Start Date
February 2026
Duration
2 Years
Recognition
Approved by AICTE
Program Fee
INR 6.0 Lakhs
Average Salary
Average Hike
Median Salary
Median Hike
Hiring Partners
Achieve your career goals
Program feature
Build a lucrative career path in Cybersecurity with the M.Tech. in Cybersecurity program. This is a 100% outcome-driven and skill-based program exclusively designed for working professionals in mid and senior positions to accomplish a smooth career transition into the highly rewarding cybersecurity field. The 24-month program is recognised by AICTE and focuses on hands-on learning using proprietary or open software tools in the Cybersecurity market today.
Industry Thought Leaders
as Mentors
Our industry mentors have decades of experience in the industry and hence participants will receive hands-on experience with various analytics applications to solve real-time business issues.
LMS with the best in
Class Resources
An integrated Learning Management System (LMS) that provides 24/7 access support to aspirants with in-class reading support, interactive resources, real case database datasets, recordings of sessions, and other resources.
Industry Grade
Projects
Real-time case studies with labs and simulations provide hands-on learning opportunities that help participants gain a thorough understanding of the subject and how it is applied in the real world.
Placements
Opportunities
The lateral placement services such as career guidance, resume building, and mock interviews with industry mentors and alumni help our participants to transition their careers and bag lucrative offers.
Why Cybersecurity with RACE?
- Gain hands-on experience: Undergoes practical training in various security technologies to defend, detect or monitor security threats
- Execute a cybersecurity plan: Create and execute a robust cyber incident response plan, information security governance, risk management, and security compliance
- Develop privacy policies: Develop information security policies and procedures to protect the enterprise from existing and emerging cyber threats
- Gain expertise: Manage stakeholders in the enterprise and be the subject matter expert in cybersecurity

