That’s where this course changes everything. In just a few months, you’ll move from uncertainty to confidence, gaining the practical knowledge employers are desperate to find. You won’t just learn theories, you’ll get hands-on experience through labs, real-world case studies, and guided practice with the same tools used by industry experts.
By the time you finish, you’ll have the skills to secure systems, spot vulnerabilities, and neutralise threats before they cause damage. More importantly, you’ll know you’re job-ready, equipped to start a career in one of the fastest-growing fields in the world.
IIT Professional Training Unit is established to offer innovative learning solutions in the fields of Business and Information Technology to enable individuals and organizations to face tomorrow’s challenges with confidence.
1.0 Introduction to Cybersecurity:
Definition and scope of cybersecurity
Importance of cybersecurity in modern society
Common cyber threats and attacks
2.0 Information Security:
Confidentiality, integrity, and availability (CIA) triad
Security policies, procedures, and best practices
3.0 Operating System Security:
Secure operating system configurations
User access controls and permissions
Patch management and software updates
security tool kit Design
4.0 Cryptography:
Basic concepts of encryption, decryption, and cryptography
Symmetric and asymmetric encryption algorithms
Public key infrastructure (PKI) and digital certificates
5.0 Web Security:
Common web vulnerabilities (e.g., Cross-Site Scripting, SQL Injection)
Web application security best practices
Secure coding principles and frameworks
6.0 Network Security:
Firewalls and intrusion detection/prevention systems
Virtual Private Networks (VPNs) and secure remote access
Wireless network security
7.0 Malware and Social Engineering:
Types of malwares (e.g., viruses, worms, ransomware)
Anti-malware techniques and tools
Social engineering attacks and countermeasures
8.0 Ethical and Legal Aspects of Cybersecurity:
Ethical hacking and responsible disclosure
Legal and regulatory considerations in cybersecurity
Privacy and data protection laws
9.0 Emerging Trends and Technologies:
Cloud security
Internet of Things (IoT) security
Artificial intelligence and machine learning in cybersecurity
By the end of this course, you will be able to:
Understand key concepts of cybersecurity, networking, and ethical hacking.
Apply cybersecurity principles to real-world systems and scenarios.
Identify and mitigate vulnerabilities in information systems.
Analyse and resolve security issues in networks and applications.
Gain practical exposure to industry-standard tools and defensive strategies.
This programme is ideal for:
Students who have completed O/L or A/L examinations and are waiting for results.
Individuals aspiring to build a career in cybersecurity or ethical hacking
IT support staff and junior tech professionals looking to upskill.
Hybrid (Instructor-led with lab demonstrations and hands-on practice).
For further details, please contact
IIT Professional Development Unit
0770 566 577 | pdu@iit.ac.lk
1.0 Introduction to Cybersecurity:
Definition and scope of cybersecurity
Importance of cybersecurity in modern society
Common cyber threats and attacks
2.0 Information Security:
Confidentiality, integrity, and availability (CIA) triad
Security policies, procedures, and best practices
3.0 Operating System Security:
Secure operating system configurations
User access controls and permissions
Patch management and software updates
security tool kit Design
4.0 Cryptography:
Basic concepts of encryption, decryption, and cryptography
Symmetric and asymmetric encryption algorithms
Public key infrastructure (PKI) and digital certificates
5.0 Web Security:
Common web vulnerabilities (e.g., Cross-Site Scripting, SQL Injection)
Web application security best practices
Secure coding principles and frameworks
6.0 Network Security:
Firewalls and intrusion detection/prevention systems
Virtual Private Networks (VPNs) and secure remote access
Wireless network security
7.0 Malware and Social Engineering:
Types of malwares (e.g., viruses, worms, ransomware)
Anti-malware techniques and tools
Social engineering attacks and countermeasures
8.0 Ethical and Legal Aspects of Cybersecurity:
Ethical hacking and responsible disclosure
Legal and regulatory considerations in cybersecurity
Privacy and data protection laws
9.0 Emerging Trends and Technologies:
Cloud security
Internet of Things (IoT) security
Artificial intelligence and machine learning in cybersecurity
By the end of this course, you will be able to:
Understand key concepts of cybersecurity, networking, and ethical hacking.
Apply cybersecurity principles to real-world systems and scenarios.
Identify and mitigate vulnerabilities in information systems.
Analyse and resolve security issues in networks and applications.
Gain practical exposure to industry-standard tools and defensive strategies.
This programme is ideal for:
Students who have completed O/L or A/L examinations and are waiting for results.
Individuals aspiring to build a career in cybersecurity or ethical hacking
IT support staff and junior tech professionals looking to upskill.
Hybrid (Instructor-led with lab demonstrations and hands-on practice).
For further details, please contact
IIT Professional Development Unit
0770 566 577 | pdu@iit.ac.lk
Share Now
