Limited time offer ends in
Live Online · Batch Starting 18th April 2026
In Association with Cognizance, IIT Roorkee

Cybersecurity and Ethical Hacking Course at IIT Roorkee

A 3-month, live online workshop where you go from understanding how attacks happen to conducting ethical penetration tests, writing professional security reports, and building the credentials that get you hired in one of the fastest-growing fields in tech.

2k+ professionals are already ahead of you.

Our Alumni Work At

Who Is This For
This Course is for those who want to

Significantly higher pay and clearer career progression

Understand how real attacks happen, through a legal, controlled environment

Conduct your first penetration test

Earn a credential that holds weight when you're applying for security analyst, ethical hacker, or SOC roles

Know exactly what's in your organisation's blind spots before someone else finds them first

Add a high-value specialisation to your portfolio

Every Organisation Got Breached Last Year. Almost None Had Enough People to Stop It.

The Cybersecurity field Is desperate for trained professionals who understand how attacks work, how systems get compromised, and how to build defences that hold.

Get Ahead

Cybersecurity is one of the few specialisations where the demand is structural, the skill gap is real, and the career trajectory is steep.

Entry-level security analysts earn more than mid-level generalist developers. Senior pentesters and security architects are in a category of their own.

The gap between where you are and where this field leads is three months of serious, structured work.

It emphasizes:

The curriculum doesn’t just teach you about security. It builds you into someone who can practice it — methodically, ethically, and professionally.

Attacker Mindset, Defender Discipline

Build deep understanding instead of relying on shortcuts or hacks.

Ethical & Responsible Thinking

Learn defensive, ethical, and responsible approaches to AI and technology use.

Professional Outputs, Not Just Skills

You'll produce vulnerability reports, network architecture diagrams, security awareness campaigns, a full penetration test report.

Workshop Modules

Inside the Workshop Curriculum

The workshop follows a progressive academic structure, moving from foundational concepts to applied understanding.

Curriculum Overview

Module 1 Foundations of Cybersecurity

Day 1

  • What is Cybersecurity?
  • CIA Triad (Confidentiality, Integrity, Availability)
  • Types of Cyber Threats
  • Cyber Attack Lifecycle

Day 2

  • Ethical Hacking vs Malicious Hacking
  • Legal & Compliance Basics
  • Introduction to Cybersecurity Domains
  • Setting Up Virtual Lab Environment

Assignment:

Set up a virtual machine lab (VirtualBox / VMware).

Day 1

  • OSI & TCP/IP Model
  • IP Addressing & Subnetting
  • DNS, HTTP, HTTPS

Day 2

  • Ports & Protocols
  • Packet Flow Understanding
  • Introduction to Wireshark (Analysis Only)

Mini Lab:

Analyze packet capture files and identify protocols.

Day 1

  • Linux Basics
  • File System & Permissions
  • Command Line Essentials

Day 2

  • Process Management
  • Networking Commands
  • Introduction to Kali Linux (Lab Use)

Mini Lab:

Perform system enumeration in lab VM.

Day 1

  • Passive Recon Techniques
  • OSINT Basics

Day 2

  • Domain & DNS Analysis
  • Subdomain Discovery (Conceptual)
  • Recon Framework

Mini Lab:

Recon on intentionally vulnerable lab machines.

Day 1

  • What is Vulnerability?
  • Common Vulnerability Types
  • CVE & CVSS Basics

Day 2

  • Vulnerability Scanning Concepts
  • Reading Scan Reports
  • Risk Assessment & Reporting

Mini Lab:

Analyze vulnerability reports & prioritize risks.

Day 1

  • How Web Apps Work
  • OWASP Top 10 Overview
  • SQL Injection (Conceptual + Lab Demo)

Day 2

  • XSS (Conceptual + Lab Demo)
  • Authentication Weaknesses
  • Secure Coding Basics

Mini Lab:

Test vulnerable demo web app in lab.

Day 1

  • Password Attacks (Conceptual)
  • Hashing & Encryption Basics

Day 2

  • Multi-Factor Authentication
  • Password Policies
  • Defensive Strategies

Mini Lab:

Analyze password strength & hashing behavior in the lab.

Day 1

  • Firewalls & IDS/IPS
  • Network Segmentation
  • VPN Basics

Day 2

  • Secure Network Architecture
  • Monitoring Network Traffic
  • Defense-in-Depth Strategy

Mini Lab:

Design secure network diagram.

