Why Cyber Security?

Nowadays, sensitive information like personal details, credit card, and bank account details are now available on the internet while making various transactions. The studies state that at least 30,000 websites are hacked each day. Hence, Cyber Security measures are very important to protect personal and business critical information.

JG University enables professionals and enterprises to succeed in the fast-changing digital economy. The University’s Blended Learning curriculum combines self-paced Classroom Interactions, Incidents Handling, and Industry Internship with 24/7 global teaching assistance.

Below are some of the researches shared by global market research survey organisations regarding the trends for Cyber Secuirty

Opportunities

More than 85% of global IT Companies believe there is a significant shortage of qualified cyber security professionals.

The Global Cyber Security Market was valued at USD 132.94 billion in 2021, and it is predicted to grow at a CAGR of 14.1% from 2022 to 2027.

The estimated number of unfilled cyber security jobs globally grew by over one million in just 1 year from 3 million in 2020 to 4.07 million in 2021.

Industry Remuneration

Salary In India

The average salary varies from ₹ 4,00,000 to ₹ 24,00,000 per annum.

Salary In US

The average salary varies from 76,000 USD to 160,000 USD per annum.

Who Can Apply?

Programme Overview

Objectives

  • Understand the concept “Data is the new oil” and hence importance of keeping it safe
  • Learn open-source and proprietary tools and advanced technologies
  • Comprehensive understanding to guard and protect the infrastructure, networks, and hosts from malicious players
  • In depth knowledge to counter and protect Web, mobile and cloud application of the digital era by identifying potential risks affecting application landscape
  • Deliver the concepts of Cyber Security with defensive and ethical-offensive methods and learn the use of advance tools and technologies
  • Equip participants with Cyber Security Incident based learning using “Cyber Bay” along with theoretical learning
ai3

Outcomes

With Incident based learning, the participants can counter real-world cyber security breaches using simulation and defensive mechanisms

Skill acquisition of the fundamentals of Risk Management

Enabling participants to solve real-world cyber threats using virtual “Cyber Bay”

Monitoring and controlling of real-world cyber traffic

Strong practical knowledge on different multiple programming languages and database concepts that are essential in the context of information security

Comprehensive knowledge of advanced tools used in application security and performing Network Analysis

Competency in efficient implementation of threat modeling

Knowledge of reconnaissance techniques for hacking of application

Deep understanding of the digital forensic, cybercrime investigation process & best practices, managing incident response & recovery and cyber risks & risk management

Course Commencement

Delivery Mode

Offline

duration

Programme Duration

12 Months

Scholarship Fee

Area of Study

Cyber Security

Job Opportunities

  • Network Security Analyst
  • Application Security Analyst
  • SOC (Security Operation Centre)Analyst
  • Information Security Analyst
  • Cyber Security Analyst
  • Cloud Security Engineer

Key Industry Verticals where Cyber Security is prominent

Government

Government and public sector services

Manufacturing and Production

Manufacturing and Production Industry

Information Technology

Information Technology, ITeS

agriculture

Agriculture

Sports

Sports

Banking and Finance

Banking and Finance

Hospitality

Hospitality

Educational

Educational sectors

Logistics

Transportation, Logistics & Supply Chain

Entertainment

Entertainment

Utilities

Utilities

Programme Outline

Module 1 – Foundation Module

  • Understanding the overview of Cyber Security, its domains, its necessity in the modern digital era and the mindset to drive this program until the end. It is a theory-oriented programme intended to lay a strong emphasis on the fundamentals of Cyber Security
  • The participants will have clarity on the importance of Cyber Security in business

Module 2 – Programming & Scripting

  • Understanding different multiple programming languages such as C, C++, JAVA, XML, Python, Ruby on Rails, and database concepts which are essential for the aspirants to understand application security
  • Hans-On sessions will focus on web technologies, specific tools and techniques through practicals and targeted exercises

Module 3 – Infrastructure Security

  • Understanding IT infrastructure security, its importance in business, the risks and the threats. The best practices to be followed in IT Infrastructure security and the technologies to protect the IT network and infrastructure
  • Understanding the features of the Windows & Linux Operating systems, the server and host fundamentals of Windows and Linux
  • The hands-on will focus on specific tools and techniques through demos, exercises and security incidents

