Diploma in Cybersecurity
Semester-wise syllabus for a Diploma in Cybersecurity
Semester 1: Fundamentals of Cybersecurity & Networking
-
Introduction to Cybersecurity
-
Basics of Cybersecurity, Threats, and Attacks
-
CIA Triad (Confidentiality, Integrity, Availability)
-
Cybersecurity Ethics & Laws
-
-
Computer Networks & Protocols
-
OSI & TCP/IP Models
-
IP Addressing, Subnetting, DNS, DHCP
-
HTTP/HTTPS, FTP, SSH, VPNs
-
-
Operating System Security
-
Windows & Linux Security Basics
-
User Permissions & Access Control
-
Hardening OS against Attacks
-
-
Basic Programming for Security
-
Python Scripting for Cybersecurity
-
Automating Security Tasks
-
-
Cyber Hygiene & Safe Computing
-
Password Security, Phishing Awareness
-
Malware Protection & Antivirus Tools
-
Semester 2: Network Security & Defensive Techniques
-
Network Security Fundamentals
-
Firewalls, IDS/IPS (Intrusion Detection/Prevention Systems)
-
VPNs & Secure Remote Access
-
-
Cryptography & Encryption
-
Symmetric vs. Asymmetric Encryption
-
SSL/TLS, AES, RSA, Hashing (SHA-256)
-
Digital Signatures & Certificates
-
-
Ethical Hacking Basics
-
Footprinting & Reconnaissance
-
Scanning Networks (Nmap, Wireshark)
-
Vulnerability Assessment
-
-
Security Policies & Risk Management
-
Security Frameworks (NIST, ISO 27001)
-
Risk Assessment & Mitigation
-
-
Hands-on Labs
-
Setting Up Secure Networks
-
Using Security Tools (Wireshark, Metasploit)
-
Semester 3: Penetration Testing & Cyber Defense
-
Advanced Ethical Hacking
-
Exploitation Techniques (Metasploit, Burp Suite)
-
Social Engineering Attacks
-
-
Web Application Security
-
OWASP Top 10 Vulnerabilities (SQLi, XSS, CSRF)
-
Web Penetration Testing (Kali Linux, OWASP ZAP)
-
-
Wireless & Mobile Security
-
Wi-Fi Security (WPA3, WPS Attacks)
-
Mobile Device Security (Android/iOS)
-
-
Incident Response & Forensics
-
Digital Forensics Basics
-
Log Analysis & Malware Investigation
-
-
Hands-on Projects
-
Simulated Cyber Attacks & Defense
-
Capture The Flag (CTF) Challenges
-
Semester 4: Advanced Security & Professional Practice
-
Cloud & IoT Security
-
Securing AWS/Azure Cloud Environments
-
IoT Vulnerabilities & Protection
-
-
Advanced Threat Detection
-
SIEM (Security Information & Event Management)
-
Threat Intelligence & SOC Operations
-
-
Cybersecurity Compliance & Auditing
-
GDPR, HIPAA, PCI-DSS Compliance
-
Security Audits & Reporting
-
-
Capstone Project / Internship
-
Real-world Security Project
-
Vulnerability Assessment Report
-
-
Career Preparation
-
Cybersecurity Certifications (CompTIA Security+, CEH)
-
Resume Building & Job Interview Prep
-
Key Tools & Technologies Covered
-
Networking: Wireshark, Nmap, Nessus
-
Pen Testing: Kali Linux, Metasploit, Burp Suite
-
Forensics: Autopsy, FTK, Volatility
-
Defensive Security: Snort, Splunk, SIEM Tools
-
Cloud Security: AWS/Azure Security Tools