Logo

Honors in Cybersecurity

Cybersecurity

Enquire now: 9480223900

  •   5 Reviews

Application closes in : 30-Apr-2024 Seats filling fast

18 Credits
270 Hours

why choose Cybersecurity?

Accelerate your career with an Honors Degree

Online / 18 credits / Self-paced learning

Criteria

What will you learn from the program?

Total credits earned : 18 credits, 270 hours of learning

Gain skills for incident responses and forensics with real-world cybersecurity case studies.

Platform and tools to learn - Python, Linux, SQL, Security Information and Event Management (SIEM) tools, Intrusion Detection Systems (IDS), Wireshark, IBM QRadar, IBM MaaS360, IBM Guardium,

Key Learnings: Security, Linux, Cryptography, Network Security, Computer Security Incident Management, Cyberattacks and more

Immerse in project-based learning through Capstone projects

Access to career resources - resume review, interview prep, career support on pathway completion

Curriculum

The courses provide a comprehensive understanding of cybersecurity, focusing on basic cybersecurity concepts, network security, database vulnerabilities, penetration testing, incident response, and the Python programming language's role in automating tasks in cybersecurity. They cover key areas like network defensive tactics, security frameworks, controls, incident detection, response, and the use of Python in a cybersecurity setting. The courses also emphasize the importance of critical thinking and effective communication in managing cybersecurity threats. They are designed to equip learners with the skills necessary for entry-level cybersecurity roles such as a Junior Cybersecurity Analyst. The completion of these courses makes learners eligible to earn various IBM and Google digital badges that validate their cybersecurity knowledge and skills.

