Skip to content
Home
Who We Are
About Us
History, Vision & Mission
Objectives & Strategies
People
Director
Staff Members
Advisory Council
Minutes of Meetings
Country Focal Points
Commonwealth of Learning
Opportunities at CEMCA
What We Do
Education
Higher Education
Open Schooling
Teacher Education
Skills
Skills for Work
Community Media
What We Offer
Resources
Publications
Annual Report
Achievement Report
Reports
Books
Discussion Papers
Gallery
Photo Gallery
Video Gallery
Audio Gallery
Open Access Repository
Course Materials
National Education Policy – 2020
Open Educational Courses
Skill Development Courses
Compendium of Community Radio
Directory of Community Radio
Academic and Career Skills
(Self-Assessment) Instrument
(ACSI) Manual
News
CEMCA Updates
News
News
Press Coverage
Speeches & Presentations
Upcoming Events
Strategic Plan
Strategic Plan
Theory of Change
Contact us
Search …
Home
Who We Are
About Us
History, Vision & Mission
Objectives & Strategies
People
Director
Staff Members
Advisory Council
Minutes of Meetings
Country Focal Points
Commonwealth of Learning
Opportunities at CEMCA
What We Do
Education
Higher Education
Open Schooling
Teacher Education
Skills
Skills for Work
Community Media
What We Offer
Resources
Publications
Annual Report
Achievement Report
Reports
Books
Discussion Papers
Gallery
Photo Gallery
Video Gallery
Audio Gallery
Open Access Repository
Course Materials
National Education Policy – 2020
Open Educational Courses
Skill Development Courses
Compendium of Community Radio
Directory of Community Radio
Academic and Career Skills
(Self-Assessment) Instrument
(ACSI) Manual
News
CEMCA Updates
News
News
Press Coverage
Speeches & Presentations
Upcoming Events
Strategic Plan
Strategic Plan
Theory of Change
Contact us
Youtube
Facebook
Twitter
Soundcloud
PG Diploma in Cyber Security
Semester 1:
Course
Download
Topic
Watch Video
Fundamentals of Information Security
e-readiness
e-commerce
Introduction to cyber crimes
Information Security I
Information Security II
Guidelines for choosing browser
Cyber Crime - Case Studies
Cyber Attacks and Counter Measures: User Perspective
Types of cyber attacks
Asset, Threats and Risk Management
Organization security & Frameworks
Security control designs
Information Security Governance
SDLC(I)
SDLC(II)
Introduction to Cryptography
Authentication and Password Security
Wireless Security
Cyber Attacks and Counter Measures: User Perspective
Cyber security initiative in India
Managing Cyber Security
Wi Fi Threats and Security
Web Application Security
Cyber Security Threat Landscape
Intrusion Detection System
Cyber Security Assurance
Introduction to Malware
Social Engineering
National Cyber Security Strategies and policies
Practical Handbook of Internet Security for Beginners
Cyber Security Threat Landscape
Semester 2 :
Course
Download
Topic
Watch Video
Information Security Assurance: Framework, Standards & Industry Best Practices
Information System
OSI Reference Model
TCP/IP Architecture
Internet Protocol
IP Addressing
IP Addressing : Advantages
Classless Interdomain Routing
Digital Forensics
Advanced Cyber Security Techniques