Start Date
September 2025
Duration
2 Years
Recognition
Approved by AICTE
Program Fee
INR 6.0 Lakhs
Average Salary
Average Hike
Median Salary
Median Hike
Hiring Partners
Achieve your career goals
Program feature
Build a lucrative career path in Cybersecurity with the M.Tech. in Cybersecurity program. This is a 100% outcome-driven and skill-based program exclusively designed for working professionals in mid and senior positions to accomplish a smooth career transition into the highly rewarding cybersecurity field. The 24-month program is recognised by AICTE and focuses on hands-on learning using proprietary or open software tools in the Cybersecurity market today.
Industry Thought Leaders
as Mentors
Our industry mentors have decades of experience in the industry and hence participants will receive hands-on experience with various analytics applications to solve real-time business issues.
LMS with the best in
Class Resources
An integrated Learning Management System (LMS) that provides 24/7 access support to aspirants with in-class reading support, interactive resources, real case database datasets, recordings of sessions, and other resources.
Industry Grade
Projects
Real-time case studies with labs and simulations provide hands-on learning opportunities that help participants gain a thorough understanding of the subject and how it is applied in the real world.
Placements
Opportunities
The lateral placement services such as career guidance, resume building, and mock interviews with industry mentors and alumni help our participants to transition their careers and bag lucrative offers.
Why Cybersecurity with RACE?
- Gain hands-on experience: Undergoes practical training in various security technologies to defend, detect or monitor security threats
- Execute a cybersecurity plan: Create and execute a robust cyber incident response plan, information security governance, risk management, and security compliance
- Develop privacy policies: Develop information security policies and procedures to protect the enterprise from existing and emerging cyber threats
- Gain expertise: Manage stakeholders in the enterprise and be the subject matter expert in cybersecurity

Hurry! Limited Seats Available
Curriculum Highlights
- 72 Credits
- 4 Semester
- 16 Modules
- 10+ mini-projects
- 2 Capstone Projects with Industry Mentorship
- 3 Global Certifications
- 1 Research Journal Publication
Semester- I
This course introduces basic concepts of Information Security, CIA triad and focuses on emerging technologies and their connection with Cyber Security. The different facets of Information Security are explained along with the attack vectors for information security. This course covers the skills required to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats, This course emphasizes core security technologies, the installation, troubleshooting and monitoring of network security devices to maintain integrity, confidentiality and availability of data.
Tools: CISCO Packet Tracer, CISCO Firepower, Wireshark
This course provides foundational knowledge and skills for Windows/Linux server platform. After completing this course, the participants will have an of operating systems and their importance in the cybersecurity space. They will learn relevant security configurations, file systems, user management and services along with ways to secure the services.
Tools: CentOS Linux, Windows Server 2012
an enterprise network environment that must be attacked, exploited, evaded, and defended. CPENT’s live practice range will provide in-depth skills not only on working on flat networks but also on to the next level by teaching you how to pentest IoT systems, OT systems, how to write your exploits, build your tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and also customize scripts/exploits to get into the innermost segments of the network.
Semester- II
The SOC management course is to master Tier I and Tier II SOC analyst roles to achieve proficiency in performing SOC operations. Gain Knowledge of SOC processes, procedures, technologies, and workflows. At the end of the course, the learners will recognize attacker tools, tactics and procedures to identify indicators of compromise (IOCs). They will gain experience and extensive knowledge in Security Information and Event Management (SIEM). The learners will be able to develop threat cases (correlation rules), create reports, plan, organize, and perform threat monitoring and analysis in the enterprise, prepare briefings, and reports of analysis methodology and results with an understanding of SOC and IRT collaboration for better incident response.
Tools: Practice Labs on four SIEM Tools; Splunk, ArcSight, OSIM, Azure Sentinal.
The module is an instructor-led course leading to certification. The course covers manage identity and access, implement platform protection, manage security operations, and secure data and applications through MS Azure Cloud’s inbuilt features.
Tools: MS Azure Sentinel, Key Vault and other features Leading to certification Microsoft SC-200.
This module aims to build hands-on skills on conducting threat intelligence and hunting after the attack. The topics include Introduction to Threat Intelligence -Life cycle and Frameworks, Data Collection and Processing – Feeds and Sources, Bulk Data Processing and Exploitation, Threat Analysis – Process, Run Books and Knowledge Base, Intelligence Reporting and Dissemination – Threat Intel Reports, Dissemination Practices, and more.
Tools: Ubuntu Machines, Web-based tools for scraping and detection.
The first-year cybersecurity capstone project is designed to ensure a detailed scenario-based analysis of industry-specific challenges in Cybersecurity. It involves identifying potential opportunities as suggested by the mentors and designing solutions and preparing a detailed analysis of the same along with presenting an elaborate case study with implementation. The objective is to develop execution and consulting capabilities for the topics at hand.
Tools: Full-stack
Semester- III
- Secure Coding & Code Review
- DevSecOps
- Secure Design and Threat Modeling
- Mobile, Web and API Security
- Advanced SIEM and SOAR
- Digital Forensics and Incident Response
- Cyber Range and Red Team Simulations
- Malware Reverse Engineering
- SOC Automation and Metrics
- GRC and Audit Frameworks
- Data Privacy and Protection
- Business Continuity and Disaster Recovery
- Cloud Security Governance
- AI Security Governance
- Post-Quantum Cryptography
- Blockchain and Distributed Ledger Security
- Identity and Access Management
Semester- IV
The second-year program will culminate in designing, preparing, demonstrating, and presenting a real-time capstone project on an end-to-end cybersecurity challenge. The scope and industry applications of the project need to be larger than the first-year project. The program office will support with mentoring and report writing. The evaluation is based on viva-voce by an industry panel of experts. The duration of the second-year capstone project is two months.
Tools: Full Stack
This module credits can be earned by writing and publishing a research paper on the capstone project done in the earlier module. The participant needs to publish or present the paper in a peer-reviewed journal or reputed international conference. The participants will learn skills in research paper writing and publishing/presenting. Note: Second-year capstone project needs to be mandatorily published in a peer-reviewed journal or presented at an international conference.
Google Reviews
Partners
This program is powered by various globally renowned marquee organizations. RACE, REVA University is an academic partner for EC-Council, PurpleSynapz, AWS, Microsoft, CloudxLabs, and others. Cybersecurity participants will get unlimited access to our academic partners’ ecosystem which includes the Cloud labs access, Course Materials, Partners’ LMS, Placement services, mentoring sessions, and more.

