Advanced Executive Program in
Cybersecurity
Table of Contents
About the Course 01
About IIIT Bangalore 02
About NPCI 02
About Simplilearn 02
Key Features 03
Integrated Labs & Tools 03
Program Outcomes 04
Program Eligibility Criteria and Application Process 05
Who Should Enroll in this Program? 06
Learning Path Visualization 07 - 16
Courses Curriculum 07
Step 1: Enterprise Infrastructure Security 08
Step 2: Application and Web Application Security 10
Step 3: Ransomware and Malware Analysis 12
Step 4: Ethical Hacking and VAPT 14
Step 5: Virtual Internship
16
Advisory Board 17
Certificate 19
Classroom-Level Immersion: Delivered Digitally 20
Corporate Training 21
About the Course
The digital landscape has grown by leaps and bounds. Cybersecurity skills are now
among the most sought-after and highly-compensated skills as the business world has
shifted towards a digital operational framework, and business data and organizational
assets face an enhanced risk of cyber violations and cyberattacks.
Simplilearn’s Advanced Executive Program in Cybersecurity, in collaboration with
IIIT Bangalore and NPCI, will equip you with the skills necessary to transform your
organization’s cybersecurity strategy. You will learn comprehensive approaches to
cryptography, API security, encryption, software security, network security, identity
and access management, malware analysis, ransomware, vulnerability assessment,
penetration testing, and much more.
In partnership with IIIT Bangalore and NPCI, this program features the perfect mix of
theory, case studies, and extensive hands-on practical experience through integrated
labs. The program provides a comprehensive education, leveraging IIIT Bangalore
‘s academic excellence, NPCI’s expertise in secure retail and digital payments, and
Simplilearn’s unique blend of self-paced online videos, live virtual classes, hands-on
projects, and integrated labs.
1 | www.simplilearn.com
About IIIT Bangalore
The International Institute of Information Technology Bangalore, popularly known as IIIT
Bangalore, was established in 1999 with a vision to contribute to the IT world by focusing
on education and research, entrepreneurship, and innovation.
IIIT Bangalore has been ranked 1st among the private technical universities in India as
per India Today, August 2021 edition. It has been ranked 8th overall among engineering
universities in August 2021 edition and was ranked 10th in the same category as per India
Today, August 2020 edition.
About NPCI
National Payments Corporation of India (NPCI), an umbrella organization for operating
retail payments and settlement systems in India, is an initiative of the Reserve Bank
of India (RBI) and the Indian Banks’ Association (IBA), for creating a robust payment
& settlement infrastructure in India. The corporation’s current and future service
portfolio includes Unified Payments Interface, RuPay, Immediate Payment Service, *99#,
National Automated Clearing House, Aadhaar Enabled Payment System, e-KYC, Cheque
Truncation System, National Financial Switch, etc.
About Simplilearn
Simplilearn is the world’s #1 online bootcamp provider that enables learners through
rigorous and highly specialized professional training programs. We focus on emerging
technologies and processes that transform the digital world at a fraction of the cost
and time as traditional approaches. Over two million professionals and 2,000 corporate
training organizations have harnessed our award-winning programs to achieve their
career and business goals.
2 | www.simplilearn.com
Key Features
8X higher live interaction Practice labs and projects Program Completion
with live online classes by with integrated labs Certificate from IIIT
industry experts Bangalore
Virtual Internship Experiential learning Lifetime access to self-
Certificate from NPCI via multiple real-life paced videos & class
innovation projects and recordings to refresh the
capstones concepts
Earn an industry Get noticed by the top Enrollment in
recognized Simplilearn’s hiring companies Simplilearn’s JobAssist
Certificate after each (only for India)
module completion
Integrated Labs & Tools
Four Virtual Machines will be provided in the laboratories (VM) :
Windows OS Kali Linux OS Ubuntu OS Webgoat
The malwares listed below are ones that a student would not want to install on his own
computer, but with our labs VM, he can simply access them without causing harm to his PC.
3 | www.simplilearn.com
Crunch ZENMAP Traceroute Exeinfo PE
MTR
Program Outcomes
At the end of this Advanced Executive Program in Cybersecurity, you will:
Configure cybersecurity infrastructure components
Learn fundamentals of cryptography and its application to network security
Define the cybersecurity infrastructure policy or technical security policy for an
organization
Test and run exploits to identify vulnerabilities in networks
Identify and analyze exposures and weaknesses in applications and their deployments
Acquire a background on threat modeling, OWASP, fuzzing, clickjacking, etc.