Hurry! Limited Seats Available
Curriculum Highlights
- 72 Credits
- 4 Semester
- 16 Modules
- 10+ mini-projects
- 2 Capstone Projects with Industry Mentorship
- 3 Global Certifications
- 1 Research Journal Publication
Semester- I
This module builds a strong foundation in networking concepts and protocols, covering OSI/TCP-IP models, IP addressing, routing, switching, and core network services. Learners explore essential network security threats and controls, including VPNs, wireless security, and secure network design. The course also introduces firewalls, IDS/IPS, SIEM, and monitoring tools, along with infrastructure hardening using industry benchmarks for on-prem, cloud, and hybrid environments.
Toolkits: Wireshark, Nmap, Cisco Packet Tracer, pfSense Firewall
This module explores the fundamental principles and practices for securing operating systems and web applications against modern threats. It focuses on hardening Linux and Windows systems, securing processes, access controls, and file systems, along with identifying vulnerabilities in web technologies such as HTTP, HTML, JavaScript, and server-side components. Learners will gain hands-on experience with common web attacks like SQL injection, XSS, CSRF, and techniques for secure coding and application hardening. The course integrates tools like OWASP ZAP, Burp Suite, and system-level security configurations to build defensive skills across endpoints and applications.
Toolkits: Burp Suite, OWASP ZAP, Kali Linux, Metasploit, Docker
This course equips learners with practical knowledge and hands-on skills in identifying, assessing, and mitigating vulnerabilities and threats in IT environments. Structured around the EC-Council’s CEH certification domains, it focuses on ethical hacking techniques, vulnerability analysis, enumeration, system hacking, malware threats, sniffing, social engineering, DoS attacks, session hijacking, and web server/application exploits. The course emphasizes ethical standards and industry tools used by security professionals to secure and test networks and systems. At the end of the course, learners are required to clear the CEH theory certification exam to demonstrate their competence.
Aligned Certification: EC-Council Certified Ethical Hacker (CEH) – Theory Exam Mandatory
Toolkits: Nessus, OpenVAS, Nexpose, Kali Linux toolkit
This course provides a deep dive into advanced penetration testing techniques aligned with the OSCP certification. Learners will develop hands-on skills in performing real-world attacks on various platforms, including Windows and Linux environments. The course covers the full attack lifecycle—information gathering, enumeration, exploitation, privilege escalation, post-exploitation, and reporting. It emphasizes a methodology-driven, adversarial mindset while following ethical hacking principles. Learners will be trained to write professional penetration test reports and work within a legal and responsible framework.
Aligned Certification: Offensive Security Certified Professional (OSCP) – Theory and Lab-Based Preparation (Exam is internally conducted)
Toolkits: Metasploit, Hydra, John the Ripper, ExploitDB, Pwntools
Semester- II
This course equips learners with the methodologies and tools to identify, model, and manage cyber threats and risks across systems, applications, and enterprises. It covers threat modeling frameworks like STRIDE and MITRE ATT&CK, risk analysis methods including quantitative and qualitative approaches, and risk mitigation strategies mapped to governance and compliance standards. learners will learn to design threat models for real-world systems and conduct risk assessments aligned to organizational and regulatory requirements, enabling proactive defense and decision-making.
Aligned Frameworks: STRIDE, DREAD, MITRE ATT&CK, NIST Risk Management Framework (RMF), ISO/IEC 27005
Toolkits: Microsoft Threat Modeling Tool, STRIDE, DREAD, RiskLens
This course equips the learners with the skills required to detect, investigate, respond to, and remediate threats using Microsoft Defender for Endpoint, Microsoft Defender for Identity, Microsoft Defender for Cloud Apps, and Microsoft Sentinel. It covers the practical use of Microsoft’s extended detection and response (XDR) and SIEM solutions, focusing on real-time threat detection, automation, and incident response. The course prepares learners for the Microsoft SC-200 certification exam by emphasizing hands-on labs and case-based threat analysis.
Aligned with Microsoft SC-200 – Mandatory Exam
Toolkits: Azure Sentinel, Splunk, Elastic SIEM, QRadar
This course focuses on developing capabilities to collect, analyze, and operationalize cyber threat intelligence (CTI), and perform proactive threat hunting within enterprise environments. Students will learn to identify adversary behaviors using frameworks like MITRE ATT&CK and Diamond Model, use IOC and TTP-based intelligence, and conduct hunts across endpoints, networks, and cloud systems. The course includes threat attribution, use of threat intelligence platforms, hypothesis-based hunting, and integration of CTI into SOC workflows. Learners will use real-world tools and threat feeds to gain actionable insights and defend against advanced persistent threats (APTs).
Toolkits: MISP, AlienVault OTX, TheHive, YARA, Zeek (Bro)
AI in cybersecurity refers to the use of intelligent systems and machine-learning algorithms to automatically detect, analyze, predict, and respond to cyber threats by continuously monitoring data, identifying suspicious patterns, learning from past attacks, and adapting security defenses in real time to protect networks, systems, and digital assets from evolving threats.
Toolkits: Python (Scikit-learn, TensorFlow, PyTorch), Jupyter, AWS, Azure
