PG Diploma/M.Tech B.E./B.Tech in CSE/ISE/IT/ECE/EEE or M.Sc. in CS/IS/IT/Mathematics or MCA
PG Diploma/M.Sc. BCA/B.Sc. in IT/CS/Electronics or B.Com/BBA with Computer Applications they must have studied Mathematics or Statistics at +2 level (Mandatory) or Any B.E/B.Tech Degree
A bespoke M.Tech/M.Sc. in Cybersecurity program powered by EC-Council, Microsoft Azure Cloud, and Terralogic Inc. designed by industry thought leaders and delivered by REVA Academy for Corporate Excellence. REVA Academy for Corporate Excellence- RACE, REVA University, Bengaluru helps you fast track your career journey to the top echelons of organizations of tomorrow. Explore the most advanced and improved version of the Master’s program in Cybersecurity designed for CISOs of tomorrow.
The participants will get access to the state-of-the-art infrastructure deployed to reproduce a real-time simulator-like environment to defend against cyberattack scenarios.
Trainers are industry professionals with more than a decade of experience in deploying security solutions to clients and are coming from diverse sectors such as IT, ITES, E-Commerce, etc.
Upon completion of the program, the participants will be able to:
Gain hands-on experience
Undergoes practical training in various security technologies to defend, detect or monitor security threats
Execute a cybersecurity plan
Create and execute a robust cyber incident response plan, information security governance, risk management, and security compliance
Develop privacy policies
Develop information security policies and procedures to protect the enterprise from existing and emerging cyber threats
Manage stakeholders in the enterprise and be the subject matter expert in cybersecurity
This course introduces basic concepts of Information Security, CIA triad and focuses on emerging technologies and their connection with Cyber Security. The different facets of Information Security are explained along with the attack vectors for information security. This course covers the skills required to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats, This course emphasizes core security technologies, the installation, troubleshooting and monitoring of network security devices to maintain integrity, confidentiality and availability of data.
Tools: CISCO Packet Tracer, CISCO Firepower, Wireshark
This course provides foundational knowledge and skills for Windows/Linux server platform. After completing this course, the participants will have an of operating systems and their importance in the cybersecurity space. They will learn relevant security configurations, file systems, user management and services along with ways to secure the services.
Tools: CentOS Linux, Windows Server 2012
The course will provide an in-depth understanding of threat vectors of connected IT Eco-system, understand the nature of insider and outsider threats and various threat models, understand the impact of threat realization and learn ways to control threat actors. At the end of this module, they will have improved knowledge of the threat landscape, the ability to articulate, prevent and detect Threat exploitation, the ability to measure and rank a threat on Threat models and analysis of security threats.
At the end of the module, participants will be able to practice threat models, able to take up the role of a threat researcher and they will be able to implement protocol anomaly analysis and pattern analysis.
Tools: Metaspoilt, Kali Linux, VirusTotal, Social Engineering Toolkit, The Harvester, Automater, Shodan, Spiderfoot and more.
A Certified Ethical Hacker is a specialist typically working in a red team environment, focused on attacking computer systems and gaining access to networks, applications, databases, and other critical data on secured systems. A CEH understands attack strategies, the use of creative attack vectors, and mimics the skills and creativity of malicious hackers. Unlike malicious hackers and actors, Certified Ethical Hackers operate with permission from the system owners and take all precautions to ensure the outcomes remain confidential. Bug bounty researchers are expert ethical hackers who use their attack skills to uncover vulnerabilities in the systems.
Tools: EC Council’s iLabs with 40 plus exercises
The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain applications and APIs that can be trusted. The participants will learn the top 10 web application security risks; Injection flaws, Broken Authentication, Sensitive Data Exposure, XML External Entities, Broken Access Control, Security misconfiguration, Cross-Site Scripting, Insecure deserialization, Using Components with Known Vulnerabilities, Insufficient logging and monitoring.
Tools: OWASP Tools
EC-Council’s Penetration Tester (CPENT) course teaches how to perform an effective penetration test in an enterprise network environment that must be attacked, exploited, evaded, and defended. CPENT’s live practice range will provide in-depth skills no only on working on flat networks but also on to the next level by teaching you how to pen test IoT systems, OT systems, how to write your exploits, build your tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and also customize scripts/exploits to get into the innermost segments of the network.
