Why Cyber Security– Architecture & Operations?

Nowadays, sensitive information like personal details, credit card, and bank account details are now available on the internet while making various transactions. The studies state that at least 30,000 websites are hacked each day. Hence, Cyber Security measures are very important to protect personal and business critical information.

JG University enables professionals and enterprises to succeed in the fast-changing digital economy. The University’s Blended Learning curriculum combines self-paced Classroom Interactions, Incidents Handling, and Industry Internship with 24/7 global teaching assistance.

Below are some of the researches shared by global market research survey organisations regarding the trends for Cyber Secuirty – Architecture & Operations

Opportunities

More than 85% of global IT Companies believe there is a significant shortage of qualified cyber security professionals.

The Global Cyber Security Market was valued at USD 132.94 billion in 2021, and it is predicted to grow at a CAGR of 14.1% from 2022 to 2027.

The estimated number of unfilled cyber security jobs globally grew by over one million in just 1 year from 3 million in 2020 to 4.07 million in 2021

Industry Remuneration

Salary In India

The average salary varies from ₹ 4,00,000 to ₹ 24,00,000 per annum.

Salary In US

The average salary varies from 76,000 USD to 160,000 USD per annum.

Who Can Apply?

Programme Overview

Objectives

  • Understand the concept “Data is the new oil” and hence importance of keeping it safe
  • In-depth knowledge to guard and protect the infrastructure, networks, and hosts from malicious players
  • Deliver the concepts of Cyber Security with defensive and ethical-offensive methods and learn the use of advance tools and technologies currently available in practice
  • Equip participants with Cyber Security Incident based learning using “Cyber Bay” along with theoretical learning
ai3

Outcomes

With Incident based learning, the participants can counter real-world cyber security breaches using simulation and defensive mechanisms

Monitoring of real-world cyber traffic with in-live Security Operation Center (SOC)

Industry ready cyber professionals for continuous monitoring and problem solving

Enabling participants to solve real-world cyber threat using “Cyber Bay”

Course Commencement

Delivery Mode

Offline

duration

Programme Duration

12 Months

Scholarship Fee

Area of Study

Cyber Security Architecture & Operations

Job Opportunities

  • Network Security Analyst
  • SOC (Security Operation Centre)Analyst
  • Information Security Analyst
  • Cyber Security Analyst
  • Cloud Security Engineer

Key Industry Verticals where Cyber Security is prominent

Government

Government and public sector services

Manufacturing and Production

Manufacturing and Production Industry

Information Technology

Information Technology, ITeS

agriculture

Agriculture

Sports

Sports

Banking and Finance

Banking and Finance

Hospitality

Hospitality

Educational

Educational sectors

Logistics

Transportation, Logistics & Supply Chain

Entertainment

Entertainment

Utilities

Utilities

Programme Outline

Module 1 – Introduction Session

  • Understanding the need of the program, how it has been designed and how it is expected to drive as a full-fledged PGP in Architecture & Operations (A&O)

Module 2 – Foundation Module

  • Understanding the overview of Cyber Security, its domains, its necessity in the modern digital era and mindset to drive this program until the end
  • The Foundation module is a 50 Hrs theory-oriented programme intended to lay a strong emphasis on fundamentals of Cyber Security

Module 3 – Infrastructure Security

  • Understading the features of the Windows & Linux Operating systems. The learners will also be taught the server and host fundamentals of Windows and Linux
  • The practical sessions will focus on specific tools and techniques through demos, exercises and security incidents

Module 4 – Network Security

  • Understading the concepts of Network Security such as networking, wireless networks, network management and operations, cryptography, risk assessment and end point security
  • The practical session helps to understand basic tools used in networking, protocol analyzers, packet tracers, and specific cryptography tools

Module 5 – Hacking

  • Understading the concepts of Hacking such as ethical hacking, methodology, reconnaissance, footprinting, scanning, enumeration, malware attacks and VAPT
  • Learning the techniques for reporting
  • The practical sessions will introduce specific tools and techniques for each of the steps in ethical hacking through exercises and incident-based learning on the Cyber Bay labs

Module 6 – Security Operation

  • Understanding the concepts of Security Operations such as threat intelligence, SIEM, SOAR and Managed Detection and Response (MDR)
  • The practical sessions will introduce specific tools and techniques for each of the steps to implement specific SIEM tools through exercises and incident based learning on the Cyber Bay labs

Module 7 – Digital Forensics

  • Understading the concepts of Digital forensics such as digital forensic investigation process, computer forensics, network forensics, social media forensics, cyber crime investigation process and best practices, incident handling and malware analysis
  • Learning the techniques for their forensic reporting and evidence handling
  • The practical sessions will introduce specific tools and techniques for each of the steps in digital forensics through exercises and incident-based learning on the Cyber Bay labs

Module 8 – Network Incident Management

  • Understading the concepts of Network Incident Management such as incident response and handling, incident response playbooks, detecting and identifying incidents, managing incident response and recovery, security orchestration and compliance
  • Learning the techniques for incident reporting and response
  • The practical sessions will introduce specific tools and techniques for each of the steps in the incident management process through exercises and incident-based learning on the Cyber Bay labs

Faculty

harish-ramani

Dr. Harish Ramani Director of Cyber Security

Dr. Harish Ramani has 11 years of experience in cyber security consulting and 9 years of academic involvement in cyber security. Apart from Mr. Ramani’s contributions to JG University, he continues to be distinguished faculty in IIT-Madras, IIIT-Bangalore & IIIT-Sri city. In addition to his input to universities in India, Dr. Ramani has worked internationally with the University of Wales & Queensland University of technology. Dr. Ramani has worked as Director of cyber security practice at Advasoft and has trained Nigerian Intelligence, Chennai Cybercrime police, NLC India, Damodar Valley Corporation, NTPC, IRCTC. Dr. Ramani is a certified ethical hacker, certified network defender, certified computer hacking forensic investigator, EC-Council certified security and certified EC-council instructor.

Why JG University?

  • Faculties with Industry Expertise and Academic Experience
  • Hand-on Industry Use-Cases using advance technologies in Digital Lab
  • Capstone Projects – Working with Industries
  • Full-Time access to “Cyber Bay” Cyber Range
  • State-of-the-art Industrial IoT Lab with Drone technology experience
  • World Class Tech-Enabled Digital Library
  • Cross Cultural & Cross Sectoral Internship
  • Collaboration with Foreign Universities
  • Roof Top Cafeteria

Admission Process

Our Admission process enables us to meticulously give importance to every individual applying. The admission of the applicant will majorly be based on our admission process scores.