EC-Council is the world’s largest certification body for Information Security professionals. EC-Council certifies individuals in information security and e-business skills. It has been certified by American National Standards Institute to meet ANSI 17024 standards and offers programs in 107 countries. The Information Security community considers EC-Council as its most trusted source for vendor-neutral Information Security.

Microsoft Azure is the leading cloud platform and productivity company for the mobile-first, cloud-first world, and its mission is to empower every person and every organization on the planet to achieve more. Through this partnership, our participants will get access to their 100’s of courses, certification opportunities, and placement services. Cloud labs with credits will be provided to practice the real-time deployment of projects.

Terralogic is a USA-based well-known software and IT services company, an expert in IoT, Cloud, DevOps, App development, Cybersecurity, and many others. Terralogic is the knowledge partner for RACE Cybersecurity programs, helping us to build cyber professionals with deep technical understanding. The Terralogic team supports us in creating the right ecosystem of industry partners, tools, platforms, domain understanding, etc.

PurpleSynapz is one of the niche cybersecurity training and solution builders, RACE programs deploy their Purple Range (Cyber Range), a hyper-realistic simulation platform designed for modern teams to learn the best Infosec skills by fighting real-world cybersecurity attacks. Our participants will get to team up on 20+ inbuilt real-world attack scenarios and launch a variety of realistic cyber-attacks to test team readiness and approach.

AWS Academy partnership provides course materials to our participants to pursue industry-recognized certifications and in-demand Cloud / Analytics / Artificial Intelligence / Machine Learning jobs. AWS curriculum helps the learners to stay at the forefront of AWS Cloud innovations. The learners will get access to the cloud environment to build and deploy cloud solutions.

Partners
This program is powered by various globally renowned marquee organizations. RACE, REVA University is an academic partner for EC-Council, PurpleSynapz, AWS, Microsoft, CloudxLabs, and others. Cybersecurity participants will get unlimited access to our academic partners’ ecosystem which includes the Cloud labs access, Course Materials, Partners’ LMS, Placement services, mentoring sessions, and more.

EC-Council is the world’s largest certification body for Information Security professionals. EC-Council certifies individuals in information security and e-business skills. It has been certified by American National Standards Institute to meet ANSI 17024 standards and offers programs in 107 countries. The Information Security community considers EC-Council as its most trusted source for vendor-neutral Information Security.

Microsoft Azure is the leading cloud platform and productivity company for the mobile-first, cloud-first world, and its mission is to empower every person and every organization on the planet to achieve more. Through this partnership, our participants will get access to their 100’s of courses, certification opportunities, and placement services. Cloud labs with credits will be provided to practice the real-time deployment of projects.

Terralogic is a USA-based well-known software and IT services company, an expert in IoT, Cloud, DevOps, App development, Cybersecurity, and many others. Terralogic is the knowledge partner for RACE Cybersecurity programs, helping us to build cyber professionals with deep technical understanding. The Terralogic team supports us in creating the right ecosystem of industry partners, tools, platforms, domain understanding, etc.