The labs include; Introduction to Penetration Testing; Penetration Testing Scoping and Engagement; Open Source Intelligence(OSINT); Social Engineering Penetration Testing; Network Penetration Testing –External; Network Penetration Testing– Internal; Network Penetration Testing – Perimeter Devices; Web Application Penetration Testing; Wireless Penetration Testing; IoT Penetration Testing; OT/SCADA Penetration Testing; Cloud Penetration Testing; Binary Analysis and Exploitation; Report Writing and Post Testing Actions.
Tools: EC Council’s iLabs
This course aims to provide participants with adequate knowledge and exposure on Cloud Computing, Cloud Deployment Models and Cloud Architecture, and how to secure data and the best practices. The labs will provide skills on managing security operations in Azure using Azure inbuilt tools. The course will cover cloud application security, secure software development life cycle (SDLC), cloud software assurance and validation, verified secure software, specifics of cloud application architecture, Design appropriate Identity and Access Management (IAM) Solutions
Tools: MS Azure
The module is an instructor-led course leading to certification. The course covers manage identity and access, implement platform protection, manage security operations and secure data and applications through MS Azure Cloud’s inbuilt features.
Tools: MS Azure Cloud Services
The SOC Analyst (CSA) course is engineered for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entry-level and intermediate-level operations. Gain Knowledge of SOC processes, procedures, technologies and workflows. At the end of the course, the learners will be able to recognize attacker tools, tactics, and procedures to identify indicators of compromise (IOCs). They will gain experience and extensive knowledge of Security Information and Event Management (SIEM) and will be able to develop threat cases (correlation rules), create reports, plan, organize, and perform threat monitoring and analysis in the enterprise, prepare briefings and reports of analysis methodology and results and gain understating of SOC and IRT collaboration for better incident response.
Tools: Practice Labs on four SIEM Tools; Splunk, QRadar, ArcSight, OSIM
This module aims to build hands-on skills on conducting threat intelligence and hunting after the attack. The topics include an introduction to Threat Intelligence – life cycle and frameworks; Data Collection and Processing – feeds and sources, bulk data processing and exploitation; Threat Analysis – Process, Run books and knowledge base; Intelligence Reporting and Dissemination – threat intel reports, dissemination practices and more.
Tools: Ubuntu Machines, Web-based tools for scraping and detection, EC Council’s iLabs
This purple range simulation-based course on a Purple theme allowing the participants to experiment on the red/blue team skills. This exposure is essential to build a resilient defence architecture while anticipating every move of a hacker. The teams will be able to detect threats that were not blocked, understand patterns in the security data with a variety of attacks and 16 plus scenarios. Through this top-notch learning platform as cybersecurity professionals, they can test the resistance of their defence team by pushing it to its maximum capabilities. Early detection of a potential attack, understand the sequence patterns.
Major scenarios include; Defacement, DDoS, Drive-by download (Malware analysis), Data exfiltration, Red team skills; Red vs Blue team games, SQL injections and Golden ticket.
Tools: Purple Range
The first year cybersecurity capstone project is designed to ensure a detailed scenario-based analysis of industry-specific challenges in Cybersecurity. It involves identifying potential opportunities as suggested by the mentors and designing solutions and preparing a detailed analysis of the same along with presenting an elaborate case study with implementation. The objective is to develop execution and consulting capabilities for the topics at hand.
Note: First-year capstone projects are suggested to be presented in a conference of repute or to be published in a peer-reviewed journal. The submissions to the program office will include, presentation deck, project report, code, associated dataset, project documents.
Security analytics is a combination of software, algorithms, and analytic processes used to proactively predict potential cyber threats to an organization. The course provides practical exposure to building machine learning-based defence systems. After completing the courses, the participants will be able to run the programming and data structures required for data analysis with Python, identify the source of data and how to capture test and training sets from the data. They will also be able to develop important ML models to predict intrusion detection and User behaviour analysis.
The objective of this course is to let the participants learn about different components of Identity and Access Management, security considerations and some labs and examples. After completing this course, the participants will get developed the capabilities to ensure the right people and things have the right access to the right resources at the right time. The course will provide an overview of zero-trust security products
Tools: MS Azure, AWS Services
This course introduces the concept of Information Security Governance, Risk and Compliance (GRC) to participants. They will be able to implement NIST Risk Management Framework (RMF) to manage organizational risks effectively. The course covers key security compliance programs like ISO 27001:2013, PCI-DSS, SSAE 16 and HIPAA and the course concludes by providing an introduction to data privacy concepts like Privacy by Design and key privacy regulations like GDPR, CCPA and proposed PDPB.