Module 4 – Network Security

  • Understanding the concepts of Network Security such as networking, wireless networks, network management, protocols switching & routing, operations, cryptography, risk assessment and endpoint security
  • Understanding of End-point detection & response, Cryptography & its application, risk assessment and network operations
  • The hands-on sessions help to understand basic tools used in networking, protocol analyzers, packet tracers, and specific cryptography tools

Module 5 – Application Security

  • Understanding the concepts such as different types of application environments like web, mobile, cloud and IoT, their architecture and security, developing secure applications, how to secure the application databases, OWASP Top 10 and application security standards and triaging and bug management process
  • The hands-on sessions focus on basic and advanced tools used in application security

Module 6 – Secure Coding & Code Review

  • Understanding of threat modeling, code review techniques, the concepts such as secure SDLC, secure coding techniques and best practices, code reviews and techniques, DevSecOps and threat modeling
  • The hands-on sessions will introduce the learners to specific tools and techniques for secure code review through exercises and incident-based learning in the virtual Cyber Bay labs

Capstone Project-1 based on the above Learning

Module 7 – Hacking

  • Understanding the concepts of Hacking such as ethical hacking, methodology, reconnaissance, footprinting, scanning, enumeration, malware attacks VAPT. Learning the techniques for reporting, vulnerability assessment & penetration testing and documentation
  • The hands-on sessions will introduce specific tools and techniques for each of the steps in ethical hacking through exercises and incident-based learning in the virtual SOC labs

Module 8 – Security Operation

  • Understanding the concepts of Security Operations such as threat intelligence, SIEM (Security Information & Event Management) Components, SOAR (Security Orchestration Automation & Response) Components and Managed Detection and Response (MDR), anatomy of SIEM & SOAR
  • The hands-on sessions will introduce specific tools and techniques for each of the steps to implement specific SIEM tools through exercises and incident-based learning in the virtual Cyber Bay labs

Module 9 – Digital Forensics

  • Understanding the concepts of Digital forensics such as digital forensic investigation process, computer forensics, network forensics, social media forensics, cybercrime investigation process and best practices, incident handling and malware analysis. Learning the techniques for their forensic reporting and evidence handling
  • The Hands-on sessions will introduce specific tools and techniques for each of the steps in digital forensics through exercises and incident-based learning in the virtual Cyber Bay labs

Module 10 – Network Incident Management

  • Understanding the concepts of Network Incident Management such as incident response and handling, incident response playbooks, detecting and identifying incidents, managing incident response and recovery, security orchestration and compliance. Learning the techniques for incident reporting and response, the Future of Automated Incident Response and Compliance & Governance
  • The practical sessions will introduce specific tools and techniques for each of the steps in the incident management process through exercises and incident-based learning in the virtual Cyber Bay labs

Module 11 –Risk Management

  • Understanding concepts of cyber risks, risk management, threat landscape, risk analysis & techniques, access control risks, compliance and standards and governance for risk management
  • The hands-on sessions will introduce specific tools and techniques for each of the steps in the risk management process through exercises and case studies

Capstone Project-2 based on the above Learning

Faculty

Professor Thirukkumaran R

Professor Thirukkumaran R Faculty for Iiot

Dr. Thirukkumaran R has over 25+ years of experience Industry in IT-Teaching-Training-Research-Consultancy. He has obtained his Ph.D., in the field of Internet of Things (IoT). He is also a Professor and Head (R&D), IIoT CoE at Chools Group in Bengaluru in addition to being a Professor at JG University. He is also having strong research expertise in the areas of Wireless Network, WSN, Cyber Security, Cloud Computing, IoT, Industry 4.0 and 75 Students' Satellites Mission 2022! He's also a prolific researcher and writer in the field of data science/ML/information technology etc.

Why JG University?

  • Faculties with Industry Expertise and Academic Experience
  • Hand-on Industry Use-Cases using advance technologies in Digital Lab
  • Capstone Projects – Working with Industries
  • Full Time access to virtual “Cyber Bay” Cyber Range
  • State-of-the-art Industrial IoT Lab with Drone technology experience
  • World Class Tech-Enabled Digital Library
  • Cross Cultural & Cross Sectoral Internship
  • Collaboration with Foreign Universities
  • Roof-Top Cafeteria

Admission Process

Our Admission process enables us to meticulously give importance to every individual applying. The admission of the applicant will majorly be based on our admission process scores.