Cohort - 2 Commencement
1st Week of April, 2026 (Tentatively)
Cohort - 2 Completion
1st Week of August, 2026 (Tentatively)
Learning Format
Online (Live + Hands-on sessions)
Language
English
Duration
4 Months (Dedicated 2 weeks of project)
Registration
Last date of registration - 3rd Week of March, 2026 (Tentatively)

In case of any deviation in the cohort commencement or completion date, the learners will be duly informed in advance.

about the programme about the programme

About the Programme

This Cyber Security Certification Programme by IIT Ropar and TCS iON is a 4-month, industry-focussed course designed in collaboration with CoE-SARDS (Centre of Excellence for Studies and Applied Research in Defence and Security) to equip graduates and professionals with in-demand Cyber Security skills. Taught by IIT professors and industry experts, this programme covers Network Security, Vulnerability Management, Malware Analysis, Cryptography and Cyber Forensics, along with hands-on training to ensure that learners gain practical experience with tools like Nmap, WireShark, Nessus and OWASP, enabling learners to solve complex problems and transform their professional journey.

This course is ideal for graduates and professionals looking to build expertise in Cyber Security. With interactive live sessions and practical training, learners will gain job-ready skills to defend against evolving threats.

Future Outlook

Cyber Security is one of the most lucrative and most preferred fields by top IT professionals. Demand for information security analysts, a top cyber security related job, is expected to grow by 35% from 2021 to 2031, according to the US Bureau of Labor Statistics.

It is estimated that Cyber Security is about US$2.5-3 billion (₹16,631.9 crores to ₹19,958.3 crores) or about 2%, close to US$150 billion (nearly ₹9.97 lakh crores) compared to the Indian IT sector. With the sector on track to reach US$350 billion (nearly ₹23.3 lakh crores) by 2025, it is estimated that 10% of the same would be Cyber Security.

Companies worldwide are struggling to fill positions, with a global shortfall of 1.5 million Cyber Security professionals predicted by 2025. In India, job openings in Cyber Security remain largely unfilled, with this demand being fuelled by the alarming rise in cyberattacks, with global damages projected to reach US$10.5 trillion by 2025. More than 59% of companies report having vacant Cyber Security positions, this presents a unique opportunity for tech professionals and aspiring Cyber Security to step into high-impact roles that shape the future of digital security.

Read More Read Less

Key Highlights

Offered by IIT Ropar and TCS iON

4-month industry-focussed course

120+ hours of overall world-class experiential learning

Live Lectures every week for interactive learning and doubt clearing

Learn from IIT professors and TCS industry experts

Comprehensive curriculum with dedicated hands-on sessions

2 weeks of dedicated project

Exposure to cutting-edge tools

Develop the Skills

The participants are expected to develop the following skills by the end of the programme:

  • Understand Cyber Security fundamentals, including network security, cryptography and cyber forensics
  • Perform risk assessments and respond effectively to security incidents
  • Identify and mitigate cyber threats by detecting vulnerabilities and analysing malware
  • Apply best Cyber Security practices to protect systems, networks and data
  • Use industry-standard tools like Nmap, Nessus, Wireshark and OWASP ZAP
  • Develop job-ready skills for roles in ethical hacking, security analysis and cyber defence
develop the skills develop the skills

Develop Hands-on Expertise In

Shodan
Nmap
Social-Engineering Toolkit
Nessus
OpenVAS
Wireshark
Ghidra
Sandboxes
Strings
PE Viewer
OWASP ZAP/Burp Suite

Potential Career Path

The field generates a variety of job roles, including but not limited to:

The average salary range of the mentioned job roles is ₹5LPA - ₹12LPA.