This course provides understanding and skills on responding and analysis to breaches. The learners will be able to apply the l techniques and lessons in providing the first response to a breach situation and will also be able to analyze a security incident. The course uses case studies and practical labs on cyber breach life cycle, handling the crime scene, data verification and integrity preservation (Hashing), Maintaining Chain of Custody, Evidence Protection and Preservation, Evidence Transportation, Evidence Analysis and Reporting and sharing the learnings.
Tools: SIFT Workstation, FTK, Veracrypt, log2timeline, Wireshark, EC Council’s iLabs
This Module on Cyber Law is designed to give the participants the latest updates on Cyber Laws, Rules, Regulations and enables them to understand various techno legal aspects. Further, the participants will be exposed to practical aspects of learning including drafting privacy policies, disclosure policies as per the Law, drafting 65B digital evidence matter of fact and observation certificates, getting to know the various interpretations of the IT Act.
This course will provide the participants with an understanding of Secure Software Development Lifecycle, Threat Modeling, Risk Assessments etc, Ability to create and analyze Secure Designs, Codes and Development Practices and to apply correct Security Controls. They will have an understanding of underlying principles and technologies of security engineering, security requirements for modern-day application and the future of it with rapidly changing technologies.
Tools: Microsoft Threat Modeling Tool, Static Code analyser -Fortify), DVWA, BURP, IDS tools like Snort, IPS tools like OSSEC.
Note: Based on industry trends, inputs from mentors or board of studies members, suggestions from participants as per their learning needs, further electives will be offered, subject to a minimum number of enrolments of ten.
The participants are to choose any four courses from the list of electives. New electives as per the industry trends will be added in due course. To offer an elective a minimum of ten participants must choose the course.
The second-year program will culminate in designing, preparing, demonstrating and presenting a real-time capstone project on an end-to-end cybersecurity challenge. The scope and industry applications of the project need to be larger than the first-year project. The program office will support with mentoring and report writing. The evaluation is based on viva-voce by an industry panel of experts. The duration of the second year capstone project is two months.
Tools: Full Stack
Note: The submissions to the program office will include, presentation deck, project report, code and associated datasets if any.
This module credits can be earned by writing and publishing a research paper on the capstone project done in the earlier module. The participant needs to publish or present the paper in a peer-reviewed journal or reputed international conference. The participants will learn skills in research paper writing and publishing/presenting.
Note: Second-year capstone project needs to be mandatorily published in a peer-reviewed journal or presented at an international conference.
CEH – Certified Ethical Hacker by EC Council: Certified Ethical Hacker CEH (V11) brings the latest commercial-grade hacking tools, techniques, and methodologies used by hackers and information security professionals to lawfully hack an organization.
Microsoft Certified Azure Security Engineer Associate (Exam AZ-500): The certified professional can build the security posture, identify, and remediate vulnerabilities by using a variety of security tools, implementing threat protection, and responding to security incident escalations
Purple Range – A Cyber range certification: This certification include learning on a hyper virtual simulator with 16 plus attack and defense scenarios as blue/read/green/white teams, a highly coveted training makes you prepare for real attack scenarios.
The participants will have unlimited access to the next-generation 12-Seater Security Operations Centre (SOC) located at REVA University campus. This facility will provide them with real-time learning to detect, analyse, respond, remediate, and orchestrate cybersecurity incidents using a combination of technology solutions and a strong set of processes.
Cyber Range composed of 4 teams: Red, Green, Blue, and White in which each participant plays an important role to create a safe and secure environment for enterprises. This exposure to real-time emulator will provide our participants with a comprehensive, detailed and practical learning space to build their cybersecurity skill sets.
The Red Team simulates malicious users launching cyber attacks to the user’s computer with the help of different vectors and install viruses, trojans, worms, spywares, adwares and malwares.
The Green Team simulates legitimate users over wire or wireless connections with their desktops, laptops, tablets, smartphones to the application infrastructure hosted on the network infrastructure managed by Blue Team.