4 | www.simplilearn.com
Program Eligibility Criteria and
Prerequisites
Those wishing to enroll in the Advanced Executive Program in Cybersecurity in
collaboration with IIIT Bangalore and NPCI will be required to apply for admission.
Eligibility Criteria
For admission to this Advanced Executive Program in Cybersecurity, candidates:
Should have a bachelor’s degree in any discipline with an average of 50% or higher
marks
With a non-programming background can also apply
1 year of work experience is mandatory
Application Process
The application process consists of three simple steps. An offer of admission will be
made to the selected candidates and accepted by the candidates upon payment of the
admission fee.
1
Submit an
2
Application
3
Admission
Application Review
Complete the application After you submit your An offer of admission
and include a brief application, a panel of will be made to qualified
statement of purpose admissions counselors candidates. You can
to tell our admissions will review your accept this offer by
counselors why you’re application and statement paying the program fee.
interested and qualified for of purpose to determine
this Advanced Executive your qualifications and
Program in Cybersecurity. interest in the program.
5 | www.simplilearn.com
Talk to an Admissions Counselor
We have a team of dedicated admissions counselors who are here to help guide you in
the application process and related matters.
They are available to:
Address questions related to the application
Assist with financial aid (if required)
Help you better understand the program and answer your questions
Who Should Enroll in this Program?
The program has been designed to meet the upskilling requirements of lower and mid-
level management professionals working in BFSI, cybersecurity, and fintech fields who
come with prior technical knowledge on the basics of cybersecurity. The course is ideal
for people looking to work in job roles/positions such as, but not limited to:
Security infrastructure specialists Cloud security architects
Network security consultants Cybersecurity software developers
Security analysts Malware analysts
Application security analysts Threat hunters
Blue team members
Note: We would be covering the basics of cybersecurity in our pre-requisite courses that would be
assigned to the learners before the start of the program. Prior knowledge of any programming language is
recommended but not mandatory.
6 | www.simplilearn.com
Learning Path
STEP 1
Enterprise Infrastructure
Security
STEP 2
Application/Web
Application Security
STEP 3
Ransomware and
Malware Analysis
STEP 4
Ethical Hacking
and VAPT
STEP 5
Virtual Internship
(Certificate from NPCI)
Advanced Executive Certificate in
Cybersecurity from IIIT Bangalore
Electives
• Cloud Security (CCSP)
• Security Governance and Regulations
7 | www.simplilearn.com
STEP 1 2 3 4 5
Enterprise Infrastructure Security
Module Overview:
The Enterprise Infrastructure Security course will enable learners to gain knowledge
and skills in a series of advanced and current concepts in cybersecurity, and related
to enterprise and infrastructure security. After the completion of this module, learners
will have a comprehensive understanding of the NICE framework, security controls,
networking concepts, traffic analysis, packet analyzers, sniffers, firewalls, SIEM, VLAN,
VPN, identity and access management, and much more.
Module Curriculum:
Domain 1 - Security Essentials Domain 2 - Network Basics
Cybersecurity Networking concepts
CIA Triad OSI models
Malwares TCP/IP model
Attacks Ports
Threats Secure protocols
Vulnerabilities Common network attacks
Risk Network Devices
Security Controls Hubs,
BYOD Bridges
NICE Framework Switch
8 | www.simplilearn.com
Router Domain 4 - Identity & Access
Management
Transmission media
AAA
Domain 3 - Network Security
MFA
Security Devices
Authorization
Firewall
Access control models
Unified threat management (UTM)
IAM Lifecycle
NGFW
Authentication System
Web application firewalls
SSO
Intrusion Detection Prevention System
Active directory
Network Access Control
LDAP
SIEM
Secure Design
Virtual Local Area Network (VLAN)
Virtual Private Network (VPN)
DMZ
Domain Name System (DNS)
Dynamic Host Configuration Protocol
(DHCP)
9 | www.simplilearn.com
STEP 1 2 3 4 5
Application and Web Application
Security
Module Overview:
The Application and Web Application Security course will enable learners to gain
knowledge and skills in OWASP tools and methodologies, insecure deserialization,
clickjacking, black box, white box, fuzzing, symmetric/asymmetric cryptography, hashing,
digital signatures, API security, patch management, and much more.
