Post Graduate
Program in
Cybersecurity
Build cybersecurity skills to accelerate your career
Now with CompTIA Security+ Bootcamp | 6 Weeks (Optional)
Live Mentorship Lab Sessions for Certificate of Completion from
16 Weeks
with Experts Hands-on Practice the University of Texas at Austin
A program by In collaboration with
There are only two types
of companies: those that
have been hacked, and
those that will be.
Robert Mueller
FBI Director, 2012
Image credit: Christopher Gregory/The New York Times
Malicious hackers are becoming increasingly adept at exploiting software vulnerabilities,
compelling organizations to build advanced cybersecurity measures or risk losing their
reputation, billions of dollars and valuable data.
Organizations across the world are combating this challenge by upskilling their workforce,
recruiting skilled cybersecurity professionals, and building robust cyber defense capabilities.
OVER 50% 3.5 MILLION JOBS $215 BILLION
organizations are beginning to in cybersecurity to be Projected worldwide
recognize the importance of available by 2025, according end-user spending on
being secure from the start in to the U.S. Bureau of Labor security and risk
any transformation effort. Statistics. management in 2024.
- State of Cybersecurity - Cybersecurity Ventures, 2022 - Gartner
Resilience, 2023
A cybersecurity professional is engaged in a strategic game of ever-changing defensive and offensive
techniques and must know the ins-and-outs of the domain to protect IT infrastructures effectively.
The Postgraduate Program in Cybersecurity equips you with the skills needed to investigate attacks
and build robust cybersecurity systems while giving your resume the University of Texas at Austin
advantage. The program is ideal for cyber defense enthusiasts, enabling them to connect with
thought leaders in the industry and understand the process of securing digital infrastructure.
02
Program
Highlights
The new-age technological wave has come with its own set of threats, leading to a
prominent demand for cybersecurity professionals. This program is crafted by experts
to empower you with a skill set to analyze the threat landscape and build long-term
cybersecurity strategies.
A curriculum by the leading Interactive live
faculty at the McCombs mentorship with
School of Business industry experts
Certificate of completion Lab sessions to
from the University of gain hands-on
Texas at Austin experience
A final 4-week Dedicated program
capstone project support from
(optional) Great Learning
03
Who is this
program for?
The curriculum is designed to cater to various professional needs. Whether you’re an
early career professional looking to build a career in cybersecurity, or a mid-level IT
professional looking to transition into the domain, this program will help you align
your learning to your professional goals.
Graduates and Early Career Professionals Professionals from Technology and IT Fields
Learn the core concepts of cybersecurity The program also gives you an overview of the
and build a solid foundation using best cyber defense practices, enabling you to
in-demand market skills. You will benefit analyze the threat landscape and upskill as a
from this if you are: cybersecurity specialist. You will benefit from
An early career professional looking this if you are:
to transition into a career in An IT infrastructure manager who wants
cybersecurity to upskill with cybersecurity
A fresh graduate wanting to break An experienced professional looking to
into the cybersecurity domain specialize in cybersecurity
Successful completion of the program may qualify you for various roles in
cybersecurity, including:
Cybersecurity Analyst Incident Response Professional
Cyber Threat Intelligence Analyst Cloud Security Analyst
Information Security Specialist SOC Analyst
04
SOC Specialist
Program
Outcomes
Upon completion of the program, you would have developed the skill set needed to:
1. Develop the 4. Demonstrate the
Security Mindset understanding of how to
identify and defend against
modern-day threats such
as Ransomware
2. Perform incident 5. Comprehend the evolving
investigations to identify threat landscape by
the source of the threat, understanding the biggest
assess the risk and respond, cyber attacks to-date
and write clear and
world-class incident reports
3. Familiarize yourself with the 6. Build muscle memory for
Standards and Frameworks responding to cyber attacks
such as: National Institute of by following Incident
Standards and Technology Response playbooks
(NIST), MITRE ATT&CK, Center
for Internet Security (CIS)
Benchmarks
The program also helps in preparing learners for the CompTIA Security+, CompTIA
Cybersecurity Analyst (CySA+), and EC-Council Certified SOC Analyst (CSA) certifications.
05
CompTIA Security+
Bootcamp (Optional)
Take a step ahead into your Cybersecurity Career
About CompTIA Security+
CompTIA Security+ is a widely accepted entry-level vendor-neutral Cybersecurity
certification that validates your competency in the field of security. CompTIA Security+
is compliant with ISO 17024 standards and approved by the US DoD to meet directive
8140/8570.01-M requirements.
