Start Date
September 2024
Duration
2 Years
Recognition
Approved by UGC
Program Fee
INR 4.3 Lakhs
Average Salary
Average Hike
Median Salary
Median Hike
Hiring Partners
Achieve your career goals
Become a Cloud Solutionist
with greater techno-functional analytics skills
The M.Sc. in Cloud Architecture and Security Program participants in the two years of their tenure and beyond develop deep
Tri-dimensional frameworks to help them solve complex cloud challenges.
Why Cloud Architecture and Security with RACE?
- Develop Full-Stack skills on Cloud Technologies: This unique program will help the learner to design end-to-end cloud solutions and set up multi-modal cloud platforms that are scalable, secure and cost-effective. Access to multi-cloud environment from AWS to Microsoft, where one can experiment and innovate to build hands-on learning.
- Designed for creating Enterprise leaders with futuristic Skills: This program is designed to build enterprise leaders who can empathize with the organizational requirements and design solutions that are optimized in cost, scale, and adaptability.
- Five plus industry certifications along with globally valid master’s program: A well-balanced program curriculum with global cloud certifications from AWS and Microsoft ensures that the learner builds deep technical and functional expertise in in designing cloud solutions and applications in all the enterprise functions based on the business challenges, thus making a solid resume with hands-on skills.
- Deep hands-on industry-grade projects with research and innovation as the focus: At the end of this two-year master’s program, the learners will get to work on 15+ mini-projects, 2+ full-scale projects and research publication(s). These projects will be mentored by industry thought leaders, hence, career transformational.
- Lateral placement with career guidance and support: A vast network of 50+ industry mentors, 100+ marquee organizations as placement partners, 1000+ strong alumni network ensure that all our learners successfully transition into analytics managers during the program. The lateral placement process is uniquely designed with one-on-one career guidance and mentoring sessions, resume-building support, exceptional training, and mock interviews to place each learner nationally and internationally with an average of 50 to 200% increase in salary.
Admissions closes on 21st Sept. 2024
Program feature
Build a lucrative career path in Cybersecurity with the PG Diploma/M.Sc. in Cloud Architecture and Security program. This is a 100% outcome-driven and skill-based program exclusively designed for working professionals in mid and senior positions to accomplish a smooth career transition into the highly rewarding cybersecurity field. The 24-month program is recognised by UGC and focuses on hands-on learning using proprietary or open software tools in the Cloud Security market today.
Industry Thought Leaders
as Mentors
Our industry mentors have decades of experience in the industry and hence participants will receive hands-on experience with various analytics applications to solve real-time business issues.
LMS with the best in
Class Resources
An integrated Learning Management System (LMS) that provides 24/7 access support to aspirants with in-class reading support, interactive resources, real case database datasets, recordings of sessions, and other resources.
Industry Grade
Projects
Real-time case studies with labs and simulations provide hands-on learning opportunities that help participants gain a thorough understanding of the subject and how it is applied in the real world.
Placements
Opportunities
The lateral placement services such as career guidance, resume building, and mock interviews with industry mentors and alumni help our participants to transition their careers and bag lucrative offers.
Curriculum Highlights
- 94 Credits
- 4 Semester
- 15 Modules
- 10+ mini-projects
- 1 Capstone Project with Industry Mentorship
- 5 Global Certifications
- 1 Research Journal Publication
Semester- I
This course introduces basic concepts of the information security CIA triad and focuses on emerging technologies and their connection with cyber security on-premises and in Cloud. The different facets of information security are explained along with the attack vectors for information security. This course covers the skills required to develop a security infrastructure on-premises and in Cloud, recognize threats and vulnerabilities to networks, and mitigate security threats, This course emphasizes core security technologies, the installation, troubleshooting and monitoring of network security devices to maintain integrity, confidentiality and availability of data.
Tools: CISCO Packet Tracer, CISCO Firepower, Wireshark, AWS, Microsoft Azure
This course provides foundational knowledge and skills for Windows/Linux servers. After completing this course, the participants will have a good understanding of operating systems and their importance in the cybersecurity space. They will learn relevant security configurations, file systems, user management and services, and ways to secure the services on promises and in Cloud.