Cyber Security Engineer

  • Network Security Engineer
  • Cyber Security Associate
  • Penetration Tester
  • Cloud Security Engineer

Cyber Security Analyst

  • Information Security Analyst
  • SOC Analyst
  • Compliance Analyst
  • Risk Analyst

Information Architect

  • System Architect

Programme Pedagogy

Programme Syllabus Overview

This comprehensive syllabus covering the latest industry practices and techniques on Cyber Security is structured into ten modules as a structured path which is spanning across 14 weeks with 2 weeks of project. This course curriculum is designed in a way that it aligns with the current industry trends and practices, making graduates job-ready and valuable to organisations. In addition, guiding the learners through the intricacies of the concepts with hands-on implementations on case studies and scenarios as per the industry standards. Each module provides a solid foundation in building proficiency by ensuring a cohesive and thorough understanding from the basic to the advanced topics leveraging extensive hands-on implementations.

program syllabus overview program syllabus overview
  • Networking Basics
  • Physical Layer Basics
  • Overview of Data Link Layer
  • Network Layer
  • Transport Layer
  • Application Layer
  • Modular Case Study
  • Formative Assessment
  • Introduction to Network & Cyber Security, Security threats & vulnerabilities, Current state of Cyber Security, Introduction to Malware, CIA triad of Information Security
  • Reconnaissance, Weaponize, Deliver, Exploit, Install, Command and control, Act on objectives
  • Modular Case Study
  • Formative Assessment
  • Understanding Cyber Reconnaissance
  • Active and passive footprinting, footprinting methods and tools, network footprinting and reconnaissance using Nmap
  • Open-source intelligence gathering, Google directives, Shodan, DNS basics, DNS footprinting
  • Working with Shodan and Nmap
  • Working with Social Engineering Toolkit
  • Modular Case Study
  • Formative Assessment
  • Introduction to Enumeration concepts and types ( CWE, CPE, CVE)
  • Analysis of a vulnerability and correlation of (CWE, CPE, CVE)
  • MITRE framework, Introduction of different stages of Vulnerability management and Vulnerability Discovery, Vulnerability assessment, Vulnerability prioritization, Vulnerability remediation, Vulnerability Verify/Monitor
  • Scanning methodologies, Port scanning, Nmap, Hping, other scanning tools, Vulnerability scanning, Nessus
  • Enumeration techniques - Banner grabbing, Windows and Unix system basics
  • Project: Develop a small Vulnerability management tool
  • Modular Case Study
  • Formative Assessment

Network attack types:

  • Denial of Service (DoS) attack
  • Distributed DoS (DDoS) attack
  • IP packet fragmentation attack
  • DNS poisoning attack
  • Man in the middle and digital twin attack
  • Session hijacking
  • SQL injection
  • Authentication, password attacks, active and passive online attacks
  • Tools: hydra, john-the-ripper
  • Offline attacks - windows and unix password storage methodologies
  • Rainbow tables
  • Privilege escalation - metasploit , application execution, hiding files, rootkits
  • Modular Case Study
  • Formative Assessment

Cyberattacks and malware:

  • Introduction to malware families: Viruses, Trojans, Worms, Spyware, Ransomware and other malware
  • Malware reverse engineering tools and techniques

Tools and techniques:

  • Static Analysis: HxD Hex Editor, Ghidra, IDA Pro
  • Dynamic Analysis: Sandboxes and emulators
  • Code Analysis: Visual Studio Code, Notepad++, and Radare2
  • Memory Analysis: DumpIt, Volatility, and Rekall
  • Network Analysis: Wireshark, Tcpdump, and NetworkMiner
  • Malware classification: MD5, YARA, and CuckooML
  • Modular Case Study
  • Formative Assessment

Concepts and Cryptanalysis:

  • Terminology, Encryption algorithms and techniques, Symmetric encryption, Asymmetric encryption, examples - DES, 3DES, AES, RC, Twofish, Blowfish, Diffie-Hellman, ECC, RSA, El Gamal, etc, Hash algorithms, examples - MD5, SHA-1, SHA-2, SHA-3, collisions, Steganography, Hardware encryption - HSM, TPM

Digital Certificates:

  • PKI, Digital Signatures, Digital Certificates, Encrypted communication - SSH, SSL, TLS, IPSec, PGP, Cryptography attacks - Known plain text attack, Chosen plain text attack, Cipher text only attack, Chosen cipher attack, Replay attack, MITM
  • Modular Case Study
  • Formative Assessment
  • Cloud Computing overview
  • Service types and deployment models
  • Threats in Cloud Computing
  • OWASP Cloud top 10
  • Mitigations of cloud attacks
  • Identity and Access Management
  • Tools to secure data on cloud
  • Attacks on Web servers, Attacks on Web applications - buffer overflow, XSS, CSRF, Cookies, SQL injections, Counter Measures
  • Modular Case Study
  • Formative Assessment
  • CTF, Fundamentals of digital forensics, Computer forensic evidence, Cyber laws, Data acquisition in various operating systems, Email forensics, Incident reporting
  • Modular Case Study
  • Formative Assessment
  • Introduction to the basics of ML, Supervised and Unsupervised Learning
  • Different stages of ML
  • Anomaly detection and its applications in Cyber Security
  • Vulnerabilities/attacks on/by ML models
  • Small projects using ML techniques for security
  • Modular Case Study
  • Formative Assessment