The Blue Team simulates the users managing the availability, the scalability, the security and the stability of network infrastructure and application infrastructure.
The White Team creates the cyber attack scenarios and then monitor the success or failure of Blue Team to defend against cyber attacks launched by Red Team, keeping availability, scalability, security and performance of network infrastructure and application infrastructure for Green Team.
This program is powered by various globally renowned marquee organizations. RACE, REVA University is an academic partner for EC Council, PurpleSynapz, AWS, Microsoft and CloudxLabs and others. Cybersecurity participants will get unlimited access to our academic partners’ ecosystem which include the Cloud labs access, Course Materials, Partners’ LMS, Placement services, mentoring sessions and more.
Industry mentors are the assets of REVA Academy for Corporate Excellence. The industry experience of our mentors helps the participants to bridge the gap between classroom learning and the industry
Sandeep is cybersecurity and network security specialist who has successfully delivered several projects to clients from different sectors. Sandeep has expertise in devising and implementing infrastructure security solutions, Security Operations Centre (SOC) strategies, IT Information Security, and incident management solutions for enterprise customers.
He has adorned various other coveted positions at ISRO Satellite Centre, Bengaluru. He has received ISRO’s team excellence award for 2015. In July 2015, he became a part of Mars Orbiter Mission Testing Team. He is the recipient of Brigadier ML Anand IETE national award of 2007. He is also chairing various Inter-centre technical committees in ISRO and has participated as member in Karnataka State Government technical committees.
An expert in information security focused on application vulnerabilities, who spearheads organizational initiatives for building self-defensible enterprise network. With his hands-on knowledge in cybersecurity frameworks and regulations, he is extending support to several global brands in optimizing their business processes.
Dr. Paras’ core expertise is in devising security standards such as ISO 27001and PCI DSS and has proven skills in SoX – 404, Third-Party Vendor Risk Assessment, Business Continuity Management, VAPT, Applications Security Assessments, Application Design Reviews, Firewall and Network device Audits, Privacy, Control Assurance, etc.
An expert on Software and Application Security with security development lifecycle (SDL) across large enterprises. Core competence includes Threat modeling, code review, architecture review, and hands-on penetration testing. He has authored a number of research articles, book chapters, and patents. Published several research papers at international conferences. Other areas of interest include Embedded Systems, Data Analytics, Cloud Computing, and AI. Dr. Soumyo holds a Ph.D. in Information Technology from the Indian Institute of Technology, Kharagpur.
Ajay Pandey is seasoned security, networking and IT strategy professional with entrepreneurial zeal. Ajay is specialized in networking, security and criminal law, IPR with several global certifications to his credit. He is also a speaker and panelist on network visibility and application security in several conferences.
Unnikrishnan is focused on building and delivering cybersecurity capabilities to improve the cyber risk posture of the clients across industry sectors. His core expertise is in the area of Information Security Consulting, Transaction & Enterprise Risk Management, BCM/DR, IT Risk Consulting, and Business Analytics & Financial Advisory.
Chinmay has worked for global security giants including McAfee, Symantec and Cisco. Chinmay possesses expertise in the area of Security Analytics, Security Compliance Enforcement, and Dynamic Insider Reputation Rating. He has been a contributor to McAfee Global Support Knowledge on various technology topics.
Experienced Project Management Specialist with a demonstrated history of working in the Security Engineering & Operational Services.
He is skilled in IBM Security Services, QRadar, IBM Resilient, Vulnerability Management, Servers, Management, System Deployment, and Risk Management. Strong program and project Delivery.
Ashok is a cybersecurity expert who has competency in shaping most of the dynamic security solutions and products. His experience is mainly in leading R & D teams in Check Point, Wipro, and Nokia, and advocates cybersecurity platforms with open-source tools and global security intelligence.
Mahesh heads the IBM Security Labs in Pune and has the functional responsibility of Encryption and Key Management IBM Security products. He plays an instrumental role in establishing relationships with academic institutions, particularly in the western region by driving several initiatives.
Nishanth is competent in Advisory, Consulting, Managed Services and Training in DevSecOps, Cloud Security, Cybersecurity and Information Security domains for various sectors, enabling companies to implement and maintain 3600 security posture of Personal and Business Information. He has great exposure to technologies such as Windows/Linux Administration, Auditing Security & Best Practices, Public Key Infrastructure (PKI), Hyperledger, Ethereum, Quorum, AWS Cloud, Azure Cloud, etc.
