element element element element

Starts On

2nd October, 2023
Last Date: 1st October 2023

Duration

Four Months: 3 months Live Classes + 1 month Capstone Projects (with Additional 2 Months Support)

Learning Format

Online Bootcamp

Past participants of Ibby Mentorship work at

About The Program

Introduction

A structured learning program for cybersecurity for beginners is designed to upskill/Start their careers in the cybersecurity space. This program elaborates on offensive and defensive Security and provides the required tools to study, explore, practice, and manage security essentials in information systems.

Program Highlights
  • 3 Months (80 hours) intensive live training session with cybersecurity industry experts (Weekly thrice)

  • 120 Hours focused on labs, assignments and certification preparation.

  • 1 Month for capstone projects

  • 2 Months after course support for job and interview skills preparation.

  • Additional 100 Hours of recorded content including Ibbycsm core concept, EC Council (CSCU, CEH, CSA & DFE) course, and AWS cloud security.

  • Free Three months of Premium access to the Tryhackme Platform

Curriculum

img img Element Element Element

The Cybersecurity Market Growth

img
img
shape

Programme Certificate

Upon completing the program with a minimum 70% score, you will be awarded a certificate from Ibby Cyber Security Mentorship.

Note: All certificate images are for illustrative purposes only and may be subject to change at the discretion of Ibby mentorship.

Palo Alto Introduction
Palo Alto Fundamentals
Palo Alto Fundamentals Cloud Security
Try Hackme
Fortinet NSE2
Fortinet NSE2
Fortinet NSE1
Fortinet NSE2

Why Ibby Cybsersecurity Mentorship Programme?

0

Only mentorship programme that covers all facets of Cyber security

0+

Student and Professional Network

0

Cyber security Influencers Created

0+

Countries

  Ibby Mentorship Non-Accredited Institute
Curriculum Designed by top Cyber Security Practitioners with decades of Industry experience Designed by Cyber Security Professionals
Recognition of Certificate Certificate is recognized globally. Instantly adds credibility to your resume Certificate may be recognized in one or two cities in India
Lifetime association Lifetime association with one of the best Cyber security Mentors. Associated with a small institute
Credibility of faculty Learn from globally renowned Industry experts, ensures best-in-class and practical knowledge. Faculty are not globally renowned
Live online sessions by industry practitioners
Weekly doubt clearing sessions
Access to LinkedIn Group X
Exclusive invitations to Online and Offline events X
Lifetime access to Job Offers from Industry X
Flexible payment options

Testimonials

img
img
img
img
img
img
img
img

Read about our participants learning experience on LinkedIn

(These are LinkedIn posts & will require you to log in to LinkedIn to see them)

Who is this Programme for?

Over eight years tracked by Cyber-security Ventures, the number of unfilled cyber-security jobs grew by 350 percent, from one million positions in 2013 to 3.5 million in 2021. For the first time in a decade, the cyber-security skills gap is leveling off. Looking five years ahead, we predict the same number of openings in 2025.

Target Audience

Cyber Security Mentorship Program is well Designed for those who are looking to start their career in Cyber Security, especially

  • Freshers who aspire to buildtheir career in the field of cybersecurity

  • IT professionals looking for a career transition as cybersecurity specialist

  • Professionals aiming to move ahead in their IT career

  • Network Engineers and system admins

  • Anyone who wants to get into cybersecurity

  • Cybersecurity Interns who look to get practical knowledge in cybersecurity

Job Roles
  • img
    Cyber Security Analyst
  • img
    Security Administrator
  • img
    Network Security Engineer
  • img
    Ethical Hacker
  • img
    Malware Analyst
  • img
    Application Security Engineer
  • img
    Cloud Security Engineer
Market Sectors
  • img
    Government Organisation
  • img
    Healthcare
  • img
    Banks
  • img
    Retailers
  • img
    Oil & Gas
  • img
    IT Services

Programme Faculty

Dr. Mohamed Ibrahim

CCIE, CISM, NSE 7, VCIX-NV, CEH, CEI

Senior Cyber Security Consultant

  • Cyber Security Expert | Cyber Security/Network Consultant | Firewall Consultant | International Speaker | Career Coach | Serial Entrepreneur | CCIE/VCIX/Cyber Security/Ethical Hacking Trainer | Youtuber
  • He has also helped his students to achieve their career and certification goals and some of them are working in the Red team, Blue team, and SoC as Cyber Security Analyst, Specialists, Experts and even as CISO.
  • He has worked across multiple Cyber Security Vendors like Cisco, Juniper, Fortinet, Palo Alto, F5, VMWare, Arbor, IBM, Bluecoat, FireEye, etc., with major customers in Oil & Gas, Telecom, ISPs, Banking, Government Hospitals and Education Sectors.
  • He has visited U.S, Germany, Italy, London, France, Netherland, Dubai, Abu Dhabi, Kuwait, Srilanka, India, Malaysia, and Singapore for various International Conferences and Training.
Contact Me
img element element
Element Element