The Cybersecurity capstone project focuses on identifying a real-world, industry-relevant problem and designing a practical security solution. Learners analyze the problem, architect and implement a working demo or proof-of-concept, and document the approach as a detailed case study. The project strengthens hands-on execution, problem-solving, and cybersecurity consulting skills.
Semester- III
This course, through Cyber range, establishes its foundation on a Purple Theme to allow participants to learn both red and blue skills, thus preparing them to build a resilient defence architecture while anticipating every move of a hacker. They will be able to detect threats that were not blocked, understand patterns in the security data. With a variety of attacks and other scenarios, the organisations can test the resistance of their defence team by pushing it to its maximum capabilities. They can do early detection of a potential attack and understand the sequence patterns.
Secure Coding: Focuses on developing secure, resilient software by preventing common vulnerabilities such as injection, authentication flaws, and insecure data handling. Learners apply industry secure coding standards across modern languages and frameworks.
DevSecOps: Emphasizes integrating security into DevOps pipelines through automation, CI/CD security controls, and infrastructure as code. Learners implement shift-left security practices across cloud-native and containerized environments.
Threat Modeling: Covers structured methods to identify, analyze, and mitigate security threats during system and application design. Learners use proven frameworks to proactively reduce risk before deployment.
API Security: Addresses securing APIs against modern threats including broken authentication, excessive data exposure, and abuse. Learners implement authentication, authorization, rate limiting, and API testing best practices.
Toolkits: SonarQube, Checkmarx, GitHub Security, Burp Suite, OWASP Threat Dragon
SIEM & SOAR: Focuses on centralized security monitoring, alert correlation, and automated incident response using SIEM and SOAR platforms. Learners design detection use cases and response workflows for enterprise SOC environments.
Digital Forensics: Covers techniques for evidence acquisition, analysis, and reporting across endpoints, servers, and networks. Learners develop skills to support investigations, legal processes, and incident response.
Cyber Range: Provides hands-on, simulated attack and defense environments to practice real-world cybersecurity scenarios. Learners build operational readiness through controlled, high-impact simulations.
Red Teaming: Focuses on adversary-driven security testing to evaluate an organization’s detection and response capabilities. Learners simulate real-world attack techniques to identify gaps and improve defensive posture.
Toolkits: Splunk Phantom (SOAR), ELK Stack, Autopsy, FTK Imager, Cuckoo Sandbox
Privacy & Data Protection: Explores principles of data privacy, protection laws, and compliance requirements. Learners understand how to design systems that safeguard personal and sensitive data.
Business Continuity & Disaster Recovery (BCP/DR): Covers planning and implementation of continuity and recovery strategies to ensure business resilience. Learners design and test recovery plans aligned with organizational risk appetite.
Cloud & AI Governance: Focuses on governing security, risk, and compliance in cloud platforms and AI systems. Learners address policy design, accountability, and regulatory considerations for emerging digital environments.
Toolkits: Archer GRC, OneTrust
Post-Quantum Cryptography: Introduces cryptographic risks posed by quantum computing and next-generation encryption approaches. Learners evaluate quantum-resistant algorithms and transition strategies.
Blockchain Security: Covers security risks and controls in blockchain platforms, smart contracts, and decentralized applications. Learners assess vulnerabilities and apply secure design principles.
Identity & Access Management (IAM): Focuses on managing digital identities, authentication, authorization, and access controls across enterprise systems. Learners design IAM solutions supporting zero-trust architectures.
Toolkits: Ghidra, IDA Free, Hyperledger Fabric, Truffle, HashiCorp Vault, Post-Quantum Crypto Libraries
Semester- IV
The second year culminates in a major, industry-scale capstone project addressing an end-to-end cybersecurity challenge. Learners identify a complex, real-world problem, design and implement a comprehensive solution, and demonstrate a working system with clear industry relevance—significantly broader in scope than the first-year project. With structured mentoring and report-writing support from the program office, the project concludes with a viva-voce evaluation conducted by an expert industry panel over a focused two-month duration.
Toolkits: GitHub, JIRA, Docker/Kubernetes, Cloud Platforms (AWS/Azure/GCP)
This module guides learners through converting their capstone project into a publishable research paper suitable for Scopus-indexed journals. Participants are mentored on research structuring, methodology articulation, results analysis, plagiarism compliance, and journal selection. The module strengthens academic writing, peer-review readiness, and research dissemination skills, enabling learners to achieve a credible international publication aligned with industry-driven cybersecurity research.
Google Reviews
Partners
This program is powered by various globally renowned marquee organizations. RACE, REVA University is an academic partner for EC-Council, PurpleSynapz, AWS, Microsoft, CloudxLabs, and others. Cybersecurity participants will get unlimited access to our academic partners’ ecosystem which includes the Cloud labs access, Course Materials, Partners’ LMS, Placement services, mentoring sessions, and more.

