PG Program Cyber Security Course
PG Program Cyber Security Course
PG Program Cyber Security Course
Program in
Cybersecurity
Build Cybersecurity skills to accelerate your career
Organizations across the world are combating this challenge by upskilling their workforce,
recruiting skilled Cybersecurity professionals, and building robust cyber defense capabilities.
The Postgraduate Program in Cybersecurity equips you with the skills needed to investigate attacks
and build robust Cybersecurity systems while giving your resume the University of Texas at Austin
advantage. The program is ideal for cyber defense enthusiasts, enabling them to connect with
thought leaders in the industry and understand the process of securing digital infrastructure.
02
Program
Highlights
The new-age technological wave with GenAI has introduced the next level of
sophisticated threats, leading to a prominent demand for Cybersecurity professionals.
This program is crafted by experts to empower you with a skill set to analyze the
threat landscape and build long-term Cybersecurity strategies.
03
Who is this
program for?
Successful completion of the program may qualify you for various roles in
Cybersecurity, including:
Upon completion of the program, you would have developed the skill set needed to:
4. Demonstrate the
understanding of how to
identify and defend against
modern-day threats such
as Ransomware
The program also helps in preparing learners for the CompTIA Security+, CompTIA
Cybersecurity Analyst (CySA+), and EC-Council Certified SOC Analyst (CSA) certifications. 05
CompTIA Security+
Bootcamp (Optional)
Take a step ahead into your Cybersecurity Career
Certificate of Completion
From Great Learning
06
Disclaimer: Great Learning delivers the CompTIA Security+ Bootcamp. The University of Texas at Austin is
not involved in the program's design or delivery.
Curriculum
TOPICS
• Careers in Cybersecurity • Global Cyber Warfare
• Introduction to CIA triad • Understanding Cryptography
• Basics of Authentication • Cryptocurrency & blockchain
• Risk Management
• Emerging trends - Artificial Intelligence &
Cybersecurity, Operations Technology &
Internet of Things
TAKEAWAYS
• Gain insights on Importance of Cybersecurity
• Develop the ability to choose the appropriate authentication methods
• Identify & assess different types of risks
• Gain hands-on experience or practical exercises using AI-driven tools for
Cybersecurity use cases
• Discover the different patterns in the cyber attacks going on as a part of global
cyber warfare
• Familiarize yourself with the cryptocurrency transactions & the crypto payment
ecosystem in today's cyber world.
07
MODULE 2 NETWORK SECURITY & FIREWALL ESSENTIALS | 3 WEEKS
Skill yourself with Network Security concepts and experience Network Security tools
such as Firewall for safeguarding your assets.
• TOPICS
• Networking basics - OSI Model, IP • Virtual Private Network (VPN)
Addressing, TCP/IP, Network services,
• Next Generation Firewall (NGFW)
Public/ Private IP, Load Balancing, Proxy
• Intrusion Detection Systems (IDS)
• Wireshark
and Intrusion Prevention Systems
• Network segmentation (IPS)
TAKEAWAYS
• Develop the most in-demand skills in a majority of IT job roles such as Networking
& Network security
• Practice the skill of capturing and analyzing network traffic for cyber
investigations & troubleshooting
• Understand the implementation of VPN for securing the remote workforce
• Explore the Next Generation Firewall (NGFW) for network security
• Distinguish between security technologies like IDS & IPS and their usage
Discover the cyber attack methodology and learn to view attacks from the
lens of an attacker.
• TOPICS
• MITRE ATT&CK • Attacks on Networks
• Cyber Kill Chain • Attacks on Endpoints
• APT (Advanced Persistent Threats) • Attacks on Applications
• Ransomware Attacks & Cyber Insurance • Attacks on Data
• Attacks on Cryptography • Attacks on Cloud
• Attacks on Users
TAKEAWAYS
• Understand adversary tactics, techniques and procedures to enhance threat
detection and response strategies.