PurpleSynapz is one of the niche cybersecurity training and solution builders, RACE programs deploy their Purple Range (Cyber Range), a hyper-realistic simulation platform designed for modern teams to learn the best Infosec skills by fighting real-world cybersecurity attacks. Our participants will get to team up on 20+ inbuilt real-world attack scenarios and launch a variety of realistic cyber-attacks to test team readiness and approach.

AWS Academy partnership provides course materials to our participants to pursue industry-recognized certifications and in-demand Cloud / Analytics / Artificial Intelligence / Machine Learning jobs. AWS curriculum helps the learners to stay at the forefront of AWS Cloud innovations. The learners will get access to the cloud environment to build and deploy cloud solutions.

Mentors
Industry mentors are the assets of REVA Academy for Corporate Excellence. The industry experience of our mentors helps the participants to bridge the gap between classroom learning and the industry

Sandeep Vijayaraghavan K
A cybersecurity and cloud security expert at Terralogic Inc., with over 20 years of industry experience. Specializes in cyber (more…)

Sridhar Govardhan
With 24 years of experience in information security, he currently leads as Head of Information Security, driving data (more…)

Dr. Ram Kumar G
A digital transformation-focused cybersecurity leader with 20+ years of global experience across MNCs, (more…)

Dr. Paras Arora
With 17+ years of experience, Dr. Paras leads Microsoft’s Azure team as a coach, mentor, and business architect, driving global initiatives and ensuring real-world (more…)

Dr. Soumyo Maity
As a Distinguished Member of Technical Staff at Dell, he leads product security strategies that safeguard 10,000+ (more…)

Dhruv Kalaan
Dhruv is a dynamic cybersecurity leader with deep expertise in incident management, threat intelligence, and forensics across cloud and on-premise (more…)

Nishanth Kumar Pathi
A Solutions Architect with 15 years of experience, specializing in Cybersecurity, Data Privacy, Cloud Automation, (more…)

Manoj Sharma
With over two decades of cybersecurity expertise, he leads SISA’s training initiatives as Director of Training and (more…)

Sivakumar Subramanian
IT Leader with 25+ years of global experience in building high-impact cybersecurity business units and trusted (more…)

Vishal Pradhan
He is a Purple Team Engineer driven by a passion to deliver a 360-degree perspective on security, aiming to equip security enthusiasts with the insights (more…)

Abid Ahmed
An excellent communicator with 15+ years of experience in the IT industry, including roles as a Technical Lead, Consultant, and Corporate Trainer. (more…)

Vadivelan Sankar
Co-Founder and CEO of Cyberium Labs Pvt. Ltd., he brings 24+ years of expertise in Red Teaming, penetration testing, and digital forensics. A licensed pentester (more…)

Nishant Krishna
Nishant is the Co-founder and CTO of Computer Vision and Cybersecurity startup, “TechMachinery Labs”. (more…)

Rajiv R Chetwani
He has adorned various other coveted positions at ISRO Satellite Centre, Bengaluru. He has received ISRO’s team excellence award for 2015. (more…)

Chinmay Hegde
Chinmay has worked for global security giants including McAfee, Symantec and Cisco. Chinmay possesses expertise in (more…)

Dr. Sai Sushanth
A cyber law expert and techno-legal consultant. He is a law graduate who has completed a master’s in cyber law and cybersecurity from the National Law (more…)

Unnikrishnan P
Unnikrishnan is focused on building and delivering cybersecurity capabilities to improve the cyber risk posture of the clients across industry sectors. (more…)

Ashok Sharma
Ashok is a cybersecurity expert who has competency in shaping most of the dynamic security solutions and products. His experience is mainly in leading R & D (more…)

Mahesh Paradkar
Mahesh heads the IBM Security Labs in Pune and has the functional responsibility of Encryption and Key Management IBM Security products. He plays an (more…)
Continuous Evaluation
This is a globally accredited program to make the participants truly global citizens. At par with international standards and to provide opportunities for global mobility to our participants, we follow an outcome-based education system (OBE). Experiential learning and project-based pedagogy have been employed in the design and delivery of the program.
The objective of module assessment and evaluation is to objectively assess the learners of the program on their ability to apply the concepts, modeling techniques in various domains and verticals for different business scenarios through a continuous evaluation framework throughout the program. Detailed regulations on earning the credits and GPA’s will be shared during the program.

Admission Process
-
Register by filling up the
online application form -
Go through the documentation process and a screening call with the Director’s office.
-
If selected, you will receive an ‘offer of admission’ letter for the upcoming cohort. Secure your seat by paying the admission fee.
Merit Scholarship
for those who scored
60%
and above in their pre-qualifying exam
Early bird/group/referral
discounts are also available.
Admission Process
Financial assistance and Educational Loans from NBFC’s and Banks are available with interest rate ranging from 9 to 14%. These financial institutions will allow you to repay the educational loan in easy installments and income tax benefits.
Avail hassle-free educational loan to help you to join our Master’s programs to power up your skills to build your dream career.