PG Program Cyber Security Course
PG Program Cyber Security Course
Program in
Cybersecurity
Build cybersecurity skills to accelerate your career
Organizations across the world are combating this challenge by upskilling their workforce,
recruiting skilled cybersecurity professionals, and building robust cyber defense capabilities.
The Postgraduate Program in Cybersecurity equips you with the skills needed to investigate attacks
and build robust cybersecurity systems while giving your resume the University of Texas at Austin
advantage. The program is ideal for cyber defense enthusiasts, enabling them to connect with
thought leaders in the industry and understand the process of securing digital infrastructure.
02
Program
Highlights
The new-age technological wave has come with its own set of threats, leading to a
prominent demand for cybersecurity professionals. This program is crafted by experts
to empower you with a skill set to analyze the threat landscape and build long-term
cybersecurity strategies.
03
Who is this
program for?
Graduates and Early Career Professionals Professionals from Technology and IT Fields
Learn the core concepts of cybersecurity The program also gives you an overview of the
and build a solid foundation using best cyber defense practices, enabling you to
in-demand market skills. You will benefit analyze the threat landscape and upskill as a
from this if you are: cybersecurity specialist. You will benefit from
An early career professional looking this if you are:
to transition into a career in An IT infrastructure manager who wants
cybersecurity to upskill with cybersecurity
Successful completion of the program may qualify you for various roles in
cybersecurity, including:
Upon completion of the program, you would have developed the skill set needed to:
The program also helps in preparing learners for the CompTIA Security+, CompTIA
Cybersecurity Analyst (CySA+), and EC-Council Certified SOC Analyst (CSA) certifications.
05
CompTIA Security+
Bootcamp (Optional)
Take a step ahead into your Cybersecurity Career
Certificate of Completion
From Great Learning
06
Curriculum
The program is designed with 4 milestones. Starting strong with the foundations of
cybersecurity, you then deep dive into the different types of cyber attacks. As you
understand the attacks, you will learn to design the security controls needed to build
a resilient system. Finally, if an attack happens, you practice responding to these
incidents by referring to Incident Response Playbooks given to you as part of the
program. In this last section you will also learn how to investigate these attacks.
MODULE 1:
FOUNDATIONS OF INFORMATION SECURITY | 4 WEEKS
Learn the fundamentals of Risk Management, Cryptography,
Network Security, and Cloud Security
MODULE 2:
UNDERSTANDING CYBER ATTACKS | 4 WEEKS
Learn about the latest advances in cybersecurity and how
such attacks are managed at organizational levels
MODULE 3:
DESIGNING SECURITY CONTROLS | 4 WEEKS
Learn how to identify and implement the right cybersecurity
control for various cyber attacks
MODULE 4:
SECURITY OPERATIONS & INCIDENT MANAGEMENT | 4 WEEKS
Learn to use Incident Response Playbook to defend against an ongoing
cyber attack, and protect critical digital resources in this situation
MODULE 5:
PENETRATION TESTING/ETHICAL HACKING | SELF-PACED
Equip yourself with a solid grasp of penetration testing methodologies and gain hands-on
experience through interactive video and workbooks, ensuring industry readiness
MODULE 6:
CAPSTONE PROJECT (OPTIONAL) | 4 WEEKS
Demonstrate your learnings throughout the program with
07
a comprehensive capstone project
MODULE 1: FOUNDATIONS OF INFORMATION SECURITY
TOPICS
KEY TAKEAWAYS
Get a flavor of perimeter-less security, also called as Zero Trust Network Architecture
TOPICS
KEY TAKEAWAYS
Understand the different types of cyber attacks and the risks they pose
Familiarize yourself with the types of threats and the threat actors
Delve deeper into the Tactics, Techniques and Procedures used by the adversaries
with insights
Apply the concepts of cyber attacks and threat to discern the Solarwinds
and Colonial Pipeline attacks
08
MODULE 3: DESIGNING SECURITY CONTROLS
TOPICS
Firewalls Patching
Web Application Firewalls System Audit
IDS/IPS Maintenance, Monitoring, and
Antivirus & EDR Analysis of Audit Logs
Email Protection SIEM (Security Information and
Data Loss Prevention Event Management)
Vulnerability Management Incident Investigation
Zero-Day Vulnerability Threat Intelligence
KEY TAKEAWAYS
TOPICS
KEY TAKEAWAYS
Understand how to examine incident data in order secure from cyber threats
using forensics
TOPICS
KEY TAKEAWAYS
Learn about penetration testing exercises and the attack life cycle
Learn to set up your own lab environment for practicing use cases
Choice of the Capstone project is tailored for practitioners and decision makers.
