Start your journey in Cyber Security today !

Birchwood University

MASTER OF SCIENCE IN CYBER SECURITY

Birchwood University

MASTER OF CYBER SECURITY

Birchwood University is a world-renowned institution committed to academic excellence and industry-driven education. With multidisciplinary Centers of Excellence in fields like Data Science, Entrepreneurship, and Marketing, our programs integrate modern management practices with a strong theoretical foundation. Through innovative teaching, industry partnerships, and hands-on learning, we equip students with the skills and insights needed to excel in a global business landscape

The Master of Cyber Security prepares technology graduates for leadership roles in cybersecurity. Developed with industry experts, the program equips professionals to assess security needs, implement solutions, and manage secure systems. It builds expertise in evaluating, designing, and securing computer systems, preparing graduates for advanced roles beyond entry-level positions.

This will give you the knowledge and expertise to assess, design, and build secure computer systems, processes, and people involved in cyber security.

1. 18 Months Full-Time Program
2. Developed in Consultation with Industry Experts
3. Careere Assistance
4. 24*7 Access
5. Practical Project-Based Learning
6. World-Class Curriculum Developed by Academicians and Industry Experts
7.The Cohort Experience
8. Degree-Accredited by BirchWood University
Course Content

MCS500 | Networking and Kali Linux | 3 credit hours

  • This course provides fundamental concepts for Networking. It delves into different networking technologies. Topics included in this course are Network topology, IP addressing and subnetting, MAC address, OSI and TCP/IP model, IP routing, Network security devices, Routers, and routing protocols like EIGRP, OSPF, RIP and other protocols for communication like HTTP, HTTPS, FTP, Telnet, DHCP, ARP and the ports. It also includes knowledge of networking devices such as switches, L2 and L3 switches, servers, hub, routers, and repeaters. Compare physical interface and cabling types such as single-mode fiber, multimode, copper, connection media like Ethernet and point to point comparison between TCP and UDP protocol.

  • In this course, students will focus on the Kali Linux operating system, wherein the topics included are, Introduction to Kali Linux, setting up Kali Linux as a virtual machine on VMware Workstation, terminal, file system, useful commands, basic network commands, services, managing users, troubleshooting Kali Linux, installing, removing, and customizing and troubleshooting software using the Debian package manager, using Kali as a portable USB distribution including options for encryption, persistence, and self-destruction, and thoroughly administering, customizing, and configuring Kali Linux and creating your own packages and hosting your own customer package repositories.

  • This course presents the use of Kali Linux as an attacker machine, using more than 600 tools, using the terminal and commands for performing hacking. Perform scanning, vulnerability scanning, and create exploits and payloads to gain access to the target system. Perform penetration testing and information gathering to collect information on the target system.

  • In this course, the students will be made to examine the concepts of hacking, types of hackers, how hacking is done, phases of hacking (reconnaissance, scanning, gaining access, maintaining access, and covering tracks), how these phases are performed, and what tools and techniques are used for hacking. Tools like NMAP and NESSUS are used for scanning, and the Metasploit framework is used for the execution of exploits and payloads for controlling a system after gaining access to a system. Use of various password cracking techniques like brute-force attack and tools like Lophtcrack and Ophcrack. At the end of this course, students will have the tools to protect and safeguard an organization's operating computing environment. At the end of this course, students will have the tools to protect and safeguard an organization's operating computing environment.

  • Indexing & Partitioning

  • This course focuses on the techniques used by the attackers to gain access to the system using social engineering attacks, session hijacking, and bypassing firewalls, IDS, and IPS. Techniques used in social engineering include phishing, shoulder surfing, dumpster diving, and using tools like ShellPhish to create fake pages. Knowing about different types of malware and the adverse effects of these malware on any system. Techniques like sniffing steal confidential information such as usernames and passwords using man-in-the-middle attacks performed by tools like Ettercap and Cain and Abel. Students will learn about different attacks like SQL injection, XSS attack, JSON injection attack, and directory traversal attack and understand the techniques for preserving an organization's system and people against these attacks. Hands-on training will be provided to the students to perform these attacks and the ways to encounter these attacks by use of the tool Burp Suite, allowing safe HTML.

  • Correlation

  • This course focuses on techniques used by attackers to perform mobile hacking using tools to find vulnerabilities present in the mobile phone execution exploits and running payloads through the Metasploit framework. Tools like alpha devices are used for hacking Wi-Fi by capturing the four-way handshake and cracking the password using brute force or dictionary attack. It also includes cloud computing and IoT hacking which consists of detailed knowledge of IoT devices, layers of IoT, its security features, and cryptography techniques used for encryption and decryption using keys, such as public and private keys. This course provides students with the tools to protect the use and security of mobile devices.

  • This course focuses on fundamental concepts of digital forensics. Use various tools and techniques to combat any cyber-attack, investigation, and extraction of data from digital evidence collected from the crime scene. Techniques are used for securing and collecting evidence from the crime scene.

  • This course focuses on security technology and students will be made familiar with the policies ensuring the listing of only good files. Policies used for securing networks with BYOD, and prevention of damaged or malicious applications.

  • This course will teach you the basic accounting concepts and tools necessary to enable managers to effectively and purposefully manage their company's financial resources. The course begins with basic concepts such as cash flow analysis, balance sheet interpretation, and ratio analysis, building your knowledge base and progressing to more advanced topics such as capital budgeting, risk and return, and various investment decision-making techniques. Using case analysis, the course concludes with a discussion of how companies raise money in the short and long term and how the capital markets can help in such a funding process.

  • This course includes Security Administrators, Network Security, and Cyber Security Audits. Students can choose any two courses and will get training for both the courses

    • Security Administration: Students will be provided with knowledge about system security, how attackers harm the system, and practicals including Data and System Security, Disk encryption, Hardware Firmware Security, securing different operating systems from data destruction, and any cyber-attack. Students will be provided with expertise in firewall technologies, Intrusion Detection, and Intrusion Prevention Systems.
    • Network Administration: Students are trained for identifying and solving any problem that arises in computer networks, and in their installing and configuring. Hands-on training is provided in Network Firewalls, and proxy servers using Virtual Private Networks (VPN), protecting servers from cyber-attacks, providing security of different layers, and application of Code Quality and Testing.
    • Cyber Security Audits: In this course, students will be trained to perform audits that include Operation Security (review of policies, procedures, and security control), Data Security (use of encryption techniques, data security during transmission and storage), Physical Security (role-based access controls, disk encryption, and multi-factor authentication). The student will get complete practical knowledge to identify vulnerabilities in security, compliance, and testing controls

Rs-10,14,000.00

Apply Now Apply Now Download Brouchure Download Brouchure

Level

Master Degree

Duration

18 Months

Enrolled

350+ Student

Study Model

100% Online

Language

English/Hindi

Degree

Yes