and persistence
- LVM troubleshooting
- Lab practice
- IP addressing and subnetting basics
- nmcli, nmtui, /etc/sysconfig files
- Setting static and dynamic IPs
11 Network Configuration
- Configuring DNS servers
- Checking connectivity: ping, netstat, ss
- Network troubleshooting
- Zones and services
- firewall-cmd usage
- Opening/closing ports
12 Firewall Management (firewalld)
- Permanent vs runtime rules
- Masquerading and port forwarding
- Troubleshooting firewall issues
- SELinux modes (enforcing, permissive,
disabled)
- Labels and contexts
13 SELinux (Security-Enhanced Linux) - getenforce, setenforce, semanage
- Troubleshooting with audit2allow
- Boolean settings
- Policy basics
- NFS configuration (server/client)
- Mounting NFS shares
- SAMBA setup for Windows sharing
14 NFS and SAMBA File Sharing
- Permissions and security
- Mounting remote shares
- Auto-mounting with autofs
- Installing Apache
- Document root and config files
- Creating virtual hosts
15 Web Server (Apache HTTPD)
- Testing access and logs
- Setting permissions for web content
- Hosting multiple sites
- Setting up vsftpd
16 FTP and SSH Services - User access and anonymous FTP
- Configuring OpenSSH
- SSH key-based authentication
- Port security and firewall setup
- Security best practices
- Writing first shell script
- Variables and operators
- Conditions (if, else, elif)
17 Bash Shell Scripting (RHCE Start)
- Loops (for, while)
- Script permissions
- Basic automation
- Using functions in scripts
- Reading input and arguments
- Error handling
18 Advanced Scripting & Automation
- Scheduled scripting with cron
- Real-world script examples
- Script debugging
- Log analysis: /var/log/
- Rescue mode and recovery
- Analyzing boot failures
19 System Troubleshooting
- Network and DNS resolution issues
- Disk space & inode issues
- Backup strategies
- RHCSA and RHCE review checklist
- Hands-on scenario-based tasks
- Live troubleshooting tasks
20 Final Review & Lab Exam
- Final quiz and wrap-up
- Career guidance
- Certification tips
Course Module: Certified Ethical Hacker (CEH)
Program: PGD in Cyber Security & IT Infrastructure
Total Duration: 40 Hours
Sessions: 20 (2 hours each)
Mode: Instructor-led + Hands-on Labs (Kali Linux, VirtualBox, CEH Tools)
Course Objectives:
This course aims to:
1. Teach participants how to legally and ethically hack systems to identify vulnerabilities.
2. Equip learners with techniques used by hackers and cybersecurity professionals to
protect data.
3. Train learners to conduct penetration testing using industry tools and methodologies.
4. Cover all CEH exam domains such as reconnaissance, scanning, enumeration,
exploitation, and post-exploitation.
5. Build readiness for EC-Council’s CEH certification with a focus on practical skill
application.
Learning Outcomes:
After completing the course, learners will be able to:
● Understand how hackers think, act, and exploit vulnerabilities.
● Perform footprinting, scanning, and enumeration using multiple tools.
● Identify and exploit weaknesses in systems, applications, and networks.
● Use Metasploit, Nmap, Wireshark, Burp Suite, and other CEH tools.
● Conduct real-world penetration testing and create structured ethical hacking reports.
● Prepare for CEH exam and demonstrate red-team readiness for job roles.
20-Session Course Module Breakdown
Session Topic Detailed Description (Each 2 hrs)
- What is ethical hacking?