Our Subject Matter Experts

img
Mohammed Aadhil
Ashfaq

SENIOR PENETRATION TESTER | SRT | EJPT | DANTE | PRO HACKER HTB

img
Shaheela Banu

CHIEF INFORMATION SECURITY OFFICER | CRISC | CISSP | CISM | CEH | CISA

img
Chandrasekar R

CYBER AND CLOUDSECURITY CONSULTANT |CISSP | CISM | CCSK | CEH | CEI

img
Naveen Kumar

CYBERSECURITY SPECIALIST | CEH | CTF PLAYER

img
Nandu Anil

MALWARE ANALYST | CHFI | CTF PLAYER

Key Programme Takeaways

  • You will be able to get Offensive cybersecurity certification such as TryHackme Pre-security, Jr Penetration Tester, Offensive Security.
  • You will be able to get Defensive cybersecurity certification such as Palo Alto PCCET, Fortinet NSE 1, NSE 2, NSE 3 & NSE 4, TryHackme Cyberdefense, SOC L1.
  • Certificate of Completion.
  • Use techniques to calculate risks and rewards of digital implementation in the changing industry landscape.
  • Create strategic & operational plans across the value chain.

Tools Covered

img
img
img
img
img
img
img
img
img
img
img
img
img

6 Reasons to Choose

Cybersecurity Master Program

img
Start from Basic

Learn Basic to Advanced cybersecurity concepts in just 3 months

img
Master Mentors

Learn from experts globally recognized for contribution to cybersecurity and cyber defense

img
Experiential Learning

Master both offensive and defensive cybersecurity by combining deep formal rigor and intense 2x practical approach

img
Global Certification

Get certification guidance from 5 different cybersecurity vendors

img
Peer Networking

Join the elite community of top cybersecurity professionals, practitioners and researchers

img
After Course Support

Get additional support for LinkedIn profile building, CV preparation, and job guidance

Certifications guidance

Get Certified from 5 Leading Cybersecurity Vendors/Platform

img
img
img
img
img
img
img

Ibby Career Services

Career Management Modules on:
  • Building an Impressive Resume & Cover Letter
  • Building an Impressive LinkedIn Profile
  • Navigating Job Search
  • Interview Preparation
Please Note:
  • Ibby does NOT promise or guarantee a job or progression in your current job. Career Services is only offered as a service that empowers you to manage your career proactively.
shape

Still have questions?
Get in touch with us

Live Programme Modules

  • How The Web Works
  • Linux Fundamentals
  • Windows Fundamentals
  • OSINT Overview
  • Basic and Advanced Search Engine OSINT
  • Image OSINT
  • Email Address OSINT
  • Breached Data OSINT
  • People OSINT
  • Phone Number OSINT
  • Username OSINT
  • Website OSINT
  • Social Media OSINT
  • Wireless Network OSINT
  • OSINT with Tools
  • Automating OSINT
  • Cyber Defense Introduction
  • Threat and Vulnerability Management
  • Security Operations & Monitoring
  • Threat Emulation
  • Incident Response and Forensics
  • Malware Analysis
  • Introduction to Web Hacking
  • Burp Suite
  • Network Security
  • Vulnerability Research
  • Metasploit
  • Privilege Escalation
  • Cyber Defence Frameworks
  • Cyber Threat Intelligence
  • Network Security and Traffic Analysis
  • Endpoint Security Monitoring
  • Security Information and Event Management
  • Digital Forensics and Incident Response
  • Phishing
  • Getting Started
  • Advanced Exploitation
  • Buffer Overflow Exploitation
  • Active Directory
  • Extra Credit
  • Network Security
  • Security Fabric
  • Firewall Policies, NAT
  • Firewall Authentication
  • Logging and Monitoring
  • Certificate Operations
  • Web Filtering
  • Application Control
  • Antivirus
  • IDS and DoS
  • SSL-VPN
  • Dialup IPsec VPN, DLP
  • Routing
  • Software-Defined WAN
  • VDOMs
  • Layer 2 Switching
  • Site-to-Site IPsec VPN
  • FSSO
  • High Availability (HA)
  • Web Proxy
  • Diagnostics