A cyber law expert and techno-legal consultant. He is a law graduate who has completed a master’s in cyber law and cybersecurity from the National Law University, Jodhpur. Sushanth is one of the 45 Cyber Law Compliance Auditors in India. Sushanth IT Law Associates provides advice on social and legal consulting related to IT, such as technology transfer and licensing, software piracy and privacy, e-commerce, data protection & outsourcing, cyber law, and the IT act. He is a visiting faculty for Cyber law at various Universities.
A young, dynamic Cybersecurity expert, competent in building large-scale resilient systems at scale for complex operations. Dhruv has been an open source proponent and contributor with very deep technical expertise in incident management, threat intelligence and forensics on on-premise and cloud systems. He is a trainer par excellence and trained 100s of corporates in various areas of Cybersecurity. He currently holds a senior leadership position with an E-Commerce organization.
REVA Academy for Corporate Excellence is associated with IBM and Terralogic Inc., as knowledge partners.
The program fee for the two-year MTech/ MSc in Cybersecurity is INR 4.8 lakhs and the one-year PG Diploma in Cybersecurity is INR 3.8 lakhs. Merit Discounts for those who scored 60% and above in their pre-qualifying exam is available. Early bird/group/referral discounts are also available.
Financial assistance and Educational Loans from NBFC’s and Banks are available with interest rate ranging from 7.9 to 11%. These financial institutions will allow you to repay the educational loan in easy installments and income tax benefits.
Avail hassle-free educational loan to help you to join our Master’s programs to power up your skills to build your dream career.
Answer all of your questions
REVA Academy for Corporate Excellence is positioned uniquely in corporate education as it meets the career aspirations of successful technical professionals in the cybersecurity domain. RACE offers corporate programs under the flagship of REVA University that has achieved various national rankings for its commitment in education. The syllabus for each trimester is designed and curated by industry thought leaders who have in-depth knowledge and experience in the cybersecurity domain.
Only candidates with a B. Tech or B. E degree with at least 2 years of experience in IT/Cybersecurity domain are eligible for M. Tech in Cybersecurity program. For MS in cybersecurity program, working professionals having a B.Sc. degree and a minimum of 2 years of experience in IT/Cybersecurity domain are eligibl
Long-term cybersecurity programs such as M. Tech and MS offered in the format of traditional classroom delivery (on-campus), which is on Saturdays. However, short-term programs/certification courses are available in both online and blended learning modes depending on the requirements of the certification courses.
Yes, Certification Lead Track in CISA, Certification Lead Track in CISM, Certification Lead Track in CISSP, and Certification Lead Track in OSCP will be conducted in a live virtual class format.
The demand for cybersecurity professionals is ever-growing because every organization needs to secure their infrastructure. Post COVID-19 outbreak, the demand is increasing due to unprecedented security events in several organizations during the outbreak. There is a huge requirement for cybersecurity professionals in various fields to do hands-on jobs.
The duration of the M. Tech/MS program is 2 years, which consists of 6 trimesters and PG Diploma in Cybersecurity will be of one year. The duration of short-term/certification programs depends on the program requirements, which ranges from 5 to 16 Saturdays (1 month to 4 months).
Yes, it is possible to pay the fees in installments using your convenient payment modes such as online bank transfer, credit/debit card transfer, cheque, Paytm transfer, etc.
According to the academic calendar, admissions for M. Tech/MS/PGD will be in two batches, Batch 1 starts in September and Batch 2 starts in February. However, you can apply for the program or book your seats at any time. Admissions will happen throughout the year, but you have to confirm the batch you would like to join.
No. If you do not have 2 years of experience in IT/Cybersecurity domain, then you will not meet the eligibility criteria of our cybersecurity programs.
Yes, it is. Our M. Tech in Cybersecurity program is approved by AICTE, UGC, and REVA University, and MS program is approved by UGC and REVA University. The postgraduate diploma program is approved by both UGC and the Karnataka Government.
Click on the ‘Apply Now’ button on our website, https://race.reva.edu.in. You’ll be directed to another page where you can choose your preferred program, which will take you to another page that consists of all the program details. Use the pop-up form to fill in your details and register. Once you’ve registered with us, you will get a confirmation mail regarding your registration. Soon after the submission of the registration form, one of our coordinators will contact you and take you through the application process
We assign a coordinator for the applicants. If you have additional queries about the program, you can feel free to contact your coordinator.
