PG Diploma in Cyber Security

Master core cybersecurity concepts with our AICTE-certified diploma, tailored for aspiring professionals. Learn practical skills, receive expert guidance, and connect with top companies for job placement opportunities.

Type

Diploma

Start Date

10th Jan 2025

Duration

12 months

Key Highlights

Program Benefits

Who is this Program for?

This Cyber Security Diploma is designed for students and working professionals interested in gaining in-demand skills. Whether you're pursuing a career in IT security or seeking to upskill in a critical area, this course offers comprehensive training for both beginners and those with some technical background.

Minimum Eligibility

Earn Valuable Certification & Recognition

  • National Recognition: AICTE (All India Council for Technical Education) approval ensures the program meets high academic and technical standards, making the certificate respected across India.
  • Global Relevance: With cybersecurity being a global priority, an AICTE-approved certification is recognized internationally, giving you a competitive edge in global job markets.
  • Industry Credibility: The collaboration with LA Bootcamps and St. Xavier’s Technical Institute combines decades of IT expertise with academic excellence, making this certificate highly trusted by top companies and recruiters.
  • Placement Opportunities: This certification is backed by strong industry connections, enhancing your chances of securing job placements with leading organizations in cybersecurity and related fields.

University partner - St. Xavier’s Technical Institute

St. Xavier’s Technical Institute (X-TECH) is one of 130 Universities / Colleges in the world and one of 84 Colleges in India that is managed by the Jesuit Order. The most popular Jesuit Institutions in India are XLRI, Jamshedpur, Loyola College, Chennai, St. Joseph’s College, Bangalore, St. Xavier University, Kolkatta, and Xavier University, Bhubaneshwar. It started off in the early 1930s on the premises of St Xavier’s College, Mumbai, Fort, and when it soon began to burgeon it also demanded larger premises, and these were found in Mahim.

Why us vs Others?

Syllabus Overview

post-graduate diploma in cyber security - 1 Year
Domain-I - Networking
  • Networking topology
  • Network devices
  • Cisco router functions
  • Subnetting
  • VLAN
  • Inter-VLAN
  • Configuration of NAT
Tools
  • Cisco Packet tracer
  • Pnet Labs
  • Juniper Switch
  • Juniper router
OEM
  • Juniper
Domain-II - Managing Servers
  • Linux User and Groups
  • Directory Permission
  • Disk partition
  • Linux Boot Control
  • LVM Server
  • Rsyslog Server
  • DHCP
  • DNS server in Linux and Windows Domain
  • Active Directory management
Tools
  • Linux Server
  • Windows Server
Domain-III - Vulnerabilities and Cyber Threats
  • Information and its types
  • Types of Cyber-threats
  • Red team strategy
  • Enumeration
  • DOS attack
  • Session Stealing
  • Wireless Hacking
  • OWASP top 10 threats
Tools
  • Kali Linux
  • Hping
  • Wireshark
  • Wifite/Wifi Pineapple
Domain-IV - Network Perimeter Protection
  • Firewall and its types
  • Working with Pfsense firewall
  • Creation of Rules and policy
  • VPN and IPSEC configuration in Pfsense
Tools
  • Firewall
OEM
  • Fortinet
Domain-V - Fortinet Firewall - Fortigate
  • Fortigate console
  • IP configuraton on Fortigate firewall
  • Application Control
  • Logs monitoring
  • Active directory integration in fortigate
  • SDWAN with IPSEC configuration
Tools
  • Firewall
  • SD WAN
  • Ipsec
OEM
  • Fortinet
  • Sophos
  • Networking Concepts Overview
  • Information Security Concepts
  • Security, Threats & Vulnerabilities
  • Cryptography
  • Internet & Web Application Security
  • Wireless Network Security
  • Security Management
  • Projects, Assignments & Presentations
  • Access Control and Intrusion Detection
  • Server Management and Firewalls
  • Security for VPN & Next Generation Firewalls
  • Security Architecture and Models
  • System Security
  • OS Security
  • Projects, Assignments & Presentations

Diploma - Brochure

Domain-I - Networking
  • Networking topology
  • What is Network?
  • The different types of network topology
  • Type 1: Ring topology
  • Type 2: Star topology
  • Type 3: Mesh topology
  • Network devices
  • Hub device features
  • Layer 2 switch rules
  • Layer 3 switch configuration
  • Router and its table
  • Inter-VLAN
  • What is Inter-VLAN
  • Configuration of Inter-VLAN
  • Vlan Vs. Inter-VLAN
  • Inter-VLAN troubleshooting commands
  • Configuration of NAT
  • Private IP and Public IP
  • NAT types
  • NAT configuration
Domain-III - Vulnerabilities and Cyber Threats
  • Information and its types
  • What is sensitive and critical information in business?
  • Types of information
  • CIA triad
  • Types of Cyber threats
  • Information gathering
  • Scanning
  • System control
  • Red team strategy
  • Seven steps methodology of Red team
  • Tools and techniques
  • Gaining access using password cracking technique
  • Enumeration
  • What is enumeration process?
  • Gathering deep information of a system
  • Enumeration tools
  • DOS attack
  • Single point of failure
Domain-VI - Endpoint Security
  • Endpoint types and its features
  • What is end proctection?
  • Types of end user solutions
  • Malware proctection for end devices
  • Email Security
  • Http vs. Https
  • DKIM protection
  • Mail header
  • Disk Encryption
  • What is encryption?
  • Bit locker encryption process
  • Endpoint Detection and Response
  • EDR vs. EPP?
  • Detection methodology of EDR
  • EDR agents features
Domain-VII - Logs Management
  • Overview on Logs
  • Recorded activity and its importance
  • Different types of logs and its format
Domain-VIII - Network Packet Analysis
  • Network packets and its types
  • Learning on TCP and UDP packets
  • TCP packets header vs. UDP packet headers
  • Deep Network Packet methodology
  • Wireshark filters
  • Live capturing of network packets
  • Malware detection
  • Network Packets encapsulation
  • Find malware packets in the crowd
  • Web application firewall
  • Web application proctection
  • Configuration and rule setup of WAF
  • Incident Management
  • What is Incident management and its team role
  • Incident management procedures

Enquire Now

Fill out your basic details and we will get in touch with you!

Technologies & Tools Covered

Placement Partners

Testimonials

Frequently Asked Question

What courses in Cyber Security does LA Bootcamps offer?

We offer an AICTE-certified Diploma, a Postgraduate Diploma, and a short four-month Certificate program in Cyber Security, designed for students and professionals looking to build or advance their careers in this domain.

Our courses are ideal for 3rd and 4th-year engineering students, recent graduates, and working professionals who aspire to build expertise in Cyber Security and secure top jobs in the field.

Our courses are conducted online & offline, providing flexibility to students while maintaining high-quality instruction and engagement.

Yes! Our programs include Live/Shadow projects to ensure practical learning and application of concepts.

Yes, our programs are AICTE-certified, which ensures recognition across industries and enhances your career prospects.

Absolutely! We have partnerships with many companies in the IT industry and offer placement support to help our students secure rewarding roles