Tools: CentOS Linux, Windows Server 2012, AWS, Microsoft Azure
This course provides knowledge and skills on cloud computing concepts, types of cloud, service models, architecture and design, and security concepts relevant to cloud computing. At the end of the course, the learners will have a deep understanding of the design principles of secure cloud computing and will be able to evaluate cloud service providers.
Tools: AWS, Microsoft Azure
This module covers cloud computing, types of cloud services, core architectural components, compute and networking services, cloud storage services, cloud identity, access, and security, cost management in the cloud, features and tools in the cloud for governance and compliance, features and tools for managing and deploying cloud resources, monitoring tools in cloud.
Certification Exam: Fundamentals of Cloud – AZ900
Tools: Microsoft Azure
This course builds your skills in implementing, managing and monitoring a Microsoft Azure environment. The focus is to learn cloud services such as computing, storage, networking and governance. Various concepts and labs to implement solutions in different scenarios in Azure Cloud will be discussed. At the end of the module, you will be able to manage Azure identities and governance, implement and manage storage, deploy and manage Azure compute resources, configure and manage virtual networking, and monitor and back up Azure resources. This module will culminate in a global certification exam – AZ104.
Tools: Azure Portal, Visual Studio Code
Semester- II
The course covers IT operations, including networking, virtualization, identity, security, business continuity, disaster recovery, data platforms, and governance. They can manage Azure administration, Azure development, and DevOps processes. This course leads to certification AZ305 covering design identity, governance, and monitoring solutions, design data storage solutions, design business continuity solutions, Design infrastructure solutions
Certification Exam: Designing Microsoft Azure Infrastructure Solutions – AZ305
Tools: MS Azure Services
The course covers managing Azure Active Directory (Azure AD) identities, managing secure access by using Azure AD, managing the application process, managing access control, implementing network security, configuring advanced security for computing, managing security operations, configuring centralized policy management, managing threat protection, configure and manage security monitoring solutions, configure security for storage and data, and configure and manage Azure Key Vault.
Certification Exam: Security Engineer- AZ500
Tools: MS Azure Services
The course will help the learners to implement metrics, alarms, and filters by using AWS monitoring and logging services, remediate issues based on monitoring and availability metrics, implement scalability and elasticity, implement high availability and resilient environments, implement backup and restore strategies, provision and maintain cloud resources, automate manual or repeatable processes, implement and manage security and compliance policies, implement data and infrastructure protection strategies, implement networking features and connectivity, configure domains, DNS services, and content delivery, troubleshoot network connectivity issues, implement cost and performance optimization strategies.
Certification Exam: AWS Certified SysOps Administrator – Associate
Tools: AWS
The course will help the learners design secure architectures, resilient architectures, high-performing architectures, and cost-optimized architectures.
Certification Exam: AWS Certified Solutions Architect – Associate
Tools: AWS
This course covers designing and implementing strategies for collaboration, code, infrastructure, source control, security, compliance, continuous integration, testing, delivery, monitoring, and feedback.
Tools: AWS/Azure
Semester- III
This course will cover IAM and its need to implement and maintain controls, creation of Groups, Users & Roles, set up IAM Policies, how to create, modify and apply them within your AWS environment, Multi-Factor Authentication and the best practices, Identity Federation on how external identities (users who do not have IAM user accounts) can access the resources through the use of identity providers, IAM Features and IAM Account settings, the credential report and also how IAM integrates with Key Management Services.
Tools: AWS/Azure
This course is to understand the Governance, Risk and Compliance aspects of Cloud Services. The concepts of this course include cloud computing benefits and risks, risk analysis and design of controls, Identifying risks and value, governance, and compliance, control frameworks and demonstrating compliance, managing compliance and maturity, and managing and planning business continuity in a multi-cloud environment.
