top of page
To Top

THE B.TECH IN CYBER DEFENSE COURSE

4.9 Rating

Course Subjects

IT Landscape & Cybersecurity Fundamentals

Operating System Security

Networking (from the security perspective)

Network Defense

Network Analysis

Endpoint Security & Advanced Persistent Threats

Compliance & Data Protection

Social Engineering & Physical Security

Network & System VAPT

Web Application Security

Post Exploitation & Advanced Technology

Incident Response & Redressal

Threat Analysis

Advanced Security Operations

OT Security

Cloud Security

Badge - B.Tech in Cyberdefense Course

About the course

Crafted to address the growing need for adept professionals in the dynamic digital realm, CyberDojo's 4-year undergraduate program empowers students with profound knowledge and hands-on skills crucial for securing networks and critical infrastructures. Our curriculum delves into cutting-edge cybersecurity technologies such as Cryptography, Cloud Security, IoT, and Ad hoc Networks Security, ensuring graduates emerge as industry-ready Cyber Security engineers. Enroll with us to contribute to closing the cybersecurity talent gap and step into the role of a guardian in the digital landscape.

9.png

Course Details

Total Course Duration                    640 Hours

Course Lab Hours                            240 Hours

Course Modules                               8 Modules

Total Course Subjects                    16 Subjects

Internship (6 Month), Placement & Project Support

2 Month Industry Exposure Programs Included

On Premise Labs Delivery

Access To Specially Curated Study Notes

Course Curriculum

Module 1

1. Cyber Space Concepts

2. Cybercrime & Tools Used in Cybercrime

3. Network Security, Mobile & Wireless Devices

4. All about Operating Systems

5. Data Communication & Network Protocols

Module 2

1. Network Layer & Security

2. Introduction to Cryptography & Classical Encryption Techniques

3. Introduction to Windows Operating System Security

4. Cyber Defense Tools

Module 3

1. Incident Response & Forensic Analysis

2. Preparation & Identification

3. Investigation Processes & Procedures of  Security Incidents

4. Incident Recovery & Redressal

Module 4

1. Introduction to Penetration Testing

2. Basic Penetration Techniques

3. Pre & Post Penetration Testing Procedures

Module 5

1. Introduction to Web Protocols

2. Web Application Architecture

3. Types of Web Application Threats

4. Authentication & Authorization in Web Apps

5. Web Services & Front end Security

Module 6

1. Introduction to Red Team Kill Chain & Planning

2. Advanced Red Teaming & MITRE Att&ck Framework

3. Blue Team Tools & Operations

4. Understanding Endpoints, Logs & files

5. Triage Analysis & MITRE Defense Framework

Module 7

1. Fundamentals of Cloud Security Concepts

2. Cloud Architecture Models & Infrastructure

3. Access Control & Identity Management 

4. Cloud Security Monitoring, Auditing & Management

Module 8

1. Effective Technical Communication

2. Technical Documentation

3. Technical Reporting & Presentations

4. Drafting Technical Proposals 

bottom of page