Open Site Navigation

​Diploma In Cyber Security & Cyber Forensics Investigations (CSCFI)

This Diploma program will educate the participants into an interactive environment where they will be shown about how to create a secured network, configure a server with security protocols, scan, test, hack and secure their own networks to understand the security vulnerabilities. With forensics in hand participants will be better able to understand the incident analysis for any cyber attack and follow-up procedures for tracking back. The lab-intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Participants will understand how our defense measure works and then to scan their networks attack their own. Once Training completes students will have hands on understanding and experience in Cyber IT Security.

Diploma In Cyber Security & Cyber Forensics Investigations (CSCFI)

Course Modules


  • Introduction to Inter networking
  • OSI & TCP/IP Stack
  • IP Addressing, Subnetting, VLSM
  • Configuring Router & Switch
  • IP Routing
  • Switching, VLAN, VTP
  • WAN
  • Basic Network Security & ACL
  • IP Services & Managing Cisco IOS
  • Wireless Technology
  • Firewalls & VPN
  • Troubleshooting

MCSA (Server 2012)

  • Install and configure servers
  • Configure server roles and features
  • Configure Hyper –V
  • Deploy and configure core network services
  • Install and administer Active Directory
  • Create and Manage Group policy

Linux Server

  • Installation
  • User and Group Administration
  • Redhat Infrastructure
  • Redhat Package Manager
  • The Linux kernel
  • Rescue modes
  • Network Services
  • Security
  • X Window System
  • Routing, Forwarding, and Firewalls
  • File System Management

Ethical Hacking

  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Trojans and Backdoors
  • Viruses and Worms
  • Sniffers
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Hacking Webservers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • Evading IDS, Firewalls, and Honeypots
  • Cryptography
  • Penetration Testing


  • HTML Elements, HTML Attributes, HTML Headings, HTML Paragraphs
  • HTML Formatting, HTML Fonts, HTML Styles, HTML Links
  • HTML Images, HTML Tables, HTML Lists, HTML Forms, HTML Frames
  • HTML Iframes, HTML Colors, HTML Colornames, HTML Colorvalues
  • HTML Quick List, HTML Layout, HTML Doctypes, HTML Head
  • HTML Meta, HTML Scripts, HTML Entities, HTML URLs, HTML URL Encode
  • HTML Media, HTML Audio, HTML Object, HTML Video, HTML YouTube, HTML Media Tags
  • HTML5 Introduction, HTML5 New Elements, HTML5 Video, HTML5 Video/DOM
  • HTML5 Audio, HTML5 Drag and Drop, HTML5 Canvas, HTML5 SVG, HTML5 Canvas vs.SVG
  • HTML5 Geolocation, HTML5 Web Storage, HTML5 App Cache, HTML5 Web Workers
  • HTML5 SSE, HTML5 Tags

Cyber Security & Cyber Forensics

  • Introduction To Network Security
  • Virtual Private Networks
  • E-Mail Security
  • Web Security
  • Incident And Incident Response
  • Initial Response And Forensic Duplication
  • Storage And Evidence Handling
  • Network Forensics
  • Systems Investigation And Ethical Issues
  • Mobile And Digital Forensics
  • Security Framework For Mobile Systems
  • Mobile Phone Forensics
  • Introduction To Digital Forensics
  • Analysis Of Digital Forensic Techniques
  • Mobile And Wireless Security
  • Mobile Security
  • Securing Wireless Networks
  • Adhoc Network Security
  • V-Rfid Security
  • Malware Analysis
  • Implementationof Covert Channel
  • Virus Design And Its Implications
  • Malware Design Using Open Source
  • Virus And Worm Analysys
  • Penetration Testing And Vulnerability Assessment
  • Foot Printing & Social Engineering
  • Scanning & Enumeration
  • System Hacking
  • Sniffers & Sql Injection
  • Myths Of Information Security Management
  • Information Security Assessments
  • Security Management Concepts And Principles
  • Configuration Management
  • Security Management Planning
  • Risk Assessment & Security Audit
  • Data Collection
  • Data Analysis
  • Risk Assessment
  • Security Audit Process
  • Storage Management & Security
  • Storage Area Networking
  • Backup And Recovery Mechanisms
  • Storage Security
  • Storage Infrastructure Management
  • Cloud Computing Fundamentals
  • Cloud Applications
  • Securing The Cloud
  • Virtualization Security
  • Cloud Security Management
  • Fundamentals Of Cyber Security
  • Issues In Cyber Security
  • Intellectual Property Rights
  • Procedural Issues
  • Legal Aspects Of Cyber Security


