loader

Program Structure

Trimester I
    • Information Security and Cybersecurity
    • Threat Landscape
    • Vulnerability Assessment & Penetration Testing (VAPT)
    • Cyber-Attack Scenarios
Trimester II
    • Incident Management
    • Security Intelligence Analyst with IBM QRadar SIEM
    • Working with QRadar
Trimester III
    • Incident Response Processes
    • Incident Response Management : Tools, Techniques, SOC
    • Incident Detection Scenarios
    • Remediation and Reporting
    • Security Analytics
Trimester IV
    • Threat Hunting and Descriptive Analytics
    • Predictive Analytics in Cybersecurity
    • Machine Learning Applications in Cybersecurity
    • SIEM Scenarios
Trimester V/VI
    • Cybersecurity Frameworks
    • Working with SOC
    • SOC Management – Investigation and Analysis
    • Trimester V & VI
    • Capstone Projects
Apply Here

Learning Outcomes

An outcome-driven program based on skill and only skill designed for working professionals to heighten their careers in their intermediate and senior roles in security-related areas. Hence, the course is practical and lab-based practices, either proprietary or open software used in the market today. We offer Online LMS and Assessments.

At the end of the program, you get to:

  • Identify and assess security risk
  • Perform risk analysis
  • Uncover potential vulnerabilities
  • Protect the enterprise IT assets
  • Develop security policies and procedures
  • Monitor and detect threats
  • Establish a robust response plan
  • Recover, restore, and prevent future attacks
services-application
services-application

Security Operations Centre (SOC)

The partakers will get to work with a live SOC (Security Operations Center, rendering real-time experience in detecting, analyzing, and responding to incidents using a combination of technology solutions and a robust set of methods.

  • Incident Response
  • Network Security
  • SIEM Log Monitoring
  • Identity & Access Management
  • Compliance Analysis & Reporting
  • Threat & Vulnerability Management
  • Vulnerability Assessment & Penetration Testing

Exclusive Cyber Range as Simulator

Cyber Range is an infrastructure stationed to generate a real foundation – like a test lab – to train your team(s) to protect against cyber-attacks scenarios. The partakers will get access to this virtual environment on cyber warfare scenarios during the program, just like the infographic.

services-application

Mentors

Renil Komitla
Sandeep Vijayaraghavan K

Vice President - Cybersecurity Practice, Terralogic

Renil Komitla
Ram Kumar G

CISM, CRISC, CEH, CPISI, BCCE

Renil Komitla
Aditya Jain

Manager, PwC India

Renil Komitla
Chinmay Hegde

Chief Partner, Astrikos Consulting

Renil Komitla
Sridhar Govardhan

CISO, Wipro Limited

Renil Komitla
Ajay Pandey

Cybersecurity Solutions Architect – Advanced Services, Cisco

Industry Connect

Terralogic provides Cybersecurity career-enhancing prospects in association with REVA Academy for Corporate Excellence (RACE). The program participants, after successful complications of the courses, students attract various career-enhancing opportunities, including lateral placements, promotions, salary hikes, and transformation into professions in data science, analytics, cybersecurity, and other emerging technology domains.

  • Abb
    Abb
    Abb
    Abb
    Abb
    Abb
    Abb
    Abb
    Abb
    Abb
    Abb
    Abb
    Abb
    Abb
    Abb
    Abb
    Abb
    Abb
  • Abb
    Abb
    Abb
    Abb
    Abb
    Abb
    Abb
    Abb
    Abb
    Abb
    Abb

Let's Design A Secure Career Together

Know More