• Identify and disrupt cyber threats by understanding the different stages of a
cyber attack
• Recognize and defend against highly skilled and motivated attackers with
persistent access
• Mitigate financial risks from ransomware incidents through effective cyber
insurance strategies
• Secure cryptographic systems by identifying and mitigating vulnerabilities and
weaknesses
• Develop comprehensive security strategies to protect critical components against
various attack vectors. 08
MODULE 4 DESIGNING SECURITY CONTROLS | 3 WEEKS
• TOPICS
• Types of Security Controls • Authentication Implementation
• Endpoint Security Controls- Antivirus, • Deep dive into Security
Endpoint Detection and Response Information and Event
(EDR), Extended Detection and Management (SIEM)
Response (XDR)
• Threat Intelligence
• Identity and Access Management (IDAM)
• Incident Response
• Security Awareness
• Incident Response Playbooks
• Data Security Controls - Data Loss
Prevention (DLP), Cloud Access Security
Broker (CASB), Data Encryption, Data
Masking
TAKEAWAYS
• Differentiate between the types of security controls & their implementation
• Delve deeper into the protection mechanisms for endpoints such as Laptops,
Desktops & Servers
• Identify & classify different types of Data. Configure policies for preventing data
leakage from enterprise networks
• Monitor the signs of ongoing cyber attacks within a network with alerts from
authentication servers
• Learn about continuous security monitoring with advanced threat detection
• Learn to proactively gather actionable intelligence & stay informed about the threat
landscape
• Plan to respond to incidents and understand the incident response lifecycle
• TOPICS
• Regulations, Standards, and Legislations • Digital Operational Resilience Act
• ISO 27001:2022 (DORA) - Regulation (EU)
09
TAKEAWAYS
• Comprehend the compliance requirements in relation to the security standards
such as ISO 27001:2022
• Develop technical expertise in documenting the requirements for data protection
standards & laws such as GDPR, and DPDP
• Recognize the need for security, specific to Financial sector, by studying the
intricacies of DORA
• Practice the preparation of internal audits and how to conduct them yourself
confidently
• Recognize and treat the risks associated with supply chain management
Delve deeper into the security features of Microsoft Azure and understand the
methodology behind securing data on cloud.
• TOPICS
• Cloud Security in Different Platforms • Securing Data on Cloud
• Cloud Platform and Infrastructure • Incident Detection and Response
Security in Cloud
TAKEAWAYS
• Implement robust security measures tailored to Microsoft Azure for enhanced
protection
• Safeguard cloud infrastructure against cyber threats and vulnerabilities through
effective security controls.
• Ensure the confidentiality, integrity, and availability of data stored on cloud
platforms through encryption, access controls, and data loss prevention
measures.
• Detect and respond to security incidents in cloud environments promptly to
minimize impact and protect sensitive assets
Equip yourself with a solid grasp of penetration testing methodologies and gain
hands-on experience through interactive video and workbooks, ensuring industry
readiness.
• TOPICS
• Introduction to Penetration Testing • OWASP Top 10 & Application
• Techniques of Penetration Testing Security
10
TAKEAWAYS
• Practice the fundamental skills of penetration testing
• Differentiate between different methods used while performing the penetration tests
• Scanning the internal infrastructure and exploiting vulnerabilities to secure the
network
• Have an understanding of application security vulnerabilities such as OWASP Top 10
• Understand how pentesting of a web application differs from Infrastructure
penetration testing
Demonstrate your learnings throughout the program with a comprehensive Capstone project.
TAKEAWAYS
• Setting up security operations & monitoring using SIEM
• Planning security operations & monitoring using risk control mapping
• Research and prepare your analysis whether ChatGPT or Gemini should be allowed
by an organization
• TOPICS
• General Security Concepts • Security Operations
• Threats, Vulnerabilities, and Mitigations • Security Program Management
• Security Architecture
TAKEAWAYS
• Prepare for the Security+ exam by learning about the key concepts
• Get complete coverage of the domains measured in the Security+ examination
• Recap the concepts learned in the mandatory modules with a specific focus on the
Security+ certification exam
• Utilize the question bank to practice exam taking strategies
• TOPICS
• Introduction to Python • Cracking passwords with Python
• Network analysis with Python • Encryption with Python
TAKEAWAYS
• Learn to use python to perform and automate tasks.
• Understand the usage of python programming for network analysis, password 11
cracking and encryption.