EC-Council is the world’s largest certification body for Information Security professionals. EC-Council certifies individuals in information security and e-business skills. It has been certified by American National Standards Institute to meet ANSI 17024 standards and offers programs in 107 countries. The Information Security community considers EC-Council as its most trusted source for vendor-neutral Information Security.

Microsoft Azure is the leading cloud platform and productivity company for the mobile-first, cloud-first world, and its mission is to empower every person and every organization on the planet to achieve more. Through this partnership, our participants will get access to their 100’s of courses, certification opportunities, and placement services. Cloud labs with credits will be provided to practice the real-time deployment of projects.

Terralogic is a USA-based well-known software and IT services company, an expert in IoT, Cloud, DevOps, App development, Cybersecurity, and many others. Terralogic is the knowledge partner for RACE Cybersecurity programs, helping us to build cyber professionals with deep technical understanding. The Terralogic team supports us in creating the right ecosystem of industry partners, tools, platforms, domain understanding, etc.

PurpleSynapz is one of the niche cybersecurity training and solution builders, RACE programs deploy their Purple Range (Cyber Range), a hyper-realistic simulation platform designed for modern teams to learn the best Infosec skills by fighting real-world cybersecurity attacks. Our participants will get to team up on 20+ inbuilt real-world attack scenarios and launch a variety of realistic cyber-attacks to test team readiness and approach.

AWS Academy partnership provides course materials to our participants to pursue industry-recognized certifications and in-demand Cloud / Analytics / Artificial Intelligence / Machine Learning jobs. AWS curriculum helps the learners to stay at the forefront of AWS Cloud innovations. The learners will get access to the cloud environment to build and deploy cloud solutions.

Partners
This program is powered by various globally renowned marquee organizations. RACE, REVA University is an academic partner for EC-Council, PurpleSynapz, AWS, Microsoft, CloudxLabs, and others. Cybersecurity participants will get unlimited access to our academic partners’ ecosystem which includes the Cloud labs access, Course Materials, Partners’ LMS, Placement services, mentoring sessions, and more.

EC-Council is the world’s largest certification body for Information Security professionals. EC-Council certifies individuals in information security and e-business skills. It has been certified by American National Standards Institute to meet ANSI 17024 standards and offers programs in 107 countries. The Information Security community considers EC-Council as its most trusted source for vendor-neutral Information Security.

Microsoft Azure is the leading cloud platform and productivity company for the mobile-first, cloud-first world, and its mission is to empower every person and every organization on the planet to achieve more. Through this partnership, our participants will get access to their 100’s of courses, certification opportunities, and placement services. Cloud labs with credits will be provided to practice the real-time deployment of projects.

Terralogic is a USA-based well-known software and IT services company, an expert in IoT, Cloud, DevOps, App development, Cybersecurity, and many others. Terralogic is the knowledge partner for RACE Cybersecurity programs, helping us to build cyber professionals with deep technical understanding. The Terralogic team supports us in creating the right ecosystem of industry partners, tools, platforms, domain understanding, etc.

PurpleSynapz is one of the niche cybersecurity training and solution builders, RACE programs deploy their Purple Range (Cyber Range), a hyper-realistic simulation platform designed for modern teams to learn the best Infosec skills by fighting real-world cybersecurity attacks. Our participants will get to team up on 20+ inbuilt real-world attack scenarios and launch a variety of realistic cyber-attacks to test team readiness and approach.

AWS Academy partnership provides course materials to our participants to pursue industry-recognized certifications and in-demand Cloud / Analytics / Artificial Intelligence / Machine Learning jobs. AWS curriculum helps the learners to stay at the forefront of AWS Cloud innovations. The learners will get access to the cloud environment to build and deploy cloud solutions.