Module Curriculum:
Domain 1 - Core Concepts Broken Authentication
Types of application Sensitive Data Exposure
Web application components XML External Entities (XXE)
Web servers Broken Access Control
Security policies, standards, Security misconfigurations
procedures, guidelines, baselines
Cross site scripting (XSS)
Domain 2 - Software Security
Insecure deserialization
Vulnerability database (VDB)
Using components with known
SANS Top 25 Software Errors vulnerabilities
OWASP tools and methodologies Insufficient logging and monitoring
Injection Beyond OWASP
10 | www.simplilearn.com
CSRF Domain 5 - Secure Software Lifecycle
Management
SSRF
SSDLC
Clickjacking
Threat modeling
Domain 3 - Secure Software Testing
OWASP Secure coding guide
Vulnerability assessment
API Security
Penetration testing
Common API Vulnerabilities
SAST, DAST
How to stop API Attacks?
Black box, white box
System Hardening
Fuzzing
Secure configuration
Domain 4 - Cryptography
Patch management
Symmetric cryptography
Application Monitoring & Logging
Asymmetric cryptography
Hashing
Digital Signature
Digital Certificate
Encryption
11 | www.simplilearn.com
STEP 1 2 3 4 5
Ransomware and Malware Analysis
Module Overview:
Malware, specifically ransomware, costs businesses more than $75 billion per year. These
attacks continue to be a threat to the security of companies. In this module you will get
an overview of how to detect, analyze, and protect yourself and your company from
ransomware attacks.
Module Curriculum:
Domain 1 - Introduction to Malware Domain 2 - Malware Analysis
What is Malware? What is malware analysis
Malware Family Why Malware Analysis
History and Evolution of Malware Types of Malware analysis techniques
What is Malware Market today Static analysis techniques
Birth of a Malware Dynamic analysis techniques
Malware Distribution Technique Malware Behaviors and Functionalities
How much damages malwares cause Malware Obfuscation Techniques
Is Ransomware a Malware Domain 3 - Ransomware Malware
Types of Ransomware Introduction to Ransomware
How to defend Malware Infection Dangerous Convergences
12 | www.simplilearn.com
Anatomy of a Ransomware Attack Domain 4 - Advanced Malware Protection
Ransomware Families Enterprise Defense Strategies
Pros and Cons of Paying the Ransom Protecting Endpoint
Ransomware Operators and Targets Protecting Servers
How Does Ransomware Spread? Zero-Trust Model
Dealing with Ransomware Incidents Threat Intelligence and Malware
Protection
Negotiate / Pay Ransom
Ransomware Decryption Tools
Ransomware threat prevention and
response Ransomware Removal Tools
Secure Design Principles The future of malware capabilities
Future victims
13 | www.simplilearn.com
STEP 1 2 3 4 5
Ethical Hacking and VAPT
Module Overview:
This module provides you with the hands-on training required to master the techniques
hackers use to penetrate network systems, helping you fortify your systems against
it. You will also gain an understanding about the finer nuances of advanced hacking
concepts, penetration testing, and vulnerability assessment.
Module Curriculum:
Domain 1 Vulnerability Remediation or Mitigation
What is a Security Testing What is Vulnerability Management
Why Security Testing Domain 2 - Vulnerability Assessment
What is a Security Vulnerability? Vulnerability Assessment Program and
Technology
Types of Security Testing
General Architecture
Vulnerability Assessment
Active and Passive Scanning
Penetration Testing
Technology
Breach Attack Simulation
The Standard for Vulnerability Severity
Manual and Automated Scanning Rating
Dealing with Vulnerabilities Vulnerability database (VDB)
Types of Security Vulnerability Common Vulnerabilities and
Exposures (CVE)
14 | www.simplilearn.com
National Vulnerability Database Social Engineering
Selecting Technology Mobile Hacking
Automation in VM Using the Metasploit Framework
Execution, Reporting, and Analysis Exploitation
Principles of Mitigation Privileges Escalation
Exploitable Vulnerability Reporting Avoiding Detection
Managing Vulnerabilities in the Cloud Maintaining Access
Domain 3 - Penetration Testing Covering your Tracks
Penetration testing concepts i.e. what Cloud Penetration Testing
why & how we do pen test?
Domain 4 - Advanced Penetration Testing
Penetration testing methodology
Red Teaming Operations
Types of penetration testing
Blue Teaming Operations
Tools and techniques used in
penetration testing Purple Teaming
Information Discovery Breach Attack Simulation
Scanning & Enumerating Target Bug Bounty Program
Introduction to Kali Linux Guidelines for Penetration Testers
System Hacking Being Ethical
Infrastructure Hacking Gaining written permission
Client-Side Hacking Non-disclosure agreements
Password Hacking Rules of engagement
Web Application Hacking Penetration Testing Report Writing
Report Read-Out
15 | www.simplilearn.com
STEP 1 2 3 4 5
Virtual Internship
This virtual internship will give you an opportunity to implement the skills you learned
throughout this program. Through dedicated mentoring sessions, you will learn how to
solve a real-world, industry-aligned problem. This is the final step in the learning path and
will enable you to showcase your expertise in cybersecurity to prospective employers.