Tools: AWS, MS Azure Services
This course covers strategies for safeguarding data, classifying data, ensuring privacy, assuring compliance with regulatory agencies, and working with authorities during legal investigations. The participants will be able to evaluate and implement the security controls necessary to ensure confidentiality, integrity and availability in cloud computing, strategies for protecting data at rest and data in motion, the role of encryption in protecting data and specific strategies for key management.
Semester- IV
The second-year program will culminate in designing, preparing and presenting/publishing a real-time capstone project on a live business challenge. Designing, implementing, deploying and demonstrating an end-to-end cloud solution must be built. The program office will support with mentoring and report writing. The evaluation is based on viva-voce by an industry panel of experts.
Tools: Full Stack
This module credits can be earned by writing and publishing a research paper on the capstone project done in the earlier module. The participant needs to publish or present the paper in a peer-reviewed journal or reputed international conference. The participants will learn skills in research paper writing and publishing/presenting. Note: Second-year capstone project needs to be mandatorily published in a peer-reviewed journal or presented at an international conference.
Google Reviews
Five Global Certifications
AWS Certified Cloud Architecting with certification
The course instructs solutions architects on optimizing AWS Cloud use, comprehending AWS services, and integrating them into cloud solutions, enhancing their proficiency in leveraging cloud infrastructure.
Azure Fundamentals – AZ900 with Certification
The AZ900 certification covers cloud concepts, Azure services, workloads, security, privacy, pricing, and support, providing comprehensive knowledge for understanding and working with Azure.
Azure Developer Associate – AZ204 with Certification
Develop Azure compute solutions, storage, implement security, monitor, troubleshoot, optimize Azure solutions, and connect to Azure services and third-party services
Azure Security Engineer – AZ 500 with Certification
The course entails managing Azure Active Directory identities, securing access, overseeing application processes, access control, network security, advanced compute security and more.
Designing Microsoft Azure Infrastructure Solutions – AZ305 with Certification
This certification aids in crafting secure, scalable, and dependable Azure solutions. Modules encompass logging and monitoring, authentication, authorization, and more.
Five Global Certifications
AWS Certified Cloud Architecting with certification
The course instructs solutions architects on optimizing AWS Cloud use, comprehending AWS services, and integrating them into cloud solutions, enhancing their proficiency in leveraging cloud infrastructure.
Azure Fundamentals – AZ900 with Certification
The AZ900 certification covers cloud concepts, Azure services, workloads, security, privacy, pricing, and support, providing comprehensive knowledge for understanding and working with Azure.
Azure Developer Associate – AZ204 with Certification
Develop Azure compute solutions, storage, implement security, monitor, troubleshoot, optimize Azure solutions, and connect to Azure services and third-party services
Azure Security Engineer – AZ 500 with Certification
The course entails managing Azure Active Directory identities, securing access, overseeing application processes, access control, network security, advanced compute security and more.
Designing Microsoft Azure Infrastructure Solutions – AZ305 with Certification
This certification aids in crafting secure, scalable, and dependable Azure solutions. Modules encompass logging and monitoring, authentication, authorization, and more.