CompTIA Security+
Bootcamp (Optional)
MODULE 1:
ATTACKS, THREATS AND VULNERABILITIES
MODULE 2:
ARCHITECTURE AND DESIGN
MODULE 3:
IMPLEMENTATION
MODULE 4:
OPERATIONS AND INCIDENT RESPONSE
MODULE 5:
GOVERNANCE RISK AND COMPLIANCE
Certificate of
Completion
Postgraduate Program in
Cybersecurity
All certificate images are for illustrative purposes only. The actual
certificate may be subject to change at the discretion of the university. 12
Program Faculty
and Industry
Mentors
Program Faculty
Aniket Amdekar
General Manager - Cyber
Defence Education, Great
Learning, E-Commerce
Cyber Security Specialist
Industry Mentors
Thomas Mulroy
Cybersecurity
Program Manager
and Engineer in
Automotive
Industry
*This is an indicative list and subject to change based on the faculty’s and mentor’s availability 13
Testimonials
This program is a must-have for every professional. The recent election in Kenya and the
technical and detailed evidence gathered is enough proof that all professionals - lawyers,
judges, accountants and politicians - need to understand the basics of Cybersecurity. As
world dynamics change with the influence of IoT, we need to keep up with this change.
This program gives people a thorough understanding of the tools. Unlike a lot of other
programs, which only focus on memorizing facts and concepts, this one teaches you
cyber skills that you can apply in any area of work. I would recommend this program to
anyone who wants to learn more about Cybersecurity.”
Modicai Donga
Chief Operations Manager/Lawyer,
SV Mdladla and Associates
14
Testimonials
“I got to know about the PG Program in Cybersecurity by UT Austin and Great Learning
from my family. This program was practical and extremely hands-on with challenging
technical labs that enabled me to dive deep into the world of Cybersecurity.
I strongly believe that the program content was designed in a way to understand
complex Cybersecurity concepts. The faculty were very professional in driving the
program and it helped me complete my projects on time. The admin team was great in
addressing all student issues promptly. I am very thankful to the Great Learning team for
this wonderful learning experience.”
Asha Chakkravarthy
Desktop Support Analyst,
Ovation Workplace Services
“With increasing awareness and concern over growing cyber threats facing different
organizations, governments and individuals, many organizations and colleges have
created new programs in Cybersecurity. Nothing compares to Great Learning and
University of Texas with their exceptional curriculum content. The high calibre of
industry experts and tutors and their knowledge of the subject matter is unparalleled.
While a lot of other programs in the market are at an infancy stage, I had no doubt that
Great Learning’s program would be thoughtfully designed with inputs from field
practitioners, national and international stakeholders and industry thought leaders with
the main aim of training Cybersecurity professionals of tomorrow with theoretical as
well as practical skills.
If there was ever a time to enter the Cybersecurity field, it is now. With cyber threats
and attacks increasing in both frequency and sophistication, the demand for
Cybersecurity professionals is far more than the supply. This means that for qualified
Cybersecurity specialists, job security is practically guaranteed. Thank you Great
Learning for your constant support in this journey!”
15
Admission Process
Program Eligibility
We offer a pre-work course for fresh graduates and non-IT candidates to learn the
fundamentals required for the program.
The admissions are conducted on a rolling basis and the admission process is closed
once the requisite number of candidates has been enrolled into the program.
Selection Process
For more information on flexible payment options, please reach out to your program advisor.
16
Disclaimer: Great Learning delivers the CompTIA Security+ Bootcamp. The University of Texas at Austin is
not involved in the program's design or delivery.
Program
Partners
Great Learning is a leading global ed-tech company for professional and higher
education. It offers comprehensive, industry-relevant programs across various
cutting-edge Technology, Data, and Business domains. Great Learning's programs are
developed in collaboration with the world's foremost academic institutions. They are
constantly reimagined and revamped to address the dynamic needs of the industry.
Great Learning is the only ed-tech company to provide these programs in a blended
mode, classroom mode, and purely online mode, relying on its vast network of expert
mentors and highly qualified faculty to deliver an unmatched learning experience for
learners in India and the world over. Great Learning is on a mission to enable
transformative learning and career success in the digital economy for professionals and
students across the globe and till date, we have impacted over 10 million learners from
over 170 countries.
17
Ready to become a
Cybersecurity expert?
APPLY NOW