Mentors
Industry mentors are the assets of REVA Academy for Corporate Excellence. The industry experience of our mentors helps the participants to bridge the gap between classroom learning and the industry
Sandeep Vijayaraghavan K
A cybersecurity and cloud security expert at Terralogic Inc., with over 20 years of industry experience. Specializes in cyber (more…)
Sridhar Govardhan
With 24 years of experience in information security, he currently leads as Head of Information Security, driving data (more…)
Dr. Ram Kumar G
A digital transformation-focused cybersecurity leader with 20+ years of global experience across MNCs, (more…)
Dr. Paras Arora
With 17+ years of experience, Dr. Paras leads Microsoft’s Azure team as a coach, mentor, and business architect, driving global initiatives and ensuring real-world (more…)
Dr. Soumyo Maity
As a Distinguished Member of Technical Staff at Dell, he leads product security strategies that safeguard 10,000+ (more…)
Dhruv Kalaan
Dhruv is a dynamic cybersecurity leader with deep expertise in incident management, threat intelligence, and forensics across cloud and on-premise (more…)
Nishanth Kumar Pathi
A Solutions Architect with 15 years of experience, specializing in Cybersecurity, Data Privacy, Cloud Automation, (more…)
Manoj Sharma
With over two decades of cybersecurity expertise, he leads SISA’s training initiatives as Director of Training and (more…)
Sivakumar Subramanian
IT Leader with 25+ years of global experience in building high-impact cybersecurity business units and trusted (more…)
Vishal Pradhan
He is a Purple Team Engineer driven by a passion to deliver a 360-degree perspective on security, aiming to equip security enthusiasts with the insights (more…)
Abid Ahmed
An excellent communicator with 15+ years of experience in the IT industry, including roles as a Technical Lead, Consultant, and Corporate Trainer. (more…)
Vadivelan Sankar
Co-Founder and CEO of Cyberium Labs Pvt. Ltd., he brings 24+ years of expertise in Red Teaming, penetration testing, and digital forensics. A licensed pentester (more…)
Nishant Krishna
Nishant is the Co-founder and CTO of Computer Vision and Cybersecurity startup, “TechMachinery Labs”. (more…)
Rajiv R Chetwani
He has adorned various other coveted positions at ISRO Satellite Centre, Bengaluru. He has received ISRO’s team excellence award for 2015. (more…)
Chinmay Hegde
Chinmay has worked for global security giants including McAfee, Symantec and Cisco. Chinmay possesses expertise in (more…)
Dr. Sai Sushanth
A cyber law expert and techno-legal consultant. He is a law graduate who has completed a master’s in cyber law and cybersecurity from the National Law (more…)
Unnikrishnan P
Unnikrishnan is focused on building and delivering cybersecurity capabilities to improve the cyber risk posture of the clients across industry sectors. (more…)
Ashok Sharma
Ashok is a cybersecurity expert who has competency in shaping most of the dynamic security solutions and products. His experience is mainly in leading R & D (more…)
Mahesh Paradkar
Mahesh heads the IBM Security Labs in Pune and has the functional responsibility of Encryption and Key Management IBM Security products. He plays an (more…)
Continuous Evaluation
This is a globally accredited program to make the participants truly global citizens. At par with international standards and to provide opportunities for global mobility to our participants, we follow an outcome-based education system (OBE). Experiential learning and project-based pedagogy have been employed in the design and delivery of the program.
The objective of module assessment and evaluation is to objectively assess the learners of the program on their ability to apply the concepts, modeling techniques in various domains and verticals for different business scenarios through a continuous evaluation framework throughout the program. Detailed regulations on earning the credits and GPA’s will be shared during the program.

Admission Process
-
Register by filling up the
online application form -
Go through the documentation process and a screening call with the Director’s office.
-
If selected, you will receive an ‘offer of admission’ letter for the upcoming cohort. Secure your seat by paying the admission fee.
Merit Scholarship
for those who scored
60%
and above in their in their UG.
Early bird/group/referral
discounts are also available.
Admission Process
Financial assistance and Educational Loans from NBFC’s and Banks are available with interest rate ranging from 9 to 14%. These financial institutions will allow you to repay the educational loan in easy installments and income tax benefits.
Avail hassle-free educational loan to help you to join our Master’s programs to power up your skills to build your dream career.


