- Hacker types and roles
Introduction to Ethical Hacking & CEH - Cyber kill chain overview
1
Exam - EC-Council CEH domains
- Rules of engagement & legal aspects
- Lab setup (Kali Linux/VirtualBox)
- Open-source intelligence (OSINT)
- WHOIS, Google hacking (Dorks)
Footprinting & Reconnaissance - DNS interrogation tools
2
(Passive) - Email and social media recon
- Tools: Maltego, Recon-ng
- Target profiling
- Nmap for scanning
- Port, service, OS, version detection
- Banner grabbing
3 Active Footprinting & Scanning
- Network mapping tools
- TCP/IP stack fingerprinting
- Countermeasures
- Enumerating NetBIOS, SNMP, LDAP
- SMTP, SMB, RDP, FTP enum
- Windows/Linux target enumeration
4 Enumeration Techniques
- Null sessions & SID brute force
- Tools: Enum4linux, Nmap scripts
- Mitigations
- Password cracking (John, Hydra)
- Privilege escalation methods
- Keystroke logging
5 System Hacking – Gaining Access
- Steganography and data hiding
- Tools: Mimikatz, Cain & Abel
- Exploit chaining
- Types of malware (virus, worm, RAT)
- Payload injection techniques
- Trojans and spyware analysis
6 Malware Threats & Payloads
- Lab: Building a reverse shell
- Antivirus evasion basics
- Sandbox detection
- Types of sniffing: passive/active
- MITM attacks with ARP poisoning
- Wireshark deep dive
7 Sniffing & Packet Analysis - TCPDump usage
- Countermeasures (port security,
encryption)
- DNS spoofing demo
- Psychology of social engineering
- Phishing, spear-phishing
- Baiting, tailgating, vishing
8 Social Engineering Attacks
- Email header analysis
- Tools: SET Toolkit
- Awareness training techniques
- DoS vs DDoS concepts
- Botnet architecture
- Attack tools: LOIC, HOIC
9 Denial of Service (DoS/DDoS) Attacks
- Application layer vs protocol attacks
- SYN flood, HTTP flood
- Detection and mitigation
10 Session Hijacking & Spoofing - Session hijacking techniques
- IP spoofing, ARP spoofing
- XSS session stealing
- Sidejacking with Wireshark
- Preventive measures (SSL/TLS)
- Lab exercise
- Web server vulnerabilities
- Apache/Nginx hardening tips
- Tools: Nikto, Dirb, OWASP ZAP
11 Web Server & Web App Attacks
- HTTP response manipulation
- Server misconfiguration
- Patch management
- SQL Injection explained
- Union-based, Error-based, Blind SQLi
- Tools: sqlmap, Burp Suite
12 SQL Injection & Web Exploits
- Input validation flaws
- Web application firewall (WAF) bypass
- OWASP Top 10 intro
- WLAN standards and encryption
- WPA/WPA2 cracking (Aircrack-ng)
- Evil twin, rogue APs
13 Wireless Network Hacking
- Captive portal bypass
- Tools: Reaver, Kismet
- Wireless mitigation
- Android/iOS vulnerabilities
- Reverse engineering apps
- IoT attack surface overview
14 Mobile & IoT Hacking Basics
- Bluetooth/NFC exploitation
- Tools: Drozer, MobSF
- Mobile defense mechanisms
- Intrusion Detection/Prevention Systems
- Firewall types and configurations
- Evasion techniques
15 IDS, Firewalls & Honeypots
- Honeypots and honeynets
- Log analysis for attackers
- Snort/Suricata overview
- Cloud computing vulnerabilities
16 Cloud & Web Service Attacks - Exploiting misconfigured S3 buckets
- API fuzzing & abuse
- Container security (Docker/K8s)
- Serverless attack vectors
- Cloud security best practices
- Cryptographic algorithms (AES, RSA,
MD5)
- Hash cracking tools: Hashcat, John
17 Cryptography & Encryption Attacks - SSL/TLS attacks
- PKI & certificate misuse
- Password storage flaws
- VPN encryption concepts
- Phases: Recon → Exploitation →
Reporting
- Scoping and rules of engagement
18 Penetration Testing Process - Vulnerability scanning with Nessus
- Manual exploitation workflow
- Writing executive reports
- Tools and checklists
- Simulated attack on test network
- Multi-layered hacking challenge
- Real-world problem-solving
19 Ethical Hacking Lab Practicum
- Documentation of findings
- Group-based red team exercise
- Defending & reporting
- CEH exam domains recap
- Sample MCQs and practice test
- Tips to avoid traps in exams
20 Final Assessment & CEH Exam Prep
- Practical knowledge quiz
- Mock interview Q&A
- Certification guidance
Course Module: AWS Solutions Architect – Associate
Program: PGD in Cyber Security & IT Infrastructure
Total Duration: 40 Hours
Sessions: 20 (2 hours each)
Mode: Instructor-led + Hands-on Labs (AWS Free Tier, Management Console, AWS CLI)
Course Objectives: The objective of this course is to:
1. Introduce AWS cloud concepts and core services for building secure and scalable
systems.