What Does This Bootcamp Contain?
Live Mentor Sessions with Dedicated Question
Industry Experts Bank & 2 Mock Exams
5-6 Hours of Learning Free Exam Voucher
Per Week worth USD 392
Mind Maps &
Exam-Taking Strategies
Certificate of Completion
From Great Learning
06
Curriculum
The program is designed with 4 milestones. Starting strong with the foundations of
cybersecurity, you then deep dive into the different types of cyber attacks. As you
understand the attacks, you will learn to design the security controls needed to build
a resilient system. Finally, if an attack happens, you practice responding to these
incidents by referring to Incident Response Playbooks given to you as part of the
program. In this last section you will also learn how to investigate these attacks.
MODULE 1:
FOUNDATIONS OF INFORMATION SECURITY | 4 WEEKS
Learn the fundamentals of Risk Management, Cryptography,
Network Security, and Cloud Security
MODULE 2:
UNDERSTANDING CYBER ATTACKS | 4 WEEKS
Learn about the latest advances in cybersecurity and how
such attacks are managed at organizational levels
MODULE 3:
DESIGNING SECURITY CONTROLS | 4 WEEKS
Learn how to identify and implement the right cybersecurity
control for various cyber attacks
MODULE 4:
SECURITY OPERATIONS & INCIDENT MANAGEMENT | 4 WEEKS
Learn to use Incident Response Playbook to defend against an ongoing
cyber attack, and protect critical digital resources in this situation
MODULE 5:
PENETRATION TESTING/ETHICAL HACKING | SELF-PACED
Equip yourself with a solid grasp of penetration testing methodologies and gain hands-on
experience through interactive video and workbooks, ensuring industry readiness
MODULE 6:
CAPSTONE PROJECT (OPTIONAL) | 4 WEEKS
Demonstrate your learnings throughout the program with
07
a comprehensive capstone project
MODULE 1: FOUNDATIONS OF INFORMATION SECURITY
TOPICS
CIA Triad OSI and TCP/IP Model
Cybersecurity Risk Management Wireshark
Need for Security Zero Trust
IAAA – Identity Authentication Securing the Cloud
Authorization Auditing Security Compliance & Frameworks
Cryptography Application Security (Nessus,
Enterprise Applications Metasploit)
Network Security
KEY TAKEAWAYS
Understand the ‘why’ behind cybersecurity
Learn the principles of Risk Management
Gain an understanding of how enterprise applications work
Understand the concepts behind network design & network security
Understand how cryptography works & what it protects
Get a flavor of perimeter-less security, also called as Zero Trust Network Architecture
Demonstrate your understanding by completing labs that simulate real-life scenarios
MODULE 2: UNDERSTANDING CYBER ATTACKS
TOPICS
MITRE ATT&CK Framework Indicators of Compromise
Threat Tactics Tactics Techniques and Procedures
Malware Case Study: Not Petya Solarwinds,
Attack Kill Chain Colonial Pipeline, Olympic games
Attack Vectors Attack Groups - Unit 8200, Nobelium,
Deep Dive Into the Dark Web APT 29
Physical Attacks
KEY TAKEAWAYS
Understand the different types of cyber attacks and the risks they pose
Familiarize yourself with the types of threats and the threat actors
Delve deeper into the Tactics, Techniques and Procedures used by the adversaries
with insights
Understand the structure of an attack- Kill chain methodology
Apply the concepts of cyber attacks and threat to discern the Solarwinds
and Colonial Pipeline attacks
08
MODULE 3: DESIGNING SECURITY CONTROLS
TOPICS
Firewalls Patching
Web Application Firewalls System Audit
IDS/IPS Maintenance, Monitoring, and
Antivirus & EDR Analysis of Audit Logs
Email Protection SIEM (Security Information and
Data Loss Prevention Event Management)
Vulnerability Management Incident Investigation
Zero-Day Vulnerability Threat Intelligence
KEY TAKEAWAYS
Understand the controls that help in detecting security threats
Develop a deeper understanding of SIEM and its purpose
Familiarize yourself with the reviewing, interpreting, and understanding of
computer-generated logs
Learn how cyber threat intelligence helps in assessing security threats
Gain knowledge on network firewalls and web application firewalls
Familiarize yourself with antivirus and its applications
Understand and practice shell scripting
MODULE 4: SECURITY OPERATIONS & INCIDENT MANAGEMENT
