INR 4.8 Lakhs
For M.Tech.: B.Tech/BE in CSE (Related Programs) /ECE/EEE/ISE/IT/TE
For M.Sc.: BCA/B.Sc. in IT/CS/Electronics or B.Com./BBA with Computer Applications, they should have studied Mathematics or Statistics at +2 level (Mandatory) or Any B.Tech/BE degree including M.Tech, Civil, or MCA or M.Sc. in IT/IS/CS. Minimum of 50% marks (45% in case of SC/ST candidates) in aggregate of any recognised university/institution or any other qualification recognised as equivalent thereto. Relevant work experience of 2 years above in related field in Data Science/Analytics/AI/BI or related fields
Exclusive Cyber Range as Simulator
Cyber Range is an infrastructure deployed to reproduce a real-life security infrastructure just like a test lab to train your team(s) to defend against cyberattack scenarios. The participants will get access to this virtual environment on cyber warfare scenarios throughout the program. For beginners, a Cyber Range is composed of 4 teams: Red, Green, Blue, and White in which each participant plays an important role to create a safe and secure environment for enterprises. This exposure to real-time emulator will provide our participants with a comprehensive, detailed and practical learning space to build their cybersecurity skill sets.
The Red Team simulates malicious users launching cyber attacks to the user’s computer with the help of different vectors and install viruses, trojans, worms, spywares, adwares and malwares.
The Green Team simulates legitimate users over wire or wireless connections with their desktops, laptops, tablets, smartphones to the application infrastructure hosted on the network infrastructure managed by Blue Team.
The Blue Team simulates the users managing the availability, the scalability, the security and the stability of network infrastructure and application infrastructure.
The White Team creates the cyber attack scenarios and then monitor the success or failure of Blue Team to defend against cyber attacks launched by Red Team, keeping availability, scalability, security and performance of network infrastructure and application infrastructure for Green Team.
This program is powered by various globally renowned marquee organizations. RACE, REVA University is an academic partner for EC-Council, PurpleSynapz, AWS, Microsoft, CloudxLabs, and others. Cybersecurity participants will get unlimited access to our academic partners’ ecosystem which includes the Cloud labs access, Course Materials, Partners’ LMS, Placement services, mentoring sessions, and more.
EC-Council is the world’s largest certification body for Information Security professionals. EC-Council certifies individuals in information security and e-business skills. It has been certified by American National Standards Institute to meet ANSI 17024 standards and offers programs in 107 countries. The Information Security community considers EC-Council as its most trusted source for vendor-neutral Information Security.
Microsoft Azure is the leading cloud platform and productivity company for the mobile-first, cloud-first world, and its mission is to empower every person and every organization on the planet to achieve more. Through this partnership, our participants will get access to their 100’s of courses, certification opportunities, and placement services. Cloud labs with credits will be provided to practice the real-time deployment of projects.
Terralogic is a USA-based well-known software and IT services company, an expert in IoT, Cloud, DevOps, App development, Cybersecurity, and many others. Terralogic is the knowledge partner for RACE Cybersecurity programs, helping us to build cyber professionals with deep technical understanding. The Terralogic team supports us in creating the right ecosystem of industry partners, tools, platforms, domain understanding, etc., in cybersecurity.
One of the niche cybersecurity training and solution builders, RACE programs deploy their Purple Range (Cyber Range), a hyper-realistic simulation platform designed for modern teams to learn the best Infosec skills by fighting real-world cybersecurity attacks. Our participants will get to team up on 20+ inbuilt real-world attack scenarios and launch a variety of realistic cyber-attacks to test team readiness and approach.
AWS Academy partnership provides course materials to our participants to pursue industry-recognized certifications and in-demand Cloud/Analytics/AI/ML jobs. AWS curriculum helps the learners to stay at the forefront of AWS Cloud innovations. The learners will get access to the cloud environment to build and deploy cloud solutions.
RACE has also partnered with leading industry giants to ensure the participants achieve their career-oriented goals.
Maximum Salary Hike
Hiring Partners
This course introduces basic concepts of Information Security, CIA triad and focuses on emerging technologies and their connection with Cyber Security. The different facets of Information Security are explained along with the attack vectors for information security. This course covers the skills required to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. This course emphasizes core security technologies, the installation, troubleshooting, and monitoring of network security devices to maintain integrity, confidentiality, and availability of data.