2. Enable learners to design, deploy, and manage infrastructure on AWS.
3. Provide hands-on exposure to computing, storage, networking, and security solutions
using AWS services.
4. Prepare participants to appear for the AWS Certified Solutions Architect – Associate
(SAA-C03) exam.
5. Integrate cloud architecture best practices for fault tolerance, cost optimization, and
high availability.
Learning Outcomes: After completing this course, participants will be able to:
● Understand the global infrastructure and core components of AWS.
● Deploy applications and services using EC2, S3, RDS, Lambda, and VPC.
● Design scalable architectures using Elastic Load Balancing and Auto Scaling.
● Secure AWS environments using IAM, Security Groups, and KMS.
● Implement monitoring, logging, and disaster recovery solutions.
● Align design principles with AWS Well-Architected Framework and pass the SAA
certification exam.
20-Session Course Module Breakdown
Session Topic Detailed Description (Each 2 hrs)
- What is Cloud Computing?
- AWS Global Infrastructure
- Cloud deployment models
1 Introduction to Cloud & AWS
- AWS Free Tier setup
- Overview of AWS Console
- Shared Responsibility Model
- Users, groups, roles, policies
- IAM permissions and best practices
- MFA setup
2 Identity and Access Management (IAM)
- Policy structure (JSON)
- IAM Lab: create secure users
- IAM use cases
- Launching and configuring EC2
3 Elastic Compute Cloud (EC2) - EC2 instance types and pricing
- AMIs and Key Pairs
- User data and EC2 metadata
- SSH access and security groups
- EC2 monitoring
- EBS volume types
- EBS Snapshots and encryption
- Instance Store vs EBS
4 EC2 Storage and EBS Volumes
- Elastic File System (EFS)
- Mounting EFS on Linux
- Backup strategies
- Load balancer types: ALB, NLB
- Auto Scaling Groups (ASG)
- Launch configurations and templates
5 Elastic Load Balancing & Auto Scaling
- Scaling policies and lifecycle hooks
- High availability setup
- Demo lab
- S3 basics and storage classes
- Bucket policies and access control
- Lifecycle management
6 Amazon S3 and Object Storage
- Static website hosting
- Versioning and replication
- Pre-signed URLs
- Purpose of CDN
- CloudFront origin & distributions
- Caching, TTL, invalidation
7 Amazon CloudFront & CDN
- Securing CloudFront with signed URLs
- WAF and edge locations
- Use case demo
- Domain registration and DNS basics
- Routing policies (simple, failover,
latency)
8 Amazon Route 53 (DNS) - Health checks and records
- Routing demo with S3/EC2
- Hosted zones
- DNS troubleshooting
- RDS engine overview (MySQL,
PostgreSQL, etc.)
9 Databases on AWS: RDS & Aurora - DB snapshots, backups, Multi-AZ
- Performance insights
- Amazon Aurora vs RDS
- Connecting EC2 to RDS
- Lab practice
- DynamoDB architecture
- Tables, items, attributes
- Partition keys, secondary indexes
10 NoSQL with Amazon DynamoDB
- On-demand vs provisioned
- TTL, Streams, DAX
- Hands-on table creation
- What is Serverless?