TOPICS
Incident Response and Playbooks SLAs KRIs, KPI
NIST Framework Maintenance, Monitoring, and Analysis of
The Golden Hour Audit Logs
Log and Email Analysis Recovery from an Incident
Writing Incident Reports Forensics
Security Operations Centre –
A Deep dive
KEY TAKEAWAYS
Learn how to read, write and examine incident reports
Learn about the Incident Response Lifecycle of NIST
Familiarize yourself with the concept of the golden hour
Understand how to examine incident data in order secure from cyber threats
using forensics
Gain knowledge on the tasks performed at a Security Operations Center (SOC)
09
Learn to form a recovery strategy from a cyber attack
MODULE 5: PENETRATION TESTING/ETHICAL HACKING SELF-PACED
TOPICS
Introduction to Penetration Testing Techniques of Penetration Testing
OWASP Web Application Penetration Testing
Infra Penetration Testing Penetration Testing Case Study (Video Workbooks)
KEY TAKEAWAYS
Learn about penetration testing and ethical hacking methodologies
Learn about penetration testing exercises and the attack life cycle
Understand OWASP's top 10 vulnerabilities
Deep-dive into various penetration testing techniques
Learn to set up your own lab environment for practicing use cases
MODULE 6: CAPSTONE PROJECT (OPTIONAL)
Choice of the Capstone project is tailored for practitioners and decision makers.
KEY TAKEAWAYS
The Capstone project challenges you to demonstrate your skill & knowledge
You will use a combination of hands-on skills and security research capability
PRE-WORK (OPTIONAL)
For professionals seeking a full-time career in cybersecurity, but working in a non-IT domain,
we have a special course to learn the fundamentals required to build cybersecurity solutions.
With a strong foundation, your learning journey in cybersecurity will be more streamlined.
SELF-PACED MODULE: DEMYSTIFYING ChatGPT AND APPLICATIONS
Gain an understanding of what ChatGPT is and how it works, as well as delve into the
implications of ChatGPT for work, business, and education. Additionally, learn about
prompt engineering and how it can be used to fine-tune outputs for specific use cases.
10
CompTIA Security+
Bootcamp (Optional)
MODULE 1:
ATTACKS, THREATS, AND VULNERABILITIES
MODULE 2:
ARCHITECTURE AND DESIGN
MODULE 3:
IMPLEMENTATION
MODULE 4:
OPERATIONS AND INCIDENT RESPONSE
MODULE 5:
GOVERNANCE RISK & COMPLIANCE
Certificate of
Completion
Postgraduate Program in
Cybersecurity
All certificate images are for illustrative purposes only. The actual
certificate may be subject to change at the discretion of the university. 11
Program Faculty
and Industry
Mentors
Program Faculty
Dr. Kumar Muthuraman Farhad Sajid
Faculty Director, Center for Certified Security
Research and Analytics Specialist (ECSS),
McCombs School of Business, IBM Advanced Data
University of Texas at Austin Science Specialist
Aniket Amdekar Anurag Goyal
General Manager - Cyber Cybersecurity
Defence Education, Great Researcher,
Learning, E-Commerce Ernst & Young
Cyber Security Specialist
Industry Mentors
Varun Pathak Mayan Mohan
Freelance Cybersecurity Team Lead - Managed
Trainer Threat Response,
Sophos
Matthew Lindwall Vikas Yadav
Senior Cybersecurity Chief Information
Risk Analyst, Security Officer,
QuikTrip Nykaa
*This is an indicative list and subject to change based on the faculty’s and mentor’s availability 12
Testimonials
“I came across the Post Graduate Program in Cybersecurity on the Great Learning
LinkedIn page in May, 2022 and it's been an interesting learning journey so far. The
payment option was friendly and flexible. The recorded, live sessions and the hands-on
lab projects have been engaging and impactful in becoming a well-seasoned
cybersecurity expert.”
Abiola Olufunke Famoroti
CEO,
Abbatoir Services
“I highly recommend taking the Post Graduate Program in Cybersecurity. As a legal
professional, I realized that the world was soon moving towards the “Internet of Things”
direction, with digital platforms leading the way. As a 21st century lawyer, enrolling for a
cybersecurity program was the best option for me. This program is by far, the most
useful in the cyber world. It has noticeably improved my understanding of how cyber
criminals plan and execute their malicious activities.