Cybersecurity

Introduction to Cybersecurity Tools & Cyber Attacks
  • This course gives you the background needed to understand basic Cybersecurity. You will learn the history of Cybersecurity, types and motives of cyber attacks to further your knowledge of current threats to organizations and individuals. Key terminology, basic system concepts and tools will be examined as an introduction to the Cybersecurity field. You will learn about critical thinking and its importance to anyone looking to pursue a career in Cybersec
Cybersecurity Roles, Processes & Operating System Security
  • This course gives you the background needed to understand basic cybersecurity around people. process and technology. You will understand the key cybersecurity roles within an organization; list key cybersecurity processes and an example of each process; describe the architecture, file systems, and basic commands for multiple operating systems including Windows, Mac/OS, Linux, and Mobile; and also understand the concept of virtualization as it relates to cybersecurity.
Cybersecurity Compliance Framework & System Administration
  • This course gives you the background needed to understand the key cybersecurity compliance and industry standards. This knowledge will be important for you to learn no matter what cybersecurity role you would like to acquire or have within an organization. You will learn the basic commands for user and server administration as it relates to security. You will need this skill to be able to understand vulnerabilities within your organizations operating systems.
Network Security & Database Vulnerabilities
  • This course gives you the background needed to understand basic network security. You will learn the about Local Area Networks, TCP/IP, the OSI Framework and routing basics. You will learn how networking affects security systems within an organization. You will learn the network components that guard an organization from cybersecurity attacks. In addition to networking, you will learn about database vulnerabilities and the tools/knowledge needed to research a database vulnerability for a variety of databases including SQL Injection, Oracle, Mongo and Couch.
Generative AI: Boost Your Cybersecurity Career
  • This short course provides cybersecurity professionals and enthusiasts with the latest Generative AI tools to address complex cybersecurity challenges. The course focuses on combating the exploitation of undetected vulnerabilities for which organizations increasingly turn to Artificial Intelligence (AI) and Machine Learning (ML). Generative AI, a transformative technology, emerges as a vital cybersecurity tool, detecting and preventing attacks by identifying and neutralizing unknown vulnerabilities before causing significant harm. The course explores foundational generative AI principles and their application in real-world cybersecurity, encompassing User and Entity Behavior Analytics (UEBA), threat intelligence, report summarization, playbooks, and its impact on phishing, malware, misinformation, and deepfakes. Additionally, participants learn about potential Natural Language Processing (NLP) attack techniques, like prompt injection, and strategies to mitigate them.
Penetration Testing, Incident Response and Forensics
  • This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurity Security Analyst Professional Certificate program. You will learn about the different phases of penetration testing, how to gather data for your penetration test and popular penetration testing tools. Furthermore, you will learn the phases of an incident response, important documentation to collect, and the components of an incident response policy and team. Finally, you will learn key steps in the forensic process and important data to collect. This course also gives you a first look at scripting and the importance to a system analyst.
Cyber Threat Intelligence
  • This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurity Security Analyst Professional Certificate program. You will understand network defensive tactics, define network access control and use network monitoring tools. You will understand data protection risks and explore mobile endpoint protection. Finally you will recognize various scanning technologies, application security vulnerabilities and threat intelligence platforms. This course also gives you hands on access to cybersecurity tools important to a system analyst.
Cybersecurity Capstone: Breach Response Case Studies
  • This course gives you the background needed to gain Cybersecurity skills as part of the IBM Cybersecurity Professional Certificate programs. You will explore incident response methodologies and security models. You will learn to recognize and categorize key types of vulnerabilities and associated attacks against today's organizations. You will explore in depth several past and recent breaches to learn how they were detected and what was done or could have been done to reduce the threat risk to the organization. Finally, you will explore the costs of data breaches through research studies and well known breaches. This course requires you to select and research a cybersecurity breach in the news today and apply your knowledge and skills from this course and previous cybersecurity courses to analyze the type of attack, attack timeline, vulnerable systems, and any missed opportunities. This project will be graded by your peers in the course.
IBM Cybersecurity Analyst Assessment
  • A growing number of exciting, well-paying jobs in today’s security industry do not require a college degree. This is the final course required to assess your acquired knowledge and skills from from the previous two specializations, IT Fundamentals of Cybersecurity and Security Analyst Fundamentals, to become job-ready for a cybersecurity analyst role.
IT Security: Defense against the digital dark arts
  • This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As of information security: authentication, authorization, and accounting. We’ll also cover network security solutions, ranging from firewalls to Wifi encryption options. The course is rounded out by putting all these elements together into a multi-layered, in-depth security architecture, followed by recommendations on how to integrate a culture of security into your organization or team.
Cryptography and Information Theory
  • This course combines cryptography (the techniques for protecting information from unauthorized access) and information theory (the study of information coding and transfer). More specifically, the course studies cryptography from the information-theoretical perspectives and discuss the concepts such as entropy and the attacker knowledge capabilities, e.g., Kerckhoff's Principle. It also contrasts information-theoretic security and computational security to highlight the different train of thoughts that drive the cryptographic algorithmic construction and the security analyses.
Cryptographic Hash and Integrity Protection
  • This course reviews cryptographic hash functions in general and their use in the forms of hash chain and hash tree (Merkle tree). Building on hash functions, the course describes message authentication focusing on message authentication code (MAC) based on symmetric keys. We then discuss digital signatures based on asymmetric cryptography, providing security properties such as non-repudiation which were unavailable in symmetric-cryptography-based message authentication.
Classical Cryptosystems and Core Concepts
  • In this course, you will learn basic security issues in computer communications, classical cryptographic algorithms, symmetric-key cryptography, public-key cryptography, authentication, and digital signatures. These topics should prove especially useful to you if you are new to cybersecurity, Classical Cryptosystems introduces you to basic concepts and terminology related to cryptography and cryptanalysis. It is recommended that you have a basic knowledge of computer science and basic math skills such as algebra and probability.
Mathematical Foundations for Cryptography
  • In this course, you will be introduced to basic mathematical principles and functions that form the foundation for cryptographic and cryptanalysis methods. These principles and functions will be helpful in understanding symmetric and asymmetric cryptographic methods examined in previous courses. These topics should prove especially useful to you if you are new to cybersecurity. It is recommended that you have a basic knowledge of computer science and basic math skills such as algebra and probability.
Asymmetric Cryptography and Key Management
  • In asymmetric cryptography or public-key cryptography, the sender and the receiver use a pair of public-private keys, as opposed to the same symmetric key, and therefore their cryptographic operations are asymmetric. This course will first review the principles of asymmetric cryptography and describe how the use of the pair of keys can provide different security properties. Then, we will study the popular asymmetric schemes in the RSA cipher algorithm and the Diffie-Hellman Key Exchange protocol and learn how and why they work to secure communications/access. Lastly, we will discuss the key distribution and management for both symmetric keys and public keys and describe the important concepts in public-key distribution such as public-key authority, digital certificate, and public-key infrastructure. This course also describes some mathematical concepts, e.g., prime factorization and discrete logarithm, which become the bases for the security of asymmetric primitives, and working knowledge of discrete mathematics will be helpful for taking this course; the Symmetric Cryptography course (recommended to be taken before this course) also discusses modulo arithmetic.
Symmetric Cryptography
  • Symmetric cryptography relies on shared secret key to ensure message confidentiality, so that the unauthorized attackers cannot retrieve the message. The course describes substitution and transposition techniques, which were the bases for classical cryptography when the message is encoded in natural language such as English. Then, we build on product ciphers (using both substitution and transposition/permutation) to describe modern block ciphers and review the widely used cipher algorithms in DES, 3-DES, and AES. Lastly, we enable the use of block ciphers to support variable data length by introducing different modes of block cipher operations in ECB, CBC, CFB, OFB, and CTR modes.

Honours Degree from VTU

certificate

Program Fee

Application Process

Upcoming Application Deadline

Admissons are closed once the requisite number of participants enroll for the upcoming cohort. Apply early to secure your seat.

Deadline:30-Apr-2024

Frequently Asked Questions

What Is a Honors Degree?

The Honors degree programme is designed to empower graduate engineering students with industry and career readiness through skill-based learning and application tools.

How will this programme help students in building their proficiency?

This programme is envisaged to help build a strong foundation across various streams through digital lectures, industry interviews, formative and summative assessments, capstone projects, and

How is this programme different from other industry programmes?

This programme is designed by globally renowned industry and university content partners to combine academic concepts with emerging industry skills and technologies for the students entering

What will students get once they enroll and complete this Honors pathway?

Once you enroll into the Honors pathway, you will get unlimited access to Coursera for Campus catalog of 10,000+ world-class courses, hands-on projects, and job-ready certificate programs. Yo

Contact

Still have queries?

Contact Us

Please fill in the form and a Program Advisor will reach out to you. You can also reach out to us at onlineprograms@vtu.ac.in or 9480223900

By submitting the form, you agree to our Terms and Conditions and our Privacy Policy