Talk to your coordinator, he/she will guide you whether the program is beneficial to meet your career aspirations or not.
RACE cannot guarantee admission after the application deadline, even though you can contact us for admissions throughout the year. We will not admit more than 30 students in a batch. Once we admit the said number of students, we will close the admission for that batch. Once the admissions are closed for a particular batch, you can apply only for the next batch. Hence, it is highly recommended to complete the application process as early as possible.
RACE offers weekend classroom training (only on Saturdays) for long-term programs. Both blended and online mode of delivery is applicable for short-term programs depending on the program you choose.
At present, we offer 10 different certification programs in Cybersecurity domain such as Certified Cybersecurity Architect, Vulnerability and Penetration Testing, Threat Intelligence, General Data Protection Regulation (GDPR), Microsoft OS Security, Linux OS Security, Certification Lead Track- CISA, Certification Lead Track- CISM, Certification Lead Track- CISSP, and Certification Lead Track-OSCP. We accommodate only 10-15 participants for certification programs in each batch.
We have facilities such as the Security Operations Centre (SOC), Cyber Range, and SIEM and SOAR tools to promote experiential learning in cybersecurity programs.
No, you don’t have the option to complete the programs online, except for some of the short-term/certification programs.
Yes, we do offer placement assistance that includes career guidance, resume building tips and mock interviews. Each participant will receive staunch support from the industry mentors, who also direct you through various placement opportunities within the industry. Placements also happen through peer, alumni and mentor referrals. Above all, we are partnered with leading MNC’s that offer placement opportunities to our participants.
Yes, once you’ve joined the program, you will get the login details to access the Learning Management System (LMS), where you can find all the learning materials such as pre-readings, assignments, in-class resources, recorded videos of classroom sessions, additional reading materials, webinars, and other learning resources added as per the requirements.
Yes, you can visit a classroom session to understand the teaching-learning process involved in our corporate programs. The coordinator assigned to you will assist you in your visit to our University.
The program outcomes differ from program to program. Upon the completion of each program, you will become a pro in relevant tools, industry skills, and industry best practices. Our programs enable you to achieve your professional and leadership goals.
Success is in the DNA of RACE. Decipher the successful journey of RACE through our mentors and participants.
“After a long gap in my IT career, I was looking for a program After a long gap in my IT career, I was looking for a program that is globally recognized and has good demand in the market, that’s how I got to know about REVA University and the M. Tech program in Cyber Security. The program is very engaging in incorporating the latest technology and process. All the mentors are from the industry and provided us with skills what the industry needs and demands today. “After a long gap in my IT career, I was looking for a program
“The program curriculum combines GRC/ Framework Models The program curriculum combines GRC/ Framework Models best fitting for specific enterprises, practical sessions demonstrating OWASPs Top 10 vulnerabilities and mitigations of the same with latest technical controls, and steps towards Vulnerability Assessment and Penetration Testing. Most importantly, the technical discussions/debates among the peers, who have exceptional experience in various fields helped to learn and grow expertise in this upcoming domain.
Right from the inception of the cybersecurity program, I have Right from the inception of the cybersecurity program, I have been associated with REVA Academy for Corporate Excellence. RACE has conducted research and executed various projects that are appreciated by industry veterans. Uses programs around malware analysis, detection, prediction, and incident response and incident management modules that have been well-appreciated. Right from the inception of the cybersecurity program, I have
This industry-oriented program will help the participants to This industry-oriented program will help the participants to excel in the cybersecurity domain. The program will help the participants to have a detailed understanding and applications of cybersecurity to grow the skillsets in the cybersecurity domain. One of the highlights of the program is the dedicated Security Operation Centre (SOC). This industry-oriented program will help the participants to This industry-oriented program will help the participants to
I have joined Master’s in Cybdddersecurity in 2018. It was an I have joined Master’s in Cybersecurity in 2018. It was an amazing learning experience at RACE. I used to work as a network architect in AT &T earlier and there was an amazing career transformation after joining the program. Gained a lot of experience in cybersecurity real-world threat scenarios and in safeguarding the organization against cyber threats. I would like to recommend this program to all working professionals who are interested in pursuing their higher studies