Admission open for Diploma in HR Analytics. Batch starts on 23rd November 2019. Hurry, seats limited to first 30 registrations. Click here to apply

PGD/MTech/MS in Cybersecurity

icon4

Duration

PG Diploma – 1 Year
MTech – 2 Years
icon3

Course Start

Admission Open for March 2020 Batch
Early Bird Offer: 31st December 2019
icon2

Eligibility

2+ Years of Experience in IT Domain
Min 50% in any UG Program
icon1

Fees

PGDM – INR 350,000
MBA – INR 450,000

REVA Academy for Corporate Excellence, REVA University, IBM and Terralogic, a US-based leading Data Security Services and software development IT services company jointly offers a one year/ two-year PG Diploma/MTech/MS in Cybersecurity program for fast-rising working professionals integrating next-generation tools, technologies, simulators, global industry certifications and much more.

Global Information Security Workforce Study (GISWS) conducted by (ISC)2 has predicted that the world will face a shortfall of 1.8 million cybersecurity workers by 2022. More than 209,000 cybersecurity jobs in the U.S. are unfilled, and postings are up 74% over the past five years (Steve Morgan, Cybersecurity ventures). India emerges as the third most vulnerable country in terms of risk of cyber threats, such as malware, spam, and ransomware. The impetus of this program is to cater to this rising demands for highly skilled cybersecurity professionals for the global market.

Events

Expert Address

Cybersecurity in the Digital World Shridhar Govardhan
Chief Information Security Officer
Shridhar Govardhan Wipro Limited

Terralogic is a US-based leading Data Security Services and software development IT services company, preferred technology-driven businesses IT Solutions provider for Networking Communication and Cloud Solutions, Devops, Advanced QA-Testing and Managed IT, Staffing Solutions, BPO-KPO-Support, Creative UX-UI Design and Mobile App Product Development, Internet Marketing, Embedded-IoT, IT Infrastructure maintenance Services with a decade of experience in providing the best service for clients across India, USA, Australia and Vietnam.

Security Innovation is a pioneer in software security and trusted advisor to its clients. Since 2002, organizations have relied on Security Innovation assessment and training solutions to make the use of software systems safer in the most challenging environments – including Web applications, IoT devices, and the cloud. The company’s flagship product, CMD+CTRL Cyber Range, is the industry’s only authentic environment to build the skills teams need to protect the enterprise where it is most vulnerable – at the software layer. Security Innovation is privately held and headquartered in Wilmington, MA USA.

Data Security Council of India (DSCI), is a not-for-profit, industry body on data protection in India, setup by NASSCOM®, committed to making the cyberspace safe, secure and trusted by establishing best practices, standards and initiatives in cyber security and privacy. To further its objectives, DSCI engages with governments and their agencies, regulators, industry sectors, industry associations and think tanks for policy advocacy, thought leadership, capacity building and outreach activities.

To strengthen thought leadership in cyber security and privacy, DSCI develops best practices and frameworks, publishes studies, surveys and papers. It builds capacity in security, privacy and cyber forensics through training and certification program for professionals and law enforcement agencies and engages stakeholders through various outreach initiatives including events, awards, chapters, consultations and membership programs. DSCI also endeavours to increase India’s share in the global security product and services market through global trade development initiatives. These aim to strengthen the security and privacy culture in India.


This is a 100% outcome driven / skill based program designed for working professionals to enhance their career in mid and senior positions in security-related areas. Hence, the program is completely practical and lab-based using either proprietary or open software used in the Cybersecurity market today.

Exclusive Cyber Range as Simulator:

Cyber Range is an infrastructure deployed to reproduce a real infrastructure – like a test lab – in order to train your team(s) to defend against cyber-attacks scenarios. The participants will get access to this virtual environment on cyber warfare scenarios throughout the program. A Cyber Range is composed of 4 teams:

Security Operations Centre (SOC)

The participants of the program will get to work with a live Security Operations Center (SOC), providing real-time experience in detecting, analysing and responding to cybersecurity incidents using a combination of technology solutions and a strong set of processes.

soc infographic

At the end of the program the participants will be able to:

  • Identify and assess security risk, perform risk analysis and uncover potential vulnerabilities
  • Protect the enterprise IT assets and develop policies and procedures
  • Monitor and detect threats
  • Establish a robust response plan
  • Recover, restore and prevent future attacks

The participants will get access to 24 /7 support through a Learning Management system (LMS) which will provide pre-class readings, in-class resources, recorded videos of contact sessions and various other module related contents. Module assessments will be continuous and will include, in-class projects, end-module projects, presentations, and simulations.

The program office will constantly monitor each of the participants’ progression and help them in identifying the areas of improvements and arrange customized training if required. Each participant will get an industry mentor whose role is to help the participants to improve their learning and placement opportunities. The program office will also help in career guidance, resume building and lateral placements.


program structure
Trimester I
  • Information Security and Cybersecurity.
  • Threat Landscape.
  • Vulnerability Assessment & Penetration Testing (VAPT)
  • Cyber-Attack Scenarios
Trimester III
  • Incident Response Processes.
  • Incident Response Management : Tools, Techniques, SOC.
  • Incident Detection Scenarios.
  • Remediation and Reporting.
  • Security Analytics.
Trimester IV (Track : Security Analytics)
  • Threat Hunting and Descriptive Analytics
  • Predictive Analytics in Cybersecurity.
  • Machine Learning Applications in Cybersecurity.
Trimester II
  • Incident Management.
  • Security Intelligence Analyst with IBM QRadar SIEM.
  • Working with QRadar.
  • SIEM Scenarios
Trimester IV (Track : Cybersecurity)
  • Cybersecurity Frameworks.
  • Working with SOC.
  • SOC Management – Investigation and Analysis.
Trimester V & VI
  • Capstone Projects

Mastery Badge Certification in Security Intelligence Analyst with QRadar

IBM QRadar SIEM provides deep visibility into the network, user and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, asset profiles and vulnerabilities. QRadar SIEM classifies suspected attacks and policy violations as offenses. Extensive lab exercises are provided to allow participants an insight into the routine work of an IT Security Analyst operating on IBM QRadar SIEM platform.

Based on successful completion of the program, the participants will receive a Mastery level Digital Badge from IBM which is a cross-industry global recognition of technical skills as a Security Analyst.

NASSCOM DSCI Certification

“Security Analyst” Certification from NASSCOM DSCI is integrated into the program, which is a widely recognized industry certification. The certification will provide the participants the following skills:

  • Coordinate responses to information security incidents
  • Contribute to managing information security
  • Install and configure information security devices
  • Contribute to information security audits etc.

Sandeep Vijayaraghavan K

Vice President - Cybersecurity Practice, Terralogic


View Profile

Ram Kumar G

CISM, CRISC, CEH, CPISI, BCCE


View Profile

Aditya Jain

Manager, PwC India


View Profile

Chinmay Hegde

Chief Partner, Astrikos Consulting


View Profile

Sridhar Govardhan

CISO, Wipro Limited


View Profile

Ajay Pandey

Cybersecurity Solutions Architect – Advanced Services, Cisco


View Profile

Paras Arora
Director, Cybersecurity – PwC India
Chinmay Hegde
Chief Partner, Astrikos Consulting
Ram Kumar G
Strategic Information Security Leader

REVA Academy for Corporate Excellence (RACE) program participants work for leading organizations and after successful complication of the courses, students attract various career enhancing prospects including lateral placements, promotions, salary hikes and transformation into professions in data science, analytics, cybersecurity and other emerging technology domains.

Leave a Reply

Your email address will not be published. Required fields are marked *