Certification in
Cybersecurity and Ethical
Hacking with applied AI
Certification in
Cybersecurity and Ethical
Hacking with applied AI
- Learn from industry experts and top faculty with experience from top global institute.
- Get access to Live classes, instant academic support, and an evolving curriculum aligned with industry trends.
- Build market-ready cybersecurity skills through real-world ethical hacking and defense projects with guidance from PwC Academy mentors.
Batch Starts
January 06, 2026
Course Duration
6 Months
Eligibility
12th Pass and Above
Learning Mode
Online
Time Commitment
8-10 Hours/Week
Batch Starts
January 06, 2026
Course Duration
6 Months
Eligibility
12th Pass and Above
Learning Mode
Online
Time Commitment
8-10 Hours/Week
2.3K+ students have already registered
What Will You Learn?
Elevate your cybersecurity prowess. Learn to conduct ethical hacks, defend against sophisticated threats, and integrate AI for unparalleled security. Drive your career forward with a robust portfolio built from hands-on labs simulating real-world cyberattacks and defenses. Build skills to secure your place as a high-impact cybersecurity professional, ready to lead with data-driven strategies and fortify digital assets.
Toolkit
Course Details

Duration
6 Months

Course Mode
Online

Certification
From iHUB DivyaSampark IIT Roorkee and PwC Academy
Module 1 — Cybersecurity Foundations & Evolving Threat Landscapes
- 1.1 Introduction to Cybersecurity Fundamentals
- Core concepts: Confidentiality, Integrity, Availability (CIA Triad)
- Threat actors & attack vectors
- Key principles: Defense-in-Depth, Least Privilege, Zero Trust
- Frameworks & standards: NIST, ISO 27001 (overview), CIS Controls
- 1.2 Networking Essentials for Security
- TCP/IP model & key protocols
- Network devices and their security roles
- Topologies, segmentation & wireless security
- Tools: Wireshark, tcpdump
- Lab: Network-traffic analysis with Wireshark
- 1.3 Understanding the Evolving Threat Landscape
- Current & emerging cyber-threat trends
- Impact of new technologies on security
- Threat-intelligence fundamentals
- Lab: Case-study analysis of a recent cyber-attack
Module 2 — Ethical Hacking, Footprinting & Vulnerability Assessment
- 2.1 Ethical Hacking Methodologies
- Phases of ethical hacking
- Legal & ethical considerations
- Intro to penetration-testing toolsets
- Tools: Kali Linux
- Lab: Setting up Kali VM & vulnerable targets
- 2.2 Footprinting & Reconnaissance Techniques
- Passive reconnaissance (OSINT)
- Active reconnaissance: scanning & enumeration
- Tools: Nmap, Shodan, theHarvester, dig / nslookup
- Lab: Comprehensive OSINT + active recon
- 2.3 Vulnerability Assessment Strategies
- Vulnerability-management lifecycle
- Scanning tools & workflows
- CVE / CVSS basics; spotting common vulns
- Tools: OpenVAS, Nessus (trial)
- Lab: Run a vulnerability scan & interpret results
Module 3 — Advanced Network Security & Incident Response
- 3.1 Advanced Network-Security Controls
- Firewalls deep dive: WAFs, NGFWs
- IDS / IPS: signature vs. anomaly detection
- VPNs, NAC, DDoS mitigation
- Tools: Snort, Wazuh, iptables
- Lab: Configure firewall rules & analyse IDS/IPS alerts
- 3.2 Security Operations Centre (SOC) & SIEM
- SOC roles, tiers & workflows
- SIEM basics: log collection, correlation, alerting
- Tools: Splunk (community), ELK Stack
- Lab: Security-log analysis inside a SIEM
- 3.3 Comprehensive Incident Response
- Incident-response lifecycle & planning
- Digital-forensics basics for IR
- Effective incident communication
- Lab: Build a basic IR playbook
Module 4 — Secure Coding Practices & Application Security
- 4.1 Secure-SDLC Integration & Threat Modelling
- Embedding security in each SDLC phase
- STRIDE threat-modelling workshop
- Security-by-design principles
- Lab: Build a simple threat model
- 4.2 Web & API Vulnerabilities (OWASP)
- OWASP Top 10 deep dive
- API-security best practices
- Tools: Burp Suite (community), OWASP ZAP, SQLMap
- Lab: Exploit common web/API vulns in a safe environment
- 4.3 Secure Coding Best Practices
- Data protection & cryptography essentials
- Secure configuration, error handling & logging
- Dependency / supply-chain security
- Tools: Bandit, Snyk (SCA)
- Lab: Code review & remediation exercise
Module 5 — AI-Driven Cybersecurity: Detection, Automation & Defense
- 5.1 Leveraging AI/ML for Cybersecurity
- Fundamentals of ML in security contexts
- Use-cases: anomaly detection, malware classification, etc.
- Data requirements & pitfalls
- Tools: scikit-learn, TensorFlow (basic)
- Lab: Train a simple malware-detection model
- 5.2 Security Automation & Orchestration with AI
- SOAR platform concepts
- Automated incident triage & response
- AI-driven vulnerability prioritisation
- Tools: Cortex (concepts), TheHive, Python scripting
- Lab: Design an automated security workflow
- 5.3 Adversarial AI & Defensive Techniques
- How attackers exploit AI/ML
- Basics of adversarial machine-learning (AML)
- Defensive counter-measures
- Tools: IBM ART, Google AutoML (conceptual)
- Lab: Identify & discuss adversarial examples
Module 6: Project pathway by PwC Academy
- Work on projects like
- Cybersecurity Foundations (Advanced Refresh)
- Compliance Gap Analysis Report
Please Note :- "Due to the evolving nature of the industry expectations and partner institute feedback, some syllabus aspects may change. Any updates will be communicated during the Inauguration Session(s) or at the start of the relevant module"
Meet our Instructor Team
*Note: Instructors teaching your batch may change based on specific module expertise, or circumstances such as personal emergencies, unavailability etc.
Fee Structure
Application Fee
(non-refundable)
Option 1
Upfront
Option 2
EMI
(Through Masai's NBFC Partners)
Secure Seat Fee
(non-refundable)
₹4,000
₹4,000
Program Fee
(non-refundable)
₹56,000
₹7,156 x 9 months
Total
₹60,000
₹68,404