Tools: CISCO Packet Tracer, CISCO Firepower, Wireshark
This course provides foundational knowledge and skills for Windows/Linux server platform. After completing this course, the participants will have an understanding of operating systems and their importance in the cybersecurity space. They will learn relevant security configurations, file systems, user management and services along with ways to secure the services.
Tools: CentOS Linux, Windows Server 2012
The course will provide an in-depth understanding of threat vectors of connected IT ecosystem, understand the nature of insider and outsider threats of various threat models, understand the impact of threat realization, and learn ways to control threat actors. At the end of this module, they will enhance their knowledge of the threat landscape, the ability to articulate, prevent and detect threat exploitation, the ability to measure and rank a threat on threat models, and analysis of security threats.
At the end of the module, participants will be able to practice threat models, able to take up the role of a threat researcher and they will be able to implement protocol anomaly analysis and pattern analysis.
Tools: Metaspoilt, Kali Linux, VirusTotal, Social Engineering Toolkit, The Harvester, Automater, Shodan, Spiderfoot, and more.
This module provides hands-on skills on managing threats and vulnerabilities in the systems. This module comes with labs and course materials from EC-Council to learn skills in a red team environment, focused on attacking computer systems and gaining access to networks, applications, databases, and other critical data on secured systems. The learner will gain skills on attack strategies, attack vectors and mimic the skills and creativity of malicious hackers. Unlike malicious hackers and actors, Certified Ethical Hackers operate with permission from the system owners and take precautions to ensure the outcomes remain confidential. Bug bounty researchers and expert ethical hackers who use their attack skills to uncover vulnerabilities in the systems.
Tools: EC Council’s iLabs with 40 plus exercises
This course teaches how to perform an effective penetration test in an enterprise network environment that must be attacked, exploited, evaded, and defended. CPENT’s live practice range will provide in-depth skills not only on working on flat networks but also on to the next level by teaching you how to pentest IoT systems, OT systems, how to write your exploits, build your tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and also customize scripts/exploits to get into the innermost segments of the network.
The labs include Penetration Testing Scoping and Engagement, Social Engineering, Network Penetration- External and Internal, Perimeter Devices, Web Application and Wireless Penetration Testing, Binary Analysis and Exploitation, Report Writing, and Post Testing Actions.
Tools: EC-Council’s iLabs
This course aims to provide participants with adequate knowledge and exposure on Cloud Computing, Cloud Deployment Models, Cloud Architecture, and how to secure data and the best practices. The labs will provide skills on managing security operations in Azure using Azure inbuilt tools. The course will cover cloud application security, secure software development life cycle (SDLC), cloud software assurance and validation, verified secure software, specifics of cloud application architecture, design appropriate Identity and Access Management (IAM) Solutions.
Tools: MS Azure
The module is an instructor-led course leading to certification. The course covers manage identity and access, implement platform protection, manage security operations, and secure data and applications through MS Azure Cloud’s inbuilt features.
Tools: MS Azure Sentinel, Key Vault and other features Leading to certification AZ-500
The SOC management course is to master Tier I and Tier II SOC analyst roles to achieve proficiency in performing SOC operations. Gain Knowledge of SOC processes, procedures, technologies, and workflows. At the end of the course, the learners will recognize attacker tools, tactics and procedures to identify indicators of compromise (IOCs). They will gain experience and extensive knowledge in Security Information and Event Management (SIEM). The learners will be able to develop threat cases (correlation rules), create reports, plan, organize, and perform threat monitoring and analysis in the enterprise, prepare briefings, and reports of analysis methodology and results with an understanding of SOC and IRT collaboration for better incident response.
Tools: Practice Labs on four SIEM Tools; Splunk, QRadar, ArcSight, OSIM
This module aims to build hands-on skills on conducting threat intelligence and hunting after the attack. The topics include Introduction to Threat Intelligence -Life cycle and Frameworks, Data Collection and Processing – Feeds and Sources, Bulk Data Processing and Exploitation, Threat Analysis – Process, Run Books and Knowledge Base, Intelligence Reporting and Dissemination – Threat Intel Reports, Dissemination Practices, and more.
Tools: Ubuntu Machines, Web-based tools for scraping and detection, EC-Council’s iLabs
This purple range simulation-based course on a Purple theme allowing the participants to experiment on the red/blue team skills. This exposure is essential to build a resilient defense architecture while anticipating every move of a hacker. The teams will be able to detect threats that were not blocked, understand patterns in the security data with a variety of attacks and 16 plus scenarios. Through this top-notch learning platform as cybersecurity professionals, they can test the resistance of their defense team by pushing it to its maximum capabilities, early detection of a potential attack, and understand the sequence patterns.