- Lambda functions setup
- Trigger sources (S3, API Gateway)
11 Serverless Computing with AWS Lambda
- Environment variables and logging
- IAM permissions for Lambda
- Monitoring with CloudWatch
- What is VPC and its components
- Subnets (public/private)
- Route tables and gateways
12 VPC and Networking
- NAT, NACLs, and security groups
- Lab: create custom VPC
- VPC peering
- CloudWatch metrics and alarms
- Custom metrics and dashboards
Monitoring with CloudWatch & - CloudWatch Logs and Insights
13
CloudTrail - CloudTrail for API auditing
- SNS integration
- Alerting best practices
- S3 Glacier for archiving
- Retrieval policies and costs
AWS Storage Services (S3 Glacier, Storage - AWS Storage Gateway (file, tape)
14
Gateway) - Hybrid storage overview
- Data migration strategies
- Storage comparison
- Backup & restore strategies
- Multi-AZ vs Multi-Region
- RTO vs RPO
15 Disaster Recovery and High Availability
- Warm standby and pilot light
- Route 53 failover
- DR architecture use case
- SQS (queueing system)
- SNS (notification system)
- EventBridge
16 Application Integration Services
- Step Functions intro
- Decoupling microservices
- Use case lab
- IAM policies and least privilege
- KMS and encryption
- AWS Config
17 Security Best Practices on AWS
- Security groups vs NACLs
- AWS Inspector and GuardDuty
- Compliance on AWS
- Pricing calculator usage
- Free tier monitoring
- Consolidated billing and budgets
18 AWS Cost Management & Billing
- Cost Explorer analysis
- Saving plans and Reserved Instances
- Billing alerts
- Real-world architecture patterns
- High availability & fault tolerance
- Performance tuning tips
19 Architecting on AWS – Case Studies
- Decoupled architectures
- Cost optimization strategies
- Whitepaper highlights
- AWS exam blueprint & strategy
- Sample questions & explanations
Final Review & AWS SAA Exam - Recap of key services
20
Preparation - Practice exam discussion
- Certification registration guidance
- Career next steps
Course Module: Penetration Testing
Program: PGD in Cyber Security & IT Infrastructure
Total Duration: 30 Hours
Sessions: 15 (2 hours each)
Mode: Instructor-led + Lab-Based (Kali Linux, Metasploit, Burp Suite, etc.)
Course Objectives:
This course aims to:
1. Introduce the methodology and tools of professional penetration testers.
2. Train learners to perform structured security assessments on systems, networks, and
applications.
3. Equip participants with skills in vulnerability exploitation, privilege escalation, and
post-exploitation.
4. Develop skills in documenting findings and presenting penetration testing reports.
5. Align learners with industry practices followed in OSCP, CREST, or Offensive Security
frameworks.
Learning Outcomes:
Upon completion, participants will be able to:
● Plan and conduct penetration testing engagements professionally.
● Perform reconnaissance, scanning, exploitation, and privilege escalation.
● Utilize advanced tools like Metasploit, Nmap, and Burp Suite for real-world scenarios.
● Analyze vulnerabilities and validate them through exploitation.
● Document findings in detailed penetration test reports with remediation advice.
● Prepare for advanced red-team roles and certifications like OSCP (Offensive Security
Certified Professional).
15-Session Course Module Breakdown
Session Topic Detailed Description (Each 2 hrs)
- What is Penetration Testing
- Legal considerations & scope
- Pentesting vs Vulnerability Assessment
1 Introduction to Penetration Testing
- Engagement rules & documentation
- Lab environment setup
- Phases of penetration testing
- Passive & active recon
- WHOIS, Shodan, Google Dorks
- Email harvesting, metadata extraction
2 Reconnaissance & OSINT
- DNS enumeration
- Subdomain discovery
- Tools: Maltego, Recon-ng
- Network scanning with Nmap
