Post Graduate Program in Cyber Security and Digital Forensics

Become an Ace Professional in Cyber Security and Digital Forensics
100% Placement Assistance | 1000+ Hiring Partners
2894 Learners Enrolled

About Post Graduate Program in Cyber Security and Digital Forensics

The Internet is developing and growing faster, and with that the related risks too. Cyber Fraud is rampant. The year 2018, India was the victim of 27k instances of Cyber Frauds of varying degree and complexities, causing a huge setback for many Businesses. The need for protection of Personal and Corporate data has become the highest Priority and Companies are investing huge capital in Planning, Designing and Implementing Security Policies to protect their valuable assets. For these reasons and more, it is the perfect time to gain the latest skills in the field of Cyber Security and Digital Forensics and enjoy a rewarding career. The JAINx Post Graduate Program in Cyber Security and Digital Forensics helps learners to identify Vulnerabilities, conduct tests, assess risks and design/implement solutions.

Key Highlights

Course Start Date
Course Start Date

16th Nov, 2020

Course Duration
Course Duration

11 Months

Mode of Delivery
Mode of Delivery

Blended & Classroom

Number of hours
No. of Hours

360 hours


3 Months Live Projects


Basic to Advanced

Important Things to Know about Cyber Security and Digital Forensics

Growth of Cyber Security and Digital Forensics

With the estimation that Digital Economy in India is going to touch 1 trillion USD in 2025, speculations are rife about the spike in Cyber Crimes. It is high time that the third most vulnerable country in the world will wake up to the atrocities infested by Cyber Criminals and stop them beforehand. The only way to do this is to create a highly-skilled and experienced pool of professionals who can come up with strict Security Policies and Framework for Individuals and Organizations. According to a Data Security Council of India, 1 million Cyber Security Professionals are needed by the end of 2020.

Careers & Remuneration in Enterprise Networking and Cloud Computing

Careers & Remuneration in Cyber Security and Digital Forensics

There are multiple Technical roles available for Cyber Security Professionals with a specialized skillset. Some of those include Penetration Tester, Ethical hacker, Network Security Engineer, Network Security Auditor, Network Security Analyst, Cyber Security Support Engineer, Systems Engineer, IS Auditor, Cyber Security Auditor. Beginning salary for a Cyber Security professional in India is anywhere between 5 Lakhs p.a. to 7 Lakhs p.a up to 60 Lakh p.a for Senior Positions. Cyber Security Market in India is taking big leaps, and according to reports, it is expected to become a 3 billion dollars USD industry in 2022.

Learners Advantage

Get a Degree from Jain (Deemed-to-be University)
Get a Degree from Jain (Deemed-to-be University)

Jain (Deemed to be University) - One of the Top Ranked Universities in India that offers a Certificate upon Course Completion

Crafted Carefully

Course Curriculum is Designed and Developed by Top Notch Academia and Industry Professionals. Get Trained According to the latest Industry Requirements

Expert Facilitators

Learn from Passionate and Experienced Subject Matter Experts from Industry & Universities

Hands-On Learning

Gain Hands-On Experience through Case Studies, Projects and Practice on latest Industry Demand Tools and Business Applications

Weekly Assignments

Assignments at the end of each Module ensures efficient learning and reinforcement of concepts

Live MasterClass

Get Access to Live Master Classes delivered by Industry experts on latest industry Trends

Program Support

A Dedicated Team of Experts to attend your Academic Queries

24 x 7 LMS Access

Gain 24 x 7 access to our Learning Management System - Learn Anytime Anywhere and on Any device


Work with a Dedicated Student Mentor from Industry providing support with every step of the way. Get Expert Advice on the Right Career Path

Career Support

Personalized Resume Building and Regular Mock interviews

Placement Assistance

Placement Assistance with Hiring Partners through Connect To Careers Job Fairs and Connect To Careers e-Hire Portal

JGI Connect

Become an Alumni of JAIN (Deemed-to-be University) and Network with over a Lakh of our Alumni on JGI Connect

Who Can Learn


Get trained in industry-relevant skills and Interact with Mentors across multiple industries and enhance your learning through Certifications. Get rewarding Job offers from top companies and Kickstart your career.

Working Professionals
Working Professionals

Upskill & Prepare Yourself for Senior Positions or Transition to new roles by gaining in-demand Skills. Experience seamless Integration of Theory, Practicals and Continuous Evaluation of your Progress by Mentors.