Certificate Eligibility Criteria

Learners will be awarded a co-branded certificate upon successful completion of the programme. The course evaluation components are modular quizzes and the 2-week project.

  • Certificate of Participation (CoP): If a learner has scored less than 35% in the course evaluation criteria, then a CoP will be awarded.
  • Certificate of Achievement (CoA): If a learner has scored within the range of 35% to 75% in the course evaluation criteria, then a CoA will be awarded.
  • Certificate of Excellence (CoE): If a learner has scored greater than 75% in the course evaluation criteria, then a CoE will be awarded.

Meet the Mentor(s)

FAQs

Please take a look at the most frequently asked questions, you might have your query answered here.

Undergraduates, postgraduates and working professionals with limited work experience and basic programming knowledge can apply for this programme.
1. Click on the "Buy Now" button.
2. Login with your TCS iON Digital Learning Hub credentials or sign up as a new user.
3. You need to proceed to make the payment by clicking on "Click to Pay".
4. You will receive a successful purchase message on your registered email ID/mobile number.
The course has been meticulously designed for both Freshers/Individuals pursuing Bachelor's/Master's degree and working professionals, with more emphasis on hands-on experience and practical exposure to cutting-edge Cybersecurity tools and technologies. The learners will get access to live lectures, hands-on implementation, assignments, quizzes, industry use cases and mentorship of renowned industry experts and IIT Ropar faculty members.
In case a learner misses a live lecture, he/she will be provided access under Live Lecture learning component, to view the recorded version of the session within and for a specified time frame (during the 4 months of programme completion).
The learners would need the following infrastructure to access the learning platform:
a. Device: A standard Desktop/Laptop/Tablet/Smartphone with camera and mic
b. Internet: A regular broadband/Wi-Fi connection or a mobile 4G connection
A learner can conveniently connect among the members at an appointed time for group work, outside the live classes. Learners can also use the platform 24x7 to engage and learn from their peers using our digital discussion rooms available under the course of the programme. Our platform also has the provision of group-specific discussion forums for offline discussion among the group members.
The duration of this programme is 4 months, including hands-on and doubt clearing sessions. There will be 2 sessions per week and the duration of each session will be 90 minutes followed by live-doubt solving Q&A. The Live Lectures are planned every week at 6:00 PM to 8:00 PM on Wednesdays and 10:00 AM to 12:00 PM on Saturdays.
Learners will be awarded a co-branded certificate upon successful completion of the programme. The course evaluation components are modular quizzes and the 2-week project.
Towards the final score, the quizzes will carry 60% weightage and the project will carry 40% weightage.
a. Certificate of Participation (CoP): If a learner has scored less than 35% in the course evaluation criteria, then a CoP will be awarded.
b. Certificate of Achievement (CoA): If a learner has scored within the range of 35% to 75% in the course evaluation criteria, then a CoA will be awarded.
c. Certificate of Excellence (CoE): If a learner has scored greater than 75% in the course evaluation criteria, then a CoE will be awarded.
Learners will be awarded a co-branded digital certificate upon successful completion of the programme.
• Learners will receive the quiz results immediately post quiz hours.
• For Assignments, solutions would be provided after 1 week to the learners along with feedback to self-assess their assignments. The Final Project would be evaluated by the course instructors and results will be shared within 15 working days.
Attendance is not mandatory, but we highly encourage you to attend the sessions to gain maximum benefits from the content and discussions.
Please note that the course fees is not refundable under any circumstances. Also, the course fee is not transferable for any other course on the TCS iON platform or for any other purpose. We will be with you at every step for your upskilling and professional growth needs.
Yes, learners can use the India Toll Free helpline-1800 266 6282 or email us at info.tcsionhub@tcs.com