- Port/service/version detection
- OS fingerprinting
3 Scanning & Target Enumeration
- Banner grabbing
- SNMP, SMB enumeration
- Using Nmap NSE scripts
- CVE, CVSS, and vulnerability databases
- Nessus/Nikto/OpenVAS usage
- Manual fingerprinting techniques
4 Vulnerability Identification
- Enumerating known flaws
- Web app scanning (OWASP ZAP)
- Report prioritization
- Manual vs automated exploitation
- Exploiting known CVEs
- Buffer overflows intro
5 Exploitation Fundamentals
- Reverse/bind shell basics
- Metasploit exploitation modules
- Testing against Windows/Linux
- Maintaining access
- Extracting credentials (Mimikatz)
- Escalating privileges (Linux & Windows)
6 Post-Exploitation Techniques
- File system exploration
- Pivoting and lateral movement
- Persistence mechanisms
- Cracking techniques overview
- Brute force vs dictionary attacks
- Tools: John the Ripper, Hydra, Medusa
7 Password Attacks
- Hash types and cracking
- Rainbow tables
- SSH/RDP brute force
- OWASP Top 10 overview
- Input validation flaws
- XSS, CSRF, IDOR
8 Web Application Testing – Part 1
- Directory traversal
- Manual testing in Burp Suite
- Fuzzing and automation
- SQL Injection deep dive
9 Web Application Testing – Part 2 - Error-based, Blind, Union-based
- SSRF, Command Injection
- File Upload & Path Traversal
- Authentication bypass
- Web shell deployment
- WLAN architecture & vulnerabilities
- WPA/WPA2 cracking (Aircrack-ng)
- Rogue AP and Evil Twin attacks
10 Wireless Network Penetration
- WiFi password capture & replay
- Deauthentication attacks
- Lab demo
- Phishing campaigns
- Payload delivery through email
- Malicious document crafting
11 Social Engineering in Pentesting
- USB drop attacks
- SET toolkit usage
- Risk mitigation strategies
- Testing AWS/Azure environments
- Access key enumeration
Cloud & Virtual Environment - IAM privilege escalation
12
Testing - S3 bucket exploitation
- Docker/Kubernetes vulnerability basics
- Caution & legality
- Antivirus/EDR evasion
- Payload obfuscation
- Living off the land binaries (LOLBins)
13 Bypassing Security Controls
- Firewall rule bypass
- Encoded payloads
- Endpoint protection testing
- Structuring pentest reports
- Risk-based vulnerability rating
- Executive vs technical summaries
14 Report Writing & Documentation
- Proof of Concept (PoC) inclusion
- Remediation recommendations
- Report walkthrough
- Simulated pentest on lab network
15 Final Lab Exam & Debrief - Recon → Exploit → Document flow
- Group/team-based challenge
- Manual and automated tasks mix
- Oral debriefing session
- Career & OSCP advice
Course Module: Digital Forensics & Investigation
Program: PGD in Cyber Security & IT Infrastructure
Total Duration: 30 Hours
Sessions: 15 (2 hours each)
Mode: Instructor-led + Lab-Based (FTK Imager, Autopsy, EnCase, Kali Forensics Tools)
Course Objectives:
This course aims to:
1. Introduce the principles, methodologies, and laws of digital forensics.
2. Train learners to acquire, preserve, and analyze digital evidence from various devices.
3. Develop skills in using industry-standard forensic tools and lab setups.
4. Teach investigation techniques for computer systems, networks, mobile devices, and
cloud environments.
5. Prepare participants for roles in cybercrime investigation, incident response, and law
enforcement support.
Learning Outcomes:
Upon completion, participants will be able to:
●Understand the digital forensics process and legal frameworks.
● Acquire, preserve, and authenticate digital evidence.
● Analyze operating systems, file systems, network logs, and application artifacts.
● Recover deleted or hidden files and trace cyberattacks.
● Document forensic findings and present them for legal proceedings.
● Utilize forensic tools like FTK Imager, Autopsy, Wireshark, and Volatility effectively.