Program Curriculum

  • Introduction to Information Security
  • Security Protocols and Basics of Cryptography
  • LAN Security and Protection of Computing Resources
  • OS security features and Security Policies
  • Identity and Access Management
  • IP Security and VPN
  • Web Security and Email Security
  • Wireless Security and Cloud Security
  • Risk Management, Testing, and Assessments
  • Algorithms and Information Processing
  • Control Structures
  • Boolean Logic and Numeric Data Types
  • Strings, Text Files, Lists and Dictionaries
  • Procedural Abstraction in Function Definitions
  • Objects and Classes
  • Networks and Client-Server Programming
  • Graphics and Image Processing, GUI.
  • Event and Event-Driven Programming
  • Introduction to Operating Systems Security
  • Secure operating systems, Security goals, Trust model, Threat model
  • Trusted Operating Systems, Assurance in Trusted Operating Systems, Virtualization Techniques
  • Access Control Fundamentals – Protection system – Lampson’s Access Matrix, Mandatory protection systems, Reference monitor
  • Verifiable security goals – Information flow, Denning’s Lattice model, Bell-Lapadula model, Biba integrity model, Covert channels.
  • Security in Ordinary OS – Unix, Windows, Linux, Solaris, Mobile OS
  • Security Kernels – Secure Communications processor, Securing Commercial OS
  • Secure Capability Systems – Physical Security and Network Security in Operating Systems
  • Testing, Vulnerability Analysis, Patch Management
  • Perimeter Concepts and TCP-IP Fundamentals
  • Network Attacks and Perimeter Security
  • Advanced Perimeter Protection
  • Network-Based Intrusion Detection and Prevention (NIPS/NIDS)
  • Email Content Security and Web Content Security.
  • Endpoint Security Technologies
  • Secure Network Access and Authentication
  • VPN Technologies and Cryptography
  • Layer 2 and Layer 3 Security Controls
  • Fundamentals of Cloud Computing and Architectural Characteristics
  • Security Design and Architecture for Cloud Computing
  • Secure Isolation of Physical & Logical Infrastructure. Data Protection
  • Access Control for Cloud, Monitoring, Auditing, and Management
  • Introduction to Cloud Design Patterns
  • Introduction to Identity Management in Cloud Computing
  • Cloud Computing Security Design Patterns – I
  • Cloud Computing Security Design Patterns – II
  • Reporting. Policy, Compliance & Risk Management in Cloud Computing
  • Introduction to principles of hacking and legal parameters
  • Viruses, Trojans, Malwares, and OS Level Attacks and Counter Measures.
  • Scanning, Sniffing, Social Engineering, Session Hijacking, and System Hacking.
  • Footprinting, Enumeration, SQL Injection, and DOS Attacks
  • Web Applications and Web Servers attacking methodology and Counter measures.
  • IoT and Cloud Attacks and Defense Mechanisms
  • Hacking Mobile and Wireless Networks and Counter measures.
  • Firewall, IDS, and honeypot evasion techniques, evasion tools, and countermeasures
  • Cryptology, Vulnerability Analysis, and Penetration Testing, Logging, and Audit.
  • Penetration Test Planning, Techniques, and Scoping
  • Information Gathering, scanning, and Analyzing Vulnerabilities
  • Exploitation, Password Attacks and pivoting
  • Traffic Analysis
  • Domain Escalation and WebApps Attacks
  • Database Penetration Testing
  • Post- Exploitation Tasks
  • Exploit developments
  • Analyzing and Reporting Penetration Test Results
  • Python for Offensive Testing, Python Environment
  • Layer 2 Attacks
  • TCP/IP Attacks
  • Network Scanning and Sniffing with Python
  • Wireless Pentesting.
  • Foot Printing Web Server and Web Application
  • DDoS Attacks, SQL and XSS Web Attacks, Client-Side Validation
  • Advanced Scriptable Shell, Password Hacking
  • Bypassing Perimeter, privilege escalation in windows
  • Introduction to Malware Analysis and taxonomy
  • Static Analysis Techniques
  • Dynamic Analysis Techniques
  • Reversing Malicious Code
  • Malicious web and document files
  • In-Depth Malware Analysis
  • Examining Self-Defending Malware
  • Advanced Reverse Engineering Techniques
  • Binary Software Security and Software Forensics
  • Introduction to IoT, Architecture, and Framework
  • Platform and Integration, Connectivity
  • Implementing IoT
  • Remote Monitoring, Edge Computing, and Analytics
  • IoT Vulnerabilities, Attacks, Risks and Counter measures
  • BlockChain Introduction and Architecture
  • Bitcoin, Ethereum, Hyper Ledger, and MultiChain
  • Cryptonomics, Applications, and Exchanges.
  • Blockchain Security. Vulnerabilities and Attacks, Risk Assessment and security mechanisms
  • Fundamentals of Mobile Computing and Security.
  • Introduction GSM Networks, UMTS Networks, LTE, and Security.
  • Device Architecture and Application Interaction.
  • The Stolen Device Threat and Mobile Malware.
  • Mobile Data Storage and File System Architecture.
  • Static Application Analysis.
  • Dynamic Mobile Application Analysis and Manipulation.
  • Mobile Penetration Testing.
  • Emerging Trends in Mobile Security.
  • Digital and Computer forensics fundamentals
  • Overview of hardware, OS and file systems
  • Data recovery, principles, and Validation
  • Digital evidence controls
  • Computer Forensic tools
  • Memory Forensics and Volatility Framework
  • Network Forensics and Mobile Forensics
  • Reverse Engineering of Software Applications
  • Computer Crimes, Legal issues, Laws and Acts
  • Principles of Mobile Hacking and Digital Forensics
  • Smartphone Overview, Fundamentals of Analysis, SQLite Introduction,
  • Android Forensics Overview, and Android Backups
  • Information gathering and exploitation processes
  • Investigating Wireless Attacks
  • Investigating Web Attacks
  • Investigating Emails and Email Clients and crimes
  • Android and iOS device forensics
  • Software design and the boot process for smart devices
  • Device Storage and Evidence Acquisition Techniques
  • iOS Backups, Malware and Spyware Forensics, and Detecting Evidence Destruction
  • Analyzing Advanced Mobile Attacks
  • Understanding Mobile Hacking Techniques and Tools
  • Open source tools, techniques, and best practices
  • Report compilation, Evidence Analysis, and Report Writing
  • Information Security Management Principles
  • Information Risk
  • Information Security Framework
  • Procedural/People Security Controls
  • Technical Security Controls
  • Software Development and Lifecycle
  • Physical and Environmental Security Controls
  • Disaster Recovery and Business Continuity Management
  • Role of Investigations and Forensics