Day 1

  • Psychology of Social Engineering
  • Phishing (Awareness-Based)

Day 2

  • Security Awareness Programs
  • Insider Threats
  • Incident Response Basics

Mini Project:

Create a Security Awareness Campaign.

Day 1

  • Pentesting Phases
  • Planning & Scope Definition
  • Rules of Engagement

Day 2

  • Reporting & Documentation
  • Risk Rating
  • Professional Pentesting Ethics

Mini Lab:

Simulated Pentest of Lab Machine.

Day 1

  • Cloud Security Basics
  • Misconfiguration Risks

Day 2

  • API Security
  • Secure Deployment Practices
  • DevSecOps Overview

Mini Project:

Cloud Security Risk Assessment Case Study.

Full Week Practice

Students Build One Complete Autonomous System:

Options:

  • AI Research Assistant
  • AI Sales Automation Agent
  • AI HR Recruiter System
  • AI Content Automation Engine
  • AI Customer Support Agent
  • AI Business Process Automation Tool

Join today

A QUICK OVERVIEW OF THE COURSE
Bonuses

Bonuses That Add Real Value

Everything you gain beyond the sessions — access, resources, community, and recognition.

This is what you get!

Cognizance IIT Roorkee Certificate

Live Sessions + Recordings

Mobile Access

AI Community

Networking

Course PDF's and Resources

Alumni Stories

Hear it From Our Learners

Our learners come from diverse backgrounds, goals, and career paths — but they share one common experience: real growth.
Testimonials

Our Graduates Don't, Just Learn They Achieve.

Real people. Real skills. Real results. Our learners turn knowledge into careers, opportunities, and measurable success in the real world.
Our Pricing

Choose Your Path to Mastery

Cybersecurity is no longer a niche technical domain—it is a critical discipline impacting governments, enterprises, and individuals alike.

Cybersecurity and Ethical Hacking Course

Most Popular Fee
Course Fee

₹ 19,999
₹ 40,999

+ 18% GST
Workshop Duration

3 Months
3-Hour Weekend Sessions

Note: Prices Will Increase in 2 Days*

Stay ahead and accelerate your professional career.

Understand how real cyber attacks happen, how organizations defend themselves, and how to start a career in cybersecurity — ethically and legally.

Enroll Now

Total No. of Workshops

1. Starting From 18th April 2026 2. Duration: 3 Months (Weekends) 3. Live Sessions Every Saturday and Sunday 4. Recording Will Be Provided 5. Placement Support Will Be Provided (Participants can Register for multiple workshops)

Batch Starting From 18 April 2026

  1. AI-Powered Performance Marketing
  2. AI Driven Full Stack Development
  3. Agentic Al ML | Learn to Build Autonomous Workflows
  4. Data Science & Analytics with Python
Seats are limited and filled on a first-come, first-serve basis!

Don’t miss this exclusive chance to join interactive workshops at IIT Roorkee Campus for a hands-on learning experience.

Roorkee Registration Form

Base 0
GST (18%) 0

Total 0
Is This For You

This Workshop Is a Perfect Fit If You're Ready to ...

This workshop is designed for action-takers who are ready to stop guessing, start executing, and build real skills that create real outcomes. If you’re serious about growth, transformation, and practical success — you’re in the right place.
THIS IS FOR YOU IF:
THIS IS NOT FOR YOU IF:
FAQ's

General Questions and answers

Do I need technical knowledge to attend this session?
Basic familiarity with computers helps, but no deep coding or hacking experience required.
Yes, in a safe, ethical way using simulations, tools, and legal penetration testing frameworks.
Yes, guidance on using basic cybersecurity tools is provided during hands-on activities.
Definitely. It covers core skills relevant to ethical hacking, risk analysis, and certifications.
It’s a mix of both, with live demos, simulations, and theory simplified for beginners.
Registrations Now Open

Enroll Now & Get Instant Access

Transform your skills, mindset, and career path with structured mentorship, real-world learning, and hands-on programs designed for long-term success.

(Limited seats available)

2k+ professionals are already ahead of you.

Career-Oriented Training

Programs designed for real-world impact, not just certificates.

Learn by Doing, Not Watching

Projects, workshops, and real applications — not passive learning.

Lifetime Learning Access

Continuous growth with future updates, content, and community access.

Thousands of learners are already ahead — your journey starts now.