Major scenarios include Defacement, DDoS, Drive-by download (Malware analysis), Data exfiltration, Red team skills; Red vs Blue team games, SQL injections, and Golden ticket.
Tools: Purple Range
The first-year cybersecurity capstone project is designed to ensure a detailed scenario-based analysis of industry-specific challenges in Cybersecurity. It involves identifying potential opportunities as suggested by the mentors and designing solutions and preparing a detailed analysis of the same along with presenting an elaborate case study with implementation. The objective is to develop execution and consulting capabilities for the topics at hand.
Tools: Full-stack
Security analytics is a combination of software, algorithms, and analytic processes used to proactively predict potential cyber threats to an organization. The course provides practical exposure to building machine learning-based defense systems. After completing the course, the participants will be able to run the programming and data structures required for data analysis with Python, identify the source of data, and how to capture test and training sets from the data. They will also be able to develop important ML models to predict intrusion, detection and user behavior analysis.
Tools: Python
The objective of this course is to let the participants learn about different components of Identity and Access Management, security considerations, and some labs with examples. After completing this course, the participants will get developed the capabilities to ensure the right people and things have the right access to the right resources at the right time. The course will provide an overview of zero-trust security products.
Tools: MS Azure, AWS Services
This course introduces the concept of Information Security Governance, Risk and Compliance (GRC) to participants. They will be able to implement the NIST Risk Management Framework (RMF) to manage organizational risks effectively. The course covers key security compliance programs like ISO 27001:2013, PCI-DSS, SSAE 16, and HIPAA, and the course concludes by providing an introduction to data privacy concepts like Privacy by Design and key privacy regulations like GDPR, CCPA, and proposed PDPB.
This course provides understanding and skills on responding and analysis to breaches. The learners will be able to apply the techniques and lessons in providing the first response to a breach situation and will also be able to analyze a security incident. The course uses case studies and practical labs on Cyber Breach Life Cycle, Handling the Crime Scene, Data Verification and Integrity Preservation (Hashing), Maintaining Chain of Custody, Evidence Protection and Preservation, Evidence Transportation, Evidence Analysis and Reporting, and sharing the learnings.
Tools: SIFT Workstation, FTK, Veracrypt, log2timeline, Wireshark
This module on Cyber Law is designed to give the participants the latest updates on Cyber Laws, Rules, and Regulations, and enable them to understand various techno-legal aspects. Further, the participants will be exposed to practical aspects of learning including drafting privacy policies, disclosure policies as per the law, drafting 65B digital evidence matter of fact and observation certificates, and getting to know the various interpretations of the IT Act.
This course will provide the participants with an understanding of Secure Software Development Lifecycle, Threat Modeling, Risk Assessments, ability to create and analyze secure designs, codes, development practices, and apply the right security controls. They will have an understanding of underlying principles and technologies of security engineering, security requirements for modern-day application, and the future of it with rapidly changing technologies.
Tools: Microsoft Threat Modeling Tool, Static Code analyser -Fortify), DVWA, BURP, IDS tools like Snort, IPS tools like OSSEC.
Note: Based on industry trends, inputs from mentors or board of studies members, suggestions from participants as per their learning needs, further electives will be offered, subject to a minimu
The second-year program will culminate in designing, preparing, demonstrating, and presenting a real-time capstone project on an end-to-end cybersecurity challenge. The scope and industry applications of the project need to be larger than the first-year project. The program office will support with mentoring and report writing. The evaluation is based on viva-voce by an industry panel of experts. The duration of the second-year capstone project is two months.
Tools: Full Stack
This module credits can be earned by writing and publishing a research paper on the capstone project done in the earlier module. The participant needs to publish or present the paper in a peer-reviewed journal or reputed international conference. The participants will learn skills in research paper writing and publishing/presenting.
RACE, REVA University is an academic partner for AWS, Microsoft, and CloudxLabs and others. The program participants will get unlimited access to our educational partners’ ecosystem, which includes the Cloud labs access, Course Materials, Partners’ LMS, placement services, mentoring sessions, and more.
AWS Academy partnership provides our participants, course materials to pursue industry-recognized certifications and in-demand analytics / Artificial Intelligence / Machine learning jobs. AWS curriculum helps the learners to stay at the forefront of AWS Cloud innovations. The learners will get access to the Cloud environment to build and deploy Machine Learning / Artificial Intelligence solutions.
