THE FUTURE IS CYBER SECURITY

The digital landscape is experiencing rapid growth, accompanied by an increasing demand for robust Cyber Security measures. According to Cyber Security Ventures, cyber crime is anticipated to cost companies a staggering $10.5 trillion annually by 2025, a significant rise from $3 trillion in 2015.

This 15% year-over-year increase marks cybercrime as the largest transfer of economic wealth in history. Additionally, Cyber Security employment is projected to grow by 33% by 2030, far outpacing the average growth rate, as the Bureau of Labor Statistics (BLS) reported.

CURRICULUM

The Post Graduate Programme in Cyber Security comprises five milestones: a strongfoundation in Cyber Security, Network Security, in-depth exploration of various cyber attacks,Designing Security Controls for Resilience, and GRC (Governance, Risk and Compliance).

MODULE 1

INTRODUCTION TO CYBER SECURITY | 2 WEEKS

Acquire essential knowledge in risk management, cryptography, and emergingtrends in Cyber Security.

TOPICS

  • Careers in Cyber Security.
  • Introduction to CIA Triad.
  • Basics of Authentication.
  • Risk Management.
  • Emerging Trends - Artificial Intelligence andCyber Security, Operations Technology, andInternet of Things.
  • Global Cyber Warfare.
  • Understanding Cryptography.
  • Cryptocurrency and Blockchain.
MODULE 2

NETWORK SECURITY AND FIREWALL ESSENTIALS | 3 WEEKS

Equip yourself with Network Security concepts and explore network security tools such as Firewall for safeguarding your assets.

TOPICS

  • Networking Basics - OSI Model, IP Addressing,TCP/IP, Network Services, Public/Private IP,Load Balancing, Proxy.
  • Wireshark.

  • Network Segmentation.
  • Virtual Private Network (VPN).
  • Next Generation Firewall (NGFW).
  • Intrusion Detection Systems (IDS).
MODULE 3

UNDERSTANDING MODERN CYBER ATTACKS | 2 WEEKS

Discover the cyber attack methodology and learn to view attacks from the lens of an attacker.

TOPICS

  • MITRE ATT&CK.

  • Cyber Kill Chain.
  • APT (Advanced Persistent Threats).
  • Ransomware Attacks and Cyber Insurance.
  • Attacks on Cryptography.
  • Attacks on Users.

  • Attacks on Networks.
  • Attacks on Endpoints.
  • Attacks on Applications.

  • Attacks on Data.

  • Attacks on Cloud.
MODULE 4

DESIGNING SECURITY CONTROLS | 3 WEEKS

Discover effective methods for recognising and applying appropriate Cyber Security strategies to combat diverse cyber threats.

TOPICS

  • Types of Security Controls.
  • Endpoint Security Controls- Antivirus, Endpoint Detection and Response (EDR), Extended Detection and Response (XDR).
  • Identity and Access Management (IDAM).
  • Security Awareness.
  • Data Security Controls - Data Loss Prevention (DLP), Cloud Access Security Broker (CASB),Data Encryption, Data Masking.
  • Authentication Implementation.
  • Deep dive into Security Information and Event Management (SIEM).
  • Threat Intelligence.

  • Incident Response.
  • Incident Response Playbooks.
MODULE 5

GOVERNANCE, RISK AND COMPLIANCE | 2 WEEKS

Gain an understanding of various standards, regulations, and frameworks to help build a strong organisational security posture.

TOPICS

  • Regulations, Standards, and Legislations.
  • Introduction to CIA Triad.
  • ISO 27001:2022.
  • General Data Protection Regulation (GDPR).
  • Digital Data Protection Act (DPDP) - India.
  • Payment Card Industry Data Security Standard(PCI DSS).
  • Digital Operational Resilience Act(DORA) - Regulation (EU).
  • Understanding Audit Process.
  • Conducting an Internal Audit.
  • Certification Audits.
  • Third-party Risk Management.
MODULE 6

CLOUD SECURITY | 2 WEEKS

Delve deeper into the security features of Microsoft Azure and understand the methodology behind securing data on the cloud.

TOPICS

  • Cloud Security in Different Platforms.
  • Cloud Platform and Infrastructure Security.
  • Securing Data on Cloud.
  • Incident Detection and Response in Cloud.
MODULE 7

PENETRATION TESTING | 4 WEEKS

Equip yourself with a solid grasp of penetration testing methodologies and gain hands-on experience through interactive videos and workbooks, ensuring industry readiness.

TOPICS

  • Introduction to Penetration Testing.
  • Techniques of Penetration Testing.
  • Infrastructure Penetration Testing.
  • OWASP Top 10 and Application Security.
  • Web Application Penetration Testing.