This program is a must-have for every professional. The recent election in Kenya and the
technical and detailed evidence gathered is enough proof that all professionals - lawyers,
judges, accountants and politicians - need to understand the basics of cybersecurity. As
world dynamics change with the influence of IoT, we need to keep up with this change.
This program gives people a thorough understanding of the tools. Unlike a lot of other
programs, which only focus on memorizing facts and concepts, this one teaches you
cyber skills that you can apply in any area of work. I would recommend this program to
anyone who wants to learn more about cybersecurity.”
Modicai Donga
Chief Operations Manager/Lawyer,
SV Mdladla and Associates
13
Testimonials
“I got to know about the PG Program in Cybersecurity by UT Austin and Great Learning
from my family. This program was practical and extremely hands-on with challenging
technical labs that enabled me to dive deep into the world of cybersecurity.
I strongly believe that the program content was designed in a way to understand
complex cybersecurity concepts. The faculty were very professional in driving the
program and it helped me complete my projects on time. The admin team was great in
addressing all student issues promptly. I am very thankful to the Great Learning team for
this wonderful learning experience.”
Asha Chakkravarthy
Desktop Support Analyst,
Ovation Workplace Services
“With increasing awareness and concern over growing cyber threats facing different
organizations, governments and individuals, many organizations and colleges have
created new programs in cybersecurity. Nothing compares to Great Learning and
University of Texas with their exceptional curriculum content. The high calibre of
industry experts and tutors and their knowledge of the subject matter is unparalleled.
While a lot of other programs in the market are at an infancy stage, I had no doubt that
Great Learning’s program would be thoughtfully designed with inputs from field
practitioners, national and international stakeholders and industry thought leaders with
the main aim of training cybersecurity professionals of tomorrow with theoretical as well
as practical skills.
If there was ever a time to enter the cybersecurity field, it is now. With cyber threats and
attacks increasing in both frequency and sophistication, the demand for cybersecurity
professionals is far more than the supply. This means that for qualified cybersecurity
specialists, job security is practically guaranteed. Thank you Great Learning for your
constant support in this journey!”
Obakilwe George Sekoane
Change Manager,
Umgeni Water
14
Admission
Process
Program Eligibility
Applicants to the program can include:
Graduates without experience in the IT domain
Working professionals from any industry
IT professionals with 2 years of experience
We offer a pre-work course for fresh graduates and non-IT candidates to learn the
fundamentals required for the program.
The admissions are conducted on a rolling basis and the admission process is closed
once the requisite number of candidates has been enrolled into the program.
Selection Process
APPLY SCREENING PROCESS JOIN PROGRAM
Apply by filling Attend an application An offer letter will be
a simple online screening call rolled out to selected
application form candidates
Post Graduate Program in Cybersecurity
Post Graduate Program in Cybersecurity
+ CompTIA Security+ Bootcamp
Price: USD 2800
Price: USD 2800+1800 = 4600 USD 4000
Cohort Start Date: March 16, 2024
*Exclusive Value-Added Bundle
15
For more information on flexible payment options, please reach out to your program advisor.
Program
Partners
The University of Texas at Austin’s McCombs School of Business (ranked #6 according to
QS Global rankings) is a premier business school at a world class public research
university. It cultivates principled leaders and develops ideas through high-quality
instructions, experiential learning, and the pursuit of relevant, groundbreaking research.
Great Learning is a leading global ed-tech company for professional and higher
education. It offers comprehensive, industry-relevant programs across various
cutting-edge Technology, Data, and Business domains. Great Learning's programs are
developed in collaboration with the world's foremost academic institutions. They are
constantly reimagined and revamped to address the dynamic needs of the industry.
Great Learning is the only ed-tech company to provide these programs in a blended
mode, classroom mode, and purely online mode, relying on its vast network of expert
mentors and highly qualified faculty to deliver an unmatched learning experience for
learners in India and the world over. Great Learning is on a mission to enable
transformative learning and career success in the digital economy for professionals and
students across the globe and till date, we have impacted over 9.2 million learners from
over 170 countries.
16
Ready to become a
cybersecurity expert?
APPLY NOW
Contact Great Learning for more information about the program:
+1 512 212 4186
[email protected]mygreatlearning.com/pg-program-cyber-security-course