Elective subjects (Any 1)

  • Introduction to AWS
  • Introduction to IAM
  • Attacking and Defending Core Services
  • Attacking and Defending Serverless
  • IAM Privilege Escalation
  • Android Intro and Security Architecture
  • Android Static Analysis
  • Android Dynamic Analysis
  • Python Basics
  • Subdomain Enumeration
  • Network Scanner
  • Port Scanner
  • Hash Cracker
  • Keyloggers
  • SSH Brute Forcing

Recorded Content

Total Hours - 10
  • Fundamentals of Cyber security
  • Fundamentals of Network Security
  • Fundamentals of Cloud Security
  • Fundamentals of SOC
Total Hours - 7
  • Information Security Awareness
  • Evolution of Cyber Security
  • Fortinet Product Awareness
Total Hours - 25
  • Introduction
  • Let us Learn the Basics
  • Anatomy of Cyber Attack
  • Data Breach
  • Next Generation Firewall
  • Cryptography
  • Endpoint Security
  • Threat Intelligence
  • Advanced Threat Protection
  • SD-WAN
  • Introduction to Cloud Security
  • Cloud Services and Security
  • Wi-Fi Security
  • OT Security
  • IOT Security
  • Sandbox
  • FortiAnalyzer and FortiSIEM
  • SOC and SOAR
  • FortiManager
  • ISMS Introduction and Framework
  • ISMS - Assessment And Testing
  • ISMS - IAM and BCP
  • Blockchain Introduction and Ethereum
  • Blockchain - Smart Contract
Total Hours - 05
  • Introduction to Data Security
  • Securing Operating Systems
  • Malware and Antivirus
  • Internet Security
  • Security on Social Networking Sites
  • Securing Email Communications
  • Securing Mobile Devices
  • Securing Cloud
  • Securing Network Connections
  • Data Backup and Disaster Recovery
Total Hours - 60
  • Introduction to Cybersecurity
  • A Future-Proof Career
  • The Cybersecurity Threat Landscape
  • The Anatomy of an Attacker
  • Networking Basics
  • Networking Devices and Initial Configuration
  • Endpoint Security
  • Network Defense
  • Cyber Threat Management
Total Hours - 20
  • Computer Forensics Fundamentals
  • Computer Forensics Investigation
  • Understanding Hard Disks
  • Understanding File Systems
  • Data Acquisition and Duplication
  • Defeating Anti-forensics Techniques
  • Windows Forensics
  • Linux and Mac Forensics
  • Network Forensics
  • Investigating Web Attacks
  • Dark Web Forensics
  • Investigating Email Crime
  • Malware Forensics
Total Hours - 35
  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • Vulnerability Analysis
  • System Hacking
  • Wi-Fi Security
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial-of-Service
  • Session Hijacking
  • Evading IDS, Firewalls and Honeypots
  • Hacking Web Servers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • Cloud Computing
  • Cryptography

Testimonials

Early applications encouraged. Limited seats are available.

The admission fee for this cyber security certification program is

We are dedicated to making our programs accessible. We are committed to helping you find a way to budget for this program and offer a variety of financing options to make it more economical.

Register Now

* Kindly register and contact us for discounts
* We also have referral bonus for each registered student

Frequently Asked Questions ( FAQ )

The program begins on 3rd July 2023. But the registrations will close on 30th June 2023.
This will be a live workshop. However, each session will be recorded, and these can be accessed from the LMS.
Every Week Monday, Wednesday, and Friday from 8:00 PM - 10 PM IST
Yes, the recordings can be accessed from our LMS
It will cover advanced topics such as IoT, Blockchain, AI, etc.
Apart from the Ibby Certification, you will get certificates from our partners. However, these certifications are controlled and under the sole discretion of the partners, and Ibby can in no way interfere in this process.
Yes, the list of certifications is mentioned in brochure.
We have career support, including resume, Linkedin profile optimization, interview preparation, etc. But we don’t guarantee any Job.
Yes, we have separate sessions for that.
We can only offer advice on making your profile better for selection. The final decision to stay or leave is by the students.
Kindly contact us at contact@ibbycybersecuritymentor.com with the relevant details like payment receipts etc.
Yes, we have some offers for committed and passionate students.
You will get lifetime access for all the courses you are enrolled in the LMS.

We have tried our best to answer all the frequently asked questions. If you still have more questions, please email to: contact@ibbycybersecuritymentor.com (Give us 24 hours to respond).

Our fantastic support team will get back to you.