Mentors
Industry mentors are the assets of REVA Academy for Corporate Excellence. The industry experience of our mentors helps the participants to bridge the gap between classroom learning and the industry
Sandeep Vijayaraghavan K
Sandeep is cybersecurity and network security specialist who has successfully delivered several projects to clients from different sectors. Sandeep has expertise in devising and implementing (more…)
Sridhar Govardhan
An expert in information security focused on application vulnerabilities, who spearheads organizational initiatives for building self-defensible enterprise network. With his hands-on knowledge in (more…)
Dr. Ram Kumar G
Dr. Ram Kumar is a seasoned cyber security & risk professional with a 22-year corporate background spanning various multinational companies in diverse sectors. (more…)
Dr. Paras Arora
Dr. Paras’ core expertise is in devising security standards such as ISO 27001and PCI DSS and has proven skills in SoX – 404, Third-Party Vendor Risk Assessment, Business Continuity Management, VAPT, Applications Security Assessments, (more…)
Dr. Soumyo Maity
An expert on Software and Application Security with security development lifecycle (SDL) across large enterprises. Core competence includes Threat modeling, code review, architecture (more…)
Dhruv Kalaan
A young, dynamic Cybersecurity expert, competent in building large-scale resilient systems at scale for complex operations. Dhruv has been an open source proponent and contributor with very deep (more…)
Nishanth Kumar Pathi
Nishanth Kumar Pathi is a seasoned professional with over a decade of experience in technology and architecture. His expertise lies in Cyber Security, Cloud Native Security Ops, Data (more…)
Sivakumar Subramanian
Sivakumar Subramanian is the Global Managing Director at Accenture Security, with over 25 years of experience in cybersecurity and IT leadership. He specializes in building profitable (more…)
Vadivelan Sankar
Vadivelan Sankar is currently the Executive Director at Grant Thornton Bharat LLP, with extensive experience in cybersecurity leadership. He has over 24 years of expertise, specializing (more…)
Nishant Krishna
Nishant is the Co-founder and CTO of Computer Vision and Cybersecurity startup, “TechMachinery Labs”. He is an entrepreneur, Software Architect, Innovator, and Inventor with many (more…)
Ajay Pandey
Ajay Pandey is seasoned security, networking and IT strategy professional with entrepreneurial zeal. Ajay is specialized in networking, security and criminal law, IPR with several global (more…)
Rajiv R Chetwani
He has adorned various other coveted positions at ISRO Satellite Centre, Bengaluru. He has received ISRO’s team excellence award for 2015. In July 2015, he became a part of Mars Orbiter Mission Testing Team. He is the recipient of (more…)
Chinmay Hegde
Chinmay has worked for global security giants including McAfee, Symantec and Cisco. Chinmay possesses expertise in the area of Security Analytics, Security Compliance Enforcement, and Dynamic (more…)
Dr. Sai Sushanth
A cyber law expert and techno-legal consultant. He is a law graduate who has completed a master’s in cyber law and cybersecurity from the National Law University, Jodhpur. Sushanth is one of the 45 Cyber Law Compliance Auditors in (more…)
Unnikrishnan P
Unnikrishnan is focused on building and delivering cybersecurity capabilities to improve the cyber risk posture of the clients across industry sectors. His core expertise is in the area of Information Security Consulting, Transaction & (more…)
Ashok Sharma
Ashok is a cybersecurity expert who has competency in shaping most of the dynamic security solutions and products. His experience is mainly in leading R & D teams in Check Point, Wipro, and Nokia, and advocates cybersecurity platforms (more…)
Aditya Jain
Aditya is seasoned cybersecurity professional with core expertise in the banking, financial services, energy, automobile, government, military, telecom, and utility sectors in penetration testing. He holds extensive experience in (more…)
Mahesh Paradkar
Mahesh heads the IBM Security Labs in Pune and has the functional responsibility of Encryption and Key Management IBM Security products. He plays an instrumental role in establishing relationships with academic institutions, (more…)
Continuous Evaluation
This is a globally accredited program to make the participants truly global citizens. At par with international standards and to provide opportunities for global mobility to our participants, we follow an outcome-based education system (OBE). Experiential learning and project-based pedagogy have been employed in the design and delivery of the program.
The objective of module assessment and evaluation is to objectively assess the learners of the program on their ability to apply the concepts, modeling techniques in various domains and verticals for different business scenarios through a continuous evaluation framework throughout the program. Detailed regulations on earning the credits and GPA’s will be shared during the program.
Admission Process
-
Register by filling up the
online application form -
Go through the documentation process and a screening call with the Director’s office.
-
If selected, you will receive an ‘offer of admission’ letter for the upcoming cohort. Secure your seat by paying the admission fee.
Merit Scholarship
for those who scored
60%
and above in their pre-qualifying exam
Early bird/group/referral
discounts are also available.
Admission Process
Financial assistance and Educational Loans from NBFC’s and Banks are available with interest rate ranging from 9 to 14%. These financial institutions will allow you to repay the educational loan in easy installments and income tax benefits.
Avail hassle-free educational loan to help you to join our Master’s programs to power up your skills to build your dream career.