Program Structure

Trimester I
  • Information Security and Cybersecurity
  • Threat Landscape
  • Vulnerability Assessment & Penetration Testing (VAPT)
  • Cyber-Attack Scenarios
Trimester II
  • Incident Management
  • Security Intelligence Analyst with IBM QRadar SIEM
  • Working with QRadar
Trimester III
  • Incident Response Processes
  • Incident Response Management : Tools, Techniques, SOC
  • Incident Detection Scenarios
  • Remediation and Reporting
  • Security Analytics
Trimester IV
  • Threat Hunting and Descriptive Analytics
  • Predictive Analytics in Cybersecurity
  • Machine Learning Applications in Cybersecurity
  • SIEM Scenarios
Trimester V/VI
  • Cybersecurity Frameworks
  • Working with SOC
  • SOC Management – Investigation and Analysis
  • Trimester V & VI
  • Capstone Projects
Apply Here

Learning Outcomes

An outcome-driven program based on skill and only skill designed for working professionals to heighten their careers in their intermediate and senior roles in security-related areas. Hence, the course is practical and lab-based practices, either proprietary or open software used in the market today. We offer Online LMS and Assessments.

At the end of the program, you get to:

  • Identify and assess security risk
  • Perform risk analysis
  • Uncover potential vulnerabilities
  • Protect the enterprise IT assets
  • Develop security policies and procedures
  • Monitor and detect threats
  • Establish a robust response plan
  • Recover, restore, and prevent future attacks
services-application
services-application

Security Operations Centre (SOC)

The partakers will get to work with a live SOC (Security Operations Center, rendering real-time experience in detecting, analyzing, and responding to incidents using a combination of technology solutions and a robust set of methods.

  • Incident Response
  • Network Security
  • SIEM Log Monitoring
  • Identity & Access Management
  • Compliance Analysis & Reporting
  • Threat & Vulnerability Management
  • Vulnerability Assessment & Penetration Testing

Exclusive Cyber Range as Simulator

Cyber Range is an infrastructure stationed to generate a real foundation – like a test lab – to train your team(s) to protect against cyber-attacks scenarios. The partakers will get access to this virtual environment on cyber warfare scenarios during the program, just like the infographic.

services-application

Mentors

Renil Komitla
Sandeep Vijayaraghavan K

Vice President - Cybersecurity Practice, Terralogic

Rama Kini
Ram Kumar G

CISM, CRISC, CEH, CPISI, BCCE

Venkat Nandimandalam
Aditya Jain

Manager, PwC India

Anil Reddy
Chinmay Hegde

Chief Partner, Astrikos Consulting

Paul Kushlan
Sridhar Govardhan

CISO, Wipro Limited

Sandeep Vijayaraghavan
Ajay Pandey

Cybersecurity Solutions Architect – Advanced Services, Cisco

Industry Connect

Terralogic provides Cybersecurity career-enhancing prospects in association with REVA Academy for Corporate Excellence (RACE). The program participants, after successful complications of the courses, students attract various career-enhancing opportunities, including lateral placements, promotions, salary hikes, and transformation into professions in data science, analytics, cybersecurity, and other emerging technology domains.

  • Abb
    Accenture
    ANZ
    Bigbasket
    Capgemini
    Cisco
    Citi
    Cognizant
    Dell
    DXC Tech
    Ericsson
    Fidelity
    Genpact
    Google
    Grant Thornton
    IBM
    Indegene
    Jcpenney
  • Juniper
    Netapp
    Philips
    Qualcomm
    Rakuten
    Siemens
    Swiss
    Target
    TCS
    Tech Mahindra
    vmware

Let's Design A Secure Career Together

Know More