  • Introduction to XML, Why XML?, XML history and origins,An XML document is a well-formed document.
  • XHTML, The XML universe, Validation & B2B, Collapse Namespaces, Sharing knowledge
  • The problem and the solution, Default namespaces, Collapse Validation and DTD Schema
  • External & Internal DTDs, DTD syntax: elements and attributes, Freedom vs. structure.
  • Internal & external XML entities, Collapse Schema, Much more than an alternative to DTD
  • Namespaces in Schema (default namespace, target namespace, Schema namespace)
  • Built-in data types, Simple and complex types, Elements and attributes groups, Unions and lists
  • Inheritance, User-defined types, Include and import of external Schemas, The key,keyref and unique elements
  • Collapse XPath, XPath Expressions, Operators and Special Characters, Filters and Filter Patterns
  • Comparisons, Location Paths, XPath Functions, Collapse XSL, XSL versions, The XSL processor: client & server side.
  • Extracting the data from XML tree, Sorting, XSL numbers, Xpath, Creating new elements & attributes.
  • Creating new documents, XSL functions, Making choices, Collapse XML Application, XML programming.
  • System.XML, SAX 2.0./XMLReader, XMLSerializer, The Document Object Model.
  • .Net XML tools/The Apache tools set, Validating XML in Code, XSL Transformation in code PHP
  • Introduction PHP and MySQL, Benefits of using PHP MySQL
  • Setup of PHP Environment, Testing the Page, Troubleshooting Installation Errors
  • PHP Programming Concepts, Write your First PHP Program, Embed PHP in HTML / HTML in PHP
  • PHP Data Types, Variables in PHP, SuperGlobal Variables, Operators in PHP
  • Conditional Statements, Loops (For, While, Do While, Foreach), PHP Functions
  • Using Functions in PHP, Userdefined Functions, Predefined Functions, Common Functions
  • String Functions, File Functions, Date Functions, Hash Functions, Mail Function
  • MySQL Database Training, What is Database ?, Understanding an RDBMS
  • Understanding Tables, Records, and Fields, SQL Language, Using the MySQL Command-Line Client
  • Working with MySQL Admin, Working with PHP MyAdmin
  • Creating Databases, Types of Databases, Creating Tables in Database, Specifying Field Data Types
  • Selecting the Most Appropriate Data Type, Adding Field Modifiers and Keys, Selecting a Table Type Altering Tables
  • Altering Table and Field Names, Altering Field Properties, Adding and Removing Fields and Keys
  • Altering Table Types, Backing Up and Restoring Databases and Tables, Backing Up Databases and Tables
  • Restoring Databases and Tables from Backup, Dropping Databases and Tables
  • Viewing Database, Table, and Field Information, SQL Queries
  • Inserting Records, Editing and Deleting Records, Performing Queries, Retrieving Specific Columns
  • Filtering Records with a WHERE Clause, Using Operators, Sorting Records and Eliminating Duplicates
  • Limiting Results, Using Built-In Functions, Grouping Records, Joining Tables
  • Using Subqueries, Using Table and Column Aliases, Arrays and Array Functions
  • Why use Arrays, Types of Arrays, Creating, ArraysAccessing Arrays, Array Functions, Using Array Functions

Duration of the courses: 120 Hours


Those interested to take up Cyber Security Courses. Working professionals who are experience in networking, server management, programing and who are willing to migrate to security domain can pursue this diploma program, Graduates pursuing their degree with keen interest towards cyber security field can also enroll in this program.

Key Benefits

At the end of the training, participants will establish and govern minimum standards for credentialing professional information security standards in cyber security.