Advisory Board Member
V SRIDHAR
Faculty In-Charge, Continuing Professional Education,
Institutional Finance
Education : Ph.D. (University of Iowa)
Dr. V. Sridhar is Professor at the Centre for IT and Public
Policy at the International Institute of Information
Technology Bangalore, India. He is the author of two
books published by the Oxford University Press: The
Telecom Revolution in India: Technology, Regulation
and Policy (2012), and The Dynamics of Spectrum
Management: Legacy, Technology, and Economics
(2014).
He is currently:
Member, Advisory Committee, Facebook India
Tech Scholars Programme, Facebook India, July
2021-Current.
Member, IT and ITeS Sectional Committee, Services
Sector Department 10, Bureau of Indian Standards,
June 2020 – Current.
Member, Technical and Financial Advisory
Committee, E-Procurement, Centre for
E-Governance, Government of Karnataka. Apr
2019-Current.
Member, Think Tank on Digital Markets, Competition
Commission of India. Sep 2018 – Current.
17 | www.simplilearn.com
SRINIVAS VIVEK
Assistant Professor
Education : Ph.D. (University of Luxembourg)
Previously, he was a (post-doctoral) Research Associate
in the Cryptography group of the Department of
Computer Science at the University of Bristol between
Jun’15-Dec’17. Prof. Nigel Smart was his supervisor.
He obtained his Ph.D. from the University of
Luxembourg, Luxembourg, in 2015. He was affiliated to
the Laboratory of Algorithmics, Cryptology and Security
(LACS) in the Computer Science and Communications
Research Unit. His doctoral thesis was in Cryptography
and was supervised by Prof. Jean-Sébastien Coron and
Prof. David Galindo.
He did his M. Sc. (Engg.) at the Indian Institute of
Science, Bangalore, India, between 2008-2011. He
was affiliated to the Department of Computer Science
& Automation. His thesis was supervised by Prof.
Veni Madhavan. Prior to this, he obtained B. Tech. in
Information Technology from National Institute of
Technology Karnataka, Surathkal, India, in 2008.
CHANDRASHEKAR RAMANATHAN
Professor & Dean (Academics) & Faculty-in-charge
Computing
Education : Ph.D. (Mississippi State University)
Professor Chandrashekar Ramanathan is a faculty member
at IIITB since 2007. Professor Chandrashekar received his
Ph.D degree from Mississippi State University. His thesis
was in the area of object-oriented databases. He has
extensive application software development experience
spanning over 10 years in large multinational organizations.
His current focus is in the area of information convergence
and software engineering. Technology for education,
Application architectures, enterprise architecture and
content management are his other areas of interest.
18 | www.simplilearn.com
Certificate
Complete all the courses in the mandatory learning path successfully to obtain this
industry-wide recognized course completion certificate from IIIT Bangalore.
When you have achieved this Certification, you acquire the necessary skills helping
you to stay competitive in the cybersecurity industry. The certification proves to be
a testimonial that you have gained in-depth knowledge of the underlying technology
needed to perform the tasks efficiently in your job.
19 | www.simplilearn.com
Classroom-Level Immersion:
Delivered Digitally
Anywhere
Anytime
Access Online Enrollment and
Access on Web and Mobile
Online
Self-Learning Learner Watches Chapter-End
the Video Quizzes
Live,
Interactive
Classes Live Virtual Live Interaction
Classroom and Mentoring
Hands-On
Experience Final Project Virtual
Assessment Work Labs
Simplilearn Certification Criteria
85% Course
Completion + 80% Score on
Simulation Exam
+
Internal, and
External Project Submitted
Certification and Accepted
Final Exam and
Certification
20 | www.simplilearn.com
Corporate Training
Top clients we work with:
Features of Corporate Training:
Tailored learning solutions
Flexible pricing options
Enterprise-grade learning management system (LMS)
Enterprise dashboards for individuals and teams
24X7 learner assistance and support
21 | www.simplilearn.com
INDIA
Simplilearn Solutions Pvt Ltd.
# 53/1 C, Manoj Arcade, 24th Main,
Harlkunte
2nd Sector, HSR Layout
Bangalore - 560102
Call us at: 1800-212-7688
USA
Simplilearn Americas, Inc.
201 Spear Street, Suite 1100,
San Francisco, CA 94105
United States
Phone No: +1-844-532-7688
www.simplilearn.com