Microsoft Azure is the leading cloud platform and productivity company for the mobile-first, cloud-first world, and its mission is to empower every person and every organization on the planet to achieve more. Through this partnership, our participants will get access to their 100’s of courses, certification opportunities, and placement services. Cloud labs with credits will be provided to practice the real-time deployment of projects.
The participants will get access to six-plus high-demand courses on an online cloud platform for making learning fun and sustainable. The learning platform is gamified which features an array of one-of-its-kind offerings including -Online Video Courses. 24-hour Lab access (with Jupyter environment), Auto- assessment tests, and BootML – The UI-based Machine Learning model code generator.
Industry mentors are the assets of REVA Academy for Corporate Excellence. The industry experience of our mentors helps the participants to bridge the gap between classroom learning and the industry
Dr. J B Simha excels in R&D, business intelligence, and analytics consulting, demonstrating his core competency. His expertise includes implementing expansive systems for telecom, BFSI, (more…)
He is an Advisor and Consultant for Generative AI at NuWare, specializing in extracting valuable insights and developing practical models from predominantly unstructured data like text (more…)
Pradeepta Mishra has 16+ years of experience and currently is the Co-Founder and Chief Architect of Data Safeguard Inc., leading a group of Data Scientists, computational linguistics (more…)
Usha currently heads the data science research at Exa Protocol. She is the world’s first women triple Kaggle Grandmaster. She was ranked as the top (more…)
Sandeep is a seasoned and hands-on machine learning scientist with a strong experience in building world-class software products, machine learning and churning humongous data. His core expertise is in Deep Learning (TensorFlow, (more…)
Ravi is a Data Scientist with expertise in the areas of Web Analytics, AI including Natural Language Processing & Machine Vision. He has 22 filed patents with USPTO out of which 12 have been (more…)
Dr. Angshuman Ghosh is a data science and strategy leader with experience in retail, media, research, and tech domains. As a Data Scientist, he led data science and analytics projects using cutting-edge (more…)
Prahlad is a Strategist, Industry Leader, Change Expert and a Leadership Coach. He had led several engagements and business units globally by guiding companies in their business, operations, IT and Analytics strategy, and execution. (more…)
Gopal is a leading subject-matter-expert in Cloud, AI, and Automation technologies. He has a proven track record of driving digital transformation at scale for 1K enterprises across multiple industries. (more…)
Artificial Intelligence and Machine Learning Evangelist, an Author, a Speaker, and a Mentor who drives AI and Data Science-led strategic transformation. He had led strategy and transformation (more…)
Sayandeb has worked both as part of the large enterprises by setting up the analytics capabilities as well as a service provider for various enterprises. Sayandeb has also played several intrapreneurial roles like designing training and pedagogy (more…)
Amaralingeswara is well-experienced in a wide variety of software development and professional services include Product Development, Quality Assurance, Support, (more…)
Dr. Santosh Nair has extensive experience in statistical modelling and advanced analytics consulting. He has extensive experience in statistical modelling and advanced analytics consulting. His areas of specialization include Marketing and (more…)
Dr. Sai Hareesh is currently working as an Innovator at Maestro Technologies, Inc. He has completed his Ph.D in Computer Vision from Sri Sathya Sai Institute of Higher Learning. He has 12+ years of (more…)
This is a globally accredited program to make the participants truly global citizens. At par with international standards and to provide opportunities for global mobility to our participants, we follow an outcome-based education system (OBE). Experiential learning and project-based pedagogy have been employed in the design and delivery of the program.
The objective of module assessment and evaluation is to objectively assess the learners of the program on their ability to apply the concepts, modeling techniques in various domains and verticals for different business scenarios through a continuous evaluation framework throughout the program. Detailed regulations on earning the credits and GPA’s will be shared during the program.
A set of researchers is building a Computer-Aided Pronunciation and Reading System (CAPRS). This is an Artificial Intelligence (AI) and Natural Language Processing (NLP) system for one-to-one tutoring with a mobile app/humanoid simulator for primary students to learn different skills in their vernacular languages.
The researchers are building a QnA system with deep learning trained on the Kannada language dataset to evaluate the emotions and recommended answers/actions. This model is used to make a recommendation system for citizen helplines, understand citizens’ voices, and suggest possible measures to decision-makers.