Cyber Security and Digital Forensics Tools

Capstone Projects

The capstone project is a three month activity. It encourages a learner to pursue independent enquiry into a relevant discipline and problem of his choice. Learners are encouraged to select a topic in which they have possess competence and skill based on their academic and professional experience. The capstone project provides valuable hands-on experience and opportunity to learners to demonstrate their analytical and writing skills to their prospective employers.

Students can take up the project with Envisage Global University Connections of their choice as part of the International Immersion. A learner is mentored by a chosen faculty from a Global University and also an Industry Expert from that country. Completion of a capstone project is mandatory to complete the PGP course.

Live Projects & Case Studies

Live Projects
Work on Live Projects

Learn through real-time Industry Projects sponsored by top Companies across Industries. Get mentored by industry experts who will provide their valuable feedback and suggestions on your Project Ideation, choice of tools and Implementation skills. Apply the learning from the course to real-time scenarios and get a solid Perspective of the Structure and Functions of an Industry.

Case Studies
Industry Based Case Studies

Reading a Case Study is a great way to know both the milestones and mishaps of a Business, Product or a Service. They give a profound insight into the Rights and Wrongs that occurred and its aftermath. Studying Industry-specific Case Studies could be the best way to immerse yourself in Research and Analysis on different topics covered in the course.

Program Fee Details

Fee for Blended Mode
(Live Online Classroom + Classroom Mode)

₹ 90,000 /-

Exclusive of GST
Post Graduate Certificate from Jain Deemed to be University
JainX Academy

Financial AID

Career Support

Rooman's Naukri For U is a career support job portal designed exclusively for our learners. We aim to empower our learners with everything they need to succeed in their careers.
100 Percent Placement Assistance

100% Placement Assistance

With over 1000+ hiring partners, our learners will have a vast number of placement opportunities to start their career in the booming field of UI/UX.

Interview Preparation

Interview Preparation

Before sending you out to take up interviews an intensive session of Q&As, followed up with mock interviews is conducted, so that our students can crack the interviews at ease.

Personality Development Program​

Personality Development Program

Effective Communication is a key skill for a successful career. We provide Soft Skill training, professional resume-writing help, and interpersonal skill training.

Selection Process

Step 1
Apply Online

Apply by filling a simple online form, click on the below Apply Now button.

Application Review

Your application will be reviewed by the faculty panel and shortlisted based on the eligibility.

Personal Interview

Shortlisted candidates will go through a Personal Interview at our centre.

Fee Payment upon Selection

Fee payment as per the payment schedule to be paid.

Provisional Admission Letter

Fee payment as per the payment schedule to be paid.

Our Alumni Work In

We collaborate with top companies spanning various industrial segments, business models, and sectors. Our 500+ hiring partners offer students job openings across multiple job roles to suit their skills.
Scroll to Top
Apply Now
Form fields marked with a red asterisk * are required.