15-Session Course Module Breakdown
Session Topic Detailed Description (Each 2 hrs)
- What is Digital Forensics
- History and evolution
- Branches: Computer, Mobile, Network,
1 Introduction to Digital Forensics Cloud
- Role in cybersecurity & law enforcement
- Incident response integration
- Forensics lab setup
- Cyber laws & compliance (local & global)
- Chain of custody
- Admissibility of evidence in court
2 Legal & Ethical Aspects
- Search & seizure procedures
- Privacy considerations
- Documentation standards
- Identification of evidence
- Preservation techniques
- Analysis methodologies
3 Digital Forensics Process
- Reporting process
- Live vs dead acquisition
- Forensics case workflow
- Hardware requirements
- Write blockers
- Imaging devices
4 Forensic Lab & Tools
- Forensic software overview
- Installing FTK Imager, Autopsy
- Virtual lab setup
- Disk imaging types (bit-stream, logical)
- Using FTK Imager for acquisition
- Verifying evidence integrity (MD5, SHA)
5 Evidence Acquisition Techniques
- Collecting volatile memory
- Physical vs logical acquisition
- Cloud evidence collection basics
- Windows file systems (NTFS, FAT)
- Registry analysis
- Prefetch files and log files
6 Windows Forensics
- Event viewer logs
- User activity tracking
- Recovering deleted files
- Ext4, HFS+ file systems
- Shell history and logs
- User authentication records
7 Linux & Mac Forensics
- System service logs
- File permission analysis
- Bash command tracing
File System Analysis & Data - File carving basics
8 - Recovering deleted partitions
Recovery
- Hidden and encrypted files
- Using Autopsy for file recovery
- Metadata analysis
- Steganography detection
- Email header analysis
- Recovering deleted emails
- PST/OST analysis
9 Email & Browser Forensics
- Browser history and cache
- Cookie and session recovery
- Tracking phishing campaigns
- Android/iOS architecture
- Logical vs physical acquisition
- Mobile forensic tools (Cellebrite, Oxygen)
10 Mobile Device Forensics
- Call/SMS/app data recovery
- Geo-location tracking
- Security challenges
- Capturing packets with Wireshark
- Analyzing PCAP files
- Detecting anomalies and intrusions
11 Network Forensics
- Log analysis (firewall, IDS)
- Tracing attacker IPs
- Case study lab
- Importance of volatile data
- RAM acquisition tools
- Using Volatility Framework
12 Memory Forensics
- Extracting running processes
- Detecting malware in memory
- Advanced analysis plugins
- Cloud computing challenges
- Collecting AWS/Azure logs
- Legal limitations
13 Cloud Forensics
- Multi-tenancy considerations
- Evidence correlation
- Incident response in the cloud
- Structure of forensic reports
14 Reporting & Court Presentation - Executive summary vs technical detail
- Including screenshots & hashes
- Expert witness role
- Presentation tips for legal cases
- Mock trial simulation
- End-to-end investigation case study
- Evidence acquisition to reporting
- Live lab attack simulation
15 Final Investigation Project
- Group-based forensic analysis
- Submission of final forensic report
- Feedback & career advice
Course Module: Certified Information Systems Auditor (CISA)
Program: PGD in Cyber Security & IT Infrastructure
Total Duration: 40 Hours
Sessions: 20 (2 hours each)
Mode: Instructor-led + Case Studies + Practice Exams
Course Objectives:
This course aims to:
1. Equip learners with knowledge and skills in IT audit, control, and assurance processes.
2. Cover the five domains of the ISACA CISA exam in detail.
3. Train participants to plan, execute, and report on audits in alignment with industry
standards.
4. Provide hands-on exposure to IT governance, risk management, and security assessment
tools.
5. Prepare learners for the CISA global certification exam.
Learning Outcomes:
Upon completion, participants will be able to:
● Conduct IS audit engagements following ISACA standards.
● Assess IT governance structures and compliance frameworks.
● Evaluate system development and implementation controls.
● Analyze operational processes, data integrity, and security measures.
● Manage audit risks and communicate findings effectively.
● Pass the ISACA CISA certification exam with confidence.