Customer Intelligence based on the Customer Life Cycle Analytics (CLCATM) solution from RACE labs enables anyone to use the packaged AI/DS to understand and serve their customers better.
This solution provides data models and domain models for supply chain analytics. With multiple analytical technologies like the Theory of Constraints (ToC) and Machine learning, the SCAn engine brings the power to provide the controls required to build efficient data-driven supply chain systems. An end-to-end discovery from typical supply chain data, predictive models for inventory planning, demand forecasting, and stock events like stock out are part of this solution.
for those who scored
and above in their pre-qualifying exam
Early bird/group/referral
discounts are also available.
Financial assistance and Educational Loans from NBFC’s and Banks are available with interest rate ranging from 7.9 to 11%. These financial institutions will allow you to repay the educational loan in easy installments and income tax benefits.
Avail hassle-free educational loan to help you to join our Master’s programs to power up your skills to build your dream career.
Success is in the DNA of RACE. Decipher the successful journey of RACE through our mentors and participants.
“ I’m very grateful and proud to be part of the MBA in Business Analytics program at REVA Academy for Corporate Excellence (RACE), 2019-2021 Batch. The credit goes to RACE mentors and my batch mates. Still, a long way to go to learn and improve my skills.”
“ Being a program/project manager for the past 7 years and with more than 9 years of experience in technologies like Java, .net, DevOps, I got associated with REVA for MBA (Artificial intelligence). I have learnt from classroom sessions with many industry leaders and got exposure to real-time business understanding in AI. The hands-on sessions at RACE helped me a lot in exploring new opportunities in Data Science and the Artificial intelligence world.”
“ I have been associated with REVA University for Corporate Excellence for last 4+ years, working closely with the PGDM/MBA in Business Analytics Batches in delivery, helping with use cases, and some of the data processing areas. Even though the participants joining RACE’s programs are well-experienced, they would like to expand or switch their career for better opportunities. To advance in their career, MBA/PGDM in Business Analytics program of RACE is a great choice.”
“The program added value to my experience in Data Science and Business Analytics domain as the program allowed me to solve real-life problems using machine learning models and data science techniques."
Please fill in the form and an expert will call you in the next 4 working hours. You can also reach out to us at [email protected] or +91 89040 58866
The artificial intelligence domain shows exponential growth in recent years. AI is the subset of Data Science, which helps to simulate machine intelligence. Learning an emerging technology like AI is a great choice as businesses/organizations are becoming dependent on various AI applications. Businesses/organizations rely on AI as it helps to improve products/services, analyze business models, and enhance decision-making processes in businesses. Hence, enrolling to PGD/M. Tech in Artificial Intelligence program at RACE will take your career to the next level.
The demand for artificial intelligence professionals is ever-growing because all of us are living in a technology-driven world. We are creating algorithms that can automate business services and business intelligence. The development of self-driven cars and service robots is creating challenges in the business world. Hence, there is a huge requirement for talented individuals who can change the world with AI applications. AI applications are not limited to the automotive/service industry, but also applicable to every other industry.
According to the academic calendar, admissions to MTech/MSc in Artificial Intelligence will be in two batches, Batch 1 starts in the month of September, and Batch 2 starts in the month of March. However, you can apply for the program or reserve your seats at any time. Admissions will happen throughout the year, but you have to pre-confirm the batch you would like to join.
Click on the ‘Apply Now’ button on our website, https://race.reva.edu.in. You’ll be directed to another page where you can choose your preferred program, which will take you to the next page that consists of all the program details. Use the pop-up form to fill in your details and register.
Once you’ve registered with us, you will get a confirmation mail regarding your registration. Soon after the submission of the registration form, one of our expert executives will contact you and take you through the application process.
Working professionals with a minimum of 50% (45% in the case of SC/ST candidates) in their undergraduate degree of any discipline and 2 years of work experience in the industry are eligible for admission.
Both PG Diploma and M. Tech/M.Sc in Artificial Intelligence is offered in the format of traditional classroom delivery (on-campus), which is on Saturdays. However, short-term programs/certification courses are available in both online and blended learning modes depending on the requirements of the certification courses.
Yes, we provide placement assistance that includes valuable career guidance, tips for creating impressive resumes, and practice interviews. Every participant will receive strong support from industry mentors who will guide you toward various job opportunities in the industry. Placements also occur through recommendations from peers, alumni, and mentors. Above all, we are partnered with leading MNCs that offer placement opportunities to our participants.