KEY TAKEAWAYS
The Capstone project challenges you to demonstrate your skill & knowledge
You will use a combination of hands-on skills and security research capability
PRE-WORK (OPTIONAL)
For professionals seeking a full-time career in cybersecurity, but working in a non-IT domain,
we have a special course to learn the fundamentals required to build cybersecurity solutions.
With a strong foundation, your learning journey in cybersecurity will be more streamlined.
Gain an understanding of what ChatGPT is and how it works, as well as delve into the
implications of ChatGPT for work, business, and education. Additionally, learn about
prompt engineering and how it can be used to fine-tune outputs for specific use cases.
10
CompTIA Security+
Bootcamp (Optional)
MODULE 1:
ATTACKS, THREATS, AND VULNERABILITIES
MODULE 2:
ARCHITECTURE AND DESIGN
MODULE 3:
IMPLEMENTATION
MODULE 4:
OPERATIONS AND INCIDENT RESPONSE
MODULE 5:
GOVERNANCE RISK & COMPLIANCE
Certificate of
Completion
Postgraduate Program in
Cybersecurity
All certificate images are for illustrative purposes only. The actual
certificate may be subject to change at the discretion of the university. 11
Program Faculty
and Industry
Mentors
Program Faculty
Industry Mentors
*This is an indicative list and subject to change based on the faculty’s and mentor’s availability 12
Testimonials
“I came across the Post Graduate Program in Cybersecurity on the Great Learning
LinkedIn page in May, 2022 and it's been an interesting learning journey so far. The
payment option was friendly and flexible. The recorded, live sessions and the hands-on
lab projects have been engaging and impactful in becoming a well-seasoned
cybersecurity expert.”
This program is a must-have for every professional. The recent election in Kenya and the
technical and detailed evidence gathered is enough proof that all professionals - lawyers,
judges, accountants and politicians - need to understand the basics of cybersecurity. As
world dynamics change with the influence of IoT, we need to keep up with this change.
This program gives people a thorough understanding of the tools. Unlike a lot of other
programs, which only focus on memorizing facts and concepts, this one teaches you
cyber skills that you can apply in any area of work. I would recommend this program to
anyone who wants to learn more about cybersecurity.”
Modicai Donga
Chief Operations Manager/Lawyer,
SV Mdladla and Associates
13
Testimonials
“I got to know about the PG Program in Cybersecurity by UT Austin and Great Learning
from my family. This program was practical and extremely hands-on with challenging
technical labs that enabled me to dive deep into the world of cybersecurity.
I strongly believe that the program content was designed in a way to understand
complex cybersecurity concepts. The faculty were very professional in driving the
program and it helped me complete my projects on time. The admin team was great in
addressing all student issues promptly. I am very thankful to the Great Learning team for
this wonderful learning experience.”
Asha Chakkravarthy
Desktop Support Analyst,
Ovation Workplace Services
“With increasing awareness and concern over growing cyber threats facing different
organizations, governments and individuals, many organizations and colleges have
created new programs in cybersecurity. Nothing compares to Great Learning and
University of Texas with their exceptional curriculum content. The high calibre of
industry experts and tutors and their knowledge of the subject matter is unparalleled.
While a lot of other programs in the market are at an infancy stage, I had no doubt that
Great Learning’s program would be thoughtfully designed with inputs from field
practitioners, national and international stakeholders and industry thought leaders with
the main aim of training cybersecurity professionals of tomorrow with theoretical as well
as practical skills.
If there