20-Session Course Module Breakdown
Session Topic Detailed Description (Each 2 hrs)
- CISA certification structure
- ISACA Code of Ethics
- Role of an IS Auditor
1 CISA Introduction & ISACA Overview
- Audit standards & guidelines
- Overview of CISA 5 domains
- Exam structure & scoring
- IT audit objectives
- Risk-based audit planning
- Audit charter & scope definition
2 IS Audit Process – Fundamentals
- Audit evidence types
- Audit methodologies
- Audit sampling techniques
- Planning steps
- Resource allocation
- Control objectives
3 Audit Planning & Execution
- Audit testing approaches
- Interviewing and observation
- Documentation best practices
4 Risk Assessment & Control Frameworks - Risk management basics
- COBIT framework
- COSO internal controls
- NIST & ISO standards
- Control maturity models
- Risk mitigation strategies
5 Governance & Management of IT - IT governance principles
- Strategic alignment with business
- Policies and procedures
- Performance measurement (KPIs)
- Resource management
- Accountability structures
6 Information Systems Acquisition & - SDLC phases
Development - Agile and DevOps implications
- Project governance
- Change management
- Functional & security requirements
- Testing methodologies
7 IS Implementation & Maintenance - Configuration management
- Release & patch management
- System migration controls
- Post-implementation reviews
- Version control systems
- Maintenance risks
8 Business Process Evaluation - Process mapping
- Internal control integration
- Identifying process inefficiencies
- Transaction processing controls
- Input/output/processing validation
- Fraud detection techniques
9 Protection of Information Assets – - Information security objectives
Fundamentals - Confidentiality, integrity, availability
- Security policies & procedures
- Data classification & handling
- Physical security
- Environmental controls
10 Logical & Network Security - Authentication & authorization
- Access control models
- Network security devices
- Firewalls, IDS/IPS
- Wireless security
- Logging & monitoring
11 Cryptography in Audit Context - Encryption basics
- Symmetric & asymmetric algorithms
- Hashing & digital signatures
- PKI structure
- Key management
- Audit considerations in cryptography
12 IT Operations & Maintenance Audit - Service desk controls
- Job scheduling & backups
- Capacity & performance monitoring
- Outsourcing & vendor management
- SLAs
- Problem & change management
13 Disaster Recovery & Business Continuity - DRP vs BCP concepts
- RPO & RTO objectives
- BCP lifecycle
- Backup strategies
- Failover systems
- Testing BCP/DRP plans
14 Evidence Gathering & Analysis - Types of audit evidence
- Tools for evidence collection
- Digital forensic techniques
- Sampling & extrapolation
- Maintaining chain of custody
- Documentation standards
15 Communicating Audit Findings - Audit reporting structures
- Writing executive summaries
- Technical detail presentation
- Risk prioritization
- Recommendations format
- Follow-up audits
16 IT Compliance Auditing - Regulatory requirements overview
- GDPR, HIPAA, SOX
- Data protection acts
- Industry-specific standards
- Penalty implications
- Compliance testing
17 Case Studies in IT Audit - Real-world audit scenarios
- Reviewing failed audits
- Lessons learned
- Sector-specific audits
- Role of continuous auditing
- Interactive group exercise
18 Mock Audit Simulation - Scope definition
- Audit execution in teams
- Evidence collection
- Issue identification
- Reporting session
- Peer review feedback
19 CISA Exam Preparation - Domain-wise revision
- Practice MCQs
- Exam strategy tips
- Time management
- Common pitfalls
- ISACA study resources
20 Final Assessment & Career Guidance - Final CISA mock exam
- Review of answers
- Discussion on career opportunities
- Professional networking with ISACA
chapters
- Certification registration process
- Continuing education requirements
Course Module: Network & Software Security with Incident Response
Program: PGD in Cyber Security & IT Infrastructure
Total Duration: 40 Hours
Sessions: 20 (2 hours each)
Mode: Instructor-led + Hands-on Labs + Case Studies
Course Objectives:
This course aims to:
1. Equip learners with skills to secure networks, applications, and software against cyber
threats.
2. Develop an understanding of modern attack vectors targeting networks and
applications.
3. Train participants to design, implement, and monitor network and software security
controls.
4. Teach structured Incident Response (IR) processes for detecting, containing, eradicating,
and recovering from security incidents.
5. Prepare learners for real-world Security Operations Center (SOC) and Incident Handling
roles.
Learning Outcomes:
Upon completion, participants will be able to:
●
Identify vulnerabilities in network and software systems.
● Configure network security devices (firewalls, IDS/IPS, VPNs).
● Apply secure coding and software development practices.
● Detect and respond to network intrusions and malware infections.
● Conduct post-incident forensics and root cause analysis.
● Follow NIST, ISO, and SANS Incident Handling frameworks for professional incident
response.
20-Session Course Module Breakdown
Session Topic Detailed Description (Each 2 hrs)
- Network security principles
- CIA triad (Confidentiality, Integrity,
Availability)
Introduction to Network & Software
1 - Software security challenges
Security
- Threat landscape overview
- IR process introduction
- Lab setup
- DoS/DDoS attacks
- MITM attacks
- DNS spoofing
2 Network Threats & Attack Vectors
- ARP poisoning
- Insider threats
- Case studies
- Defense-in-depth approach
- Segmentation & isolation
- Zero Trust model
3 Network Security Architecture
- Network design best practices
- VLAN security
- Redundancy for resilience
- Types of firewalls
- Stateful vs stateless filtering
- IDS vs IPS differences
4 Firewalls & IDS/IPS Configuration
- Snort/Suricata setup
- Rule creation & tuning
- Logging & alerting
- VPN types (IPSec, SSL)
- Site-to-site vs remote access
- Encryption standards
5 VPNs & Secure Remote Access
- MFA integration
- OpenVPN setup lab
- VPN performance considerations
- Network telemetry
- Flow-based monitoring
- Syslog servers
6 Network Monitoring & Logging
- SIEM integration (Splunk/ELK)
- Log retention policies
- Real-time alerting
7 Software Security Fundamentals - Secure SDLC concepts
- OWASP Top 10 overview
- Threat modeling
- Static vs dynamic code analysis
- Secure code review basics
- DevSecOps introduction
- MFA & SSO implementations
- Role-based access control (RBAC)
- Attribute-based access control (ABAC)
8 Authentication & Access Control
- Password security policies
- OAuth 2.0 & OpenID Connect
- Access provisioning/deprovisioning
- SAST tools (SonarQube)
- DAST tools (OWASP ZAP, Burp Suite)
- Penetration testing for apps
9 Application Security Testing
- CI/CD pipeline security
- Vulnerability reporting
- Security patching
- Types of malware
- Indicators of compromise (IOCs)
Malware Analysis & Reverse - Static vs dynamic malware analysis
10
Engineering Basics - Sandboxing techniques
- Reverse engineering intro
- Tools: IDA, Ghidra
- NIST/SANS IR lifecycle
- IR team roles
- Incident categorization
11 Introduction to Incident Response
- IR policy & playbooks
- Incident tracking systems
- Communication protocols
- Log correlation
- Anomaly detection
- Signature-based detection
12 Incident Detection & Analysis
- Behavioral analytics
- Threat intelligence integration
- Lab: detect simulated attack
- Short-term vs long-term containment
13 Containment Strategies - Network isolation techniques
- Quarantining infected systems
- Account lockdown procedures
- Communication during containment
- Decision-making under pressure
- Malware removal
- Patch deployment
- System restoration
14 Eradication & Recovery
- Rebuilding from backups
- Verification of clean state
- Monitoring after recovery
- Evidence acquisition
- Chain of custody
- Forensic imaging
15 Digital Forensics in IR
- Memory dump analysis
- File recovery
- Reporting evidence findings
- Ransomware kill chain
- Detection and response workflows
- Decryption tools & limitations
16 Ransomware Incident Handling
- Negotiation and legal considerations
- Backup recovery strategy
- Case study analysis
- Cloud-specific threats
- AWS/Azure/GCP IR procedures
- Logging and monitoring in the cloud
17 Cloud Security & Incident Response
- Cloud forensic challenges
- Multi-tenant environment security
- Shared responsibility in IR
- Root cause analysis
- Lessons learned meetings
Post-Incident Analysis & Lessons - Process improvement
18
Learned - Updating IR plans
- Policy adjustments
- Staff retraining
- SOC roles and tiers
- Daily SOC operations
Security Operations Center (SOC) - Incident escalation process
19
Practices - SIEM dashboards
- Threat hunting
- Continuous monitoring
- Full-scale incident simulation
- Real-time response execution
- Forensic evidence gathering
20 Final Simulation & IR Plan Presentation
- Containment & eradication
- Presentation of IR plan
- Feedback & career guidance