Vous êtes sur la page 1sur 4

Detect,

Manage & Mitigate


CYBER RISKS

PGD / M.Tech. in
CYBERSECURITY
Powered by AforeCybersec
in Association with IBM

IBM Software Lab for


Emerging Technologies
Initiative of the Career Education Program

In collaboration with
REVA University, Bengaluru
BE FUTURE READY
WITH ENHANCED
SECURITY

DEMAND FOR CYBERSECURITY


PROFESSIONALS OUTPACES SUPPLY WHY STUDY CYBERSECURITY?
According to NASSCOM estimates, India needs n Rise in global demand for skilled
one million cybersecurity professionals by professionals.
2020. Cybersecurity Ventures reports that
n Cyber experts are needed in every industry &
there will be 3.5 million unfilled cybersecurity
Sector.
jobs by 2021, up from 1 million openings last
year. The 2017 ISACA survey found that 45 n Most highly waged among IT professionals

percent of organizations out of 2,290 members n A profession with room for rapid career
in 121 countries reported they are hiring more growth.
cybersecurity professionals, but 94 percent
n Interesting, challenging and extremely
stay it will prove difficult to find skilled
dynamic work.
candidates. The impetus of this program is to
cater to this worldwide rise in demands for n A job with higher purpose and honour.
highly skilled cybersecurity professionals.

PROGRAM BENEFITS
n Learn from real-life scenarios using Cyber
Range & Security Operations Centre (SOC). SECURITY PENETRATION
ANALYST TESTER
n Industry certifications from IBM.
n Industry Leaders a faculty.
n Labs equipped with latest tools and SOC SOC
technologies. SPECIALIST CAREER ANALYST

n 24/7 online support with resources, OPTIONS IN


communities and interactions. CYBER
n Networking opportunities with industry
leaders and professionals SIEM
SECURITY SECURITY
SPECIALIST CONSULTANT
n Weekend contact classes - designed for
working professionals.
n Lateral placement assistance.
CYBER RANGE PROGRAM
Powered by AforeCybersec, Cyber Range systems, an
HIGHLIGHTS
infrastructure for Cyber Defence, simulates scenarios that
prepare participants to manage the cybersecurity
environment of corporate, military and government
organizations. Cyber Range exercise is composed of multiple
teams and each team is placed in a compartmentalized space
that will reproduce a realistic enterprise network environment.

Red Team simulates


malicious users sending
cyber attacks to user's devices Blue Team simulates users
managing the network &
application infrastructure.
CYBER-ATTACK
SCENARIOS

Data Leakage

Malicious
Green Team Websites
simulates legitimate White Team creates the cyber
users connected to the attack scenarios and then
network infrastructure
managed by Blue Team.
monitors the success and/or Botnet
failure of the attacks
Communications

Newly Emerging
and Known
SECURITY OPERATIONS CENTER (SOC) Malwares

Participants will get access to


Security Operations Centre (SOC), a
live facility where the real-world
simulation of an organization’s
enterprise information systems,
including websites, data centre,
servers, applications and other
network platforms are monitored,
assessed and protected from
potential cyber threats.
PROGRAM STRUCTURE

01 TRIMESTER 02 TRIMESTER
§ Incident Management.
§ Security Intelligence Analyst with IBM QRadar
§ Information Security and Cybersecurity. SIEM.
§ Threat Landscape. § Working with QRadar.
§ Vulnerability Assessment & Penetration Testing § SIEM Scenarios
(VAPT)

04 TRIMESTER
§ Cyber-Attack Scenarios

Track : Cybersecurity

03 TRIMESTER
§ Incident Response Processes.
§ Incident Response Management : Tools,
§ Cybersecurity Frameworks.
§ Working with SOC.
§ SOC Management - Investigation and Analysis.

Techniques, SOC.
§ Incident Detection Scenarios.
§ Remediation and Reporting.
§ Security Analytics.

04 TRIMESTER Track : Security Analytics

§ Threat Hunting and Descriptive Analytics


§ Predictive Analytics in Cybersecurity.

5/6 TRIMESTER
§ Machine Learning Applications in
Cybersecurity.

§ Capstone Projects

§ Two plus years of work experience in IT.


§ 55 percent marks in BE/BTech/BCA/ME/MTech/MCA.
§ Selection of the candidates are based on personal interviews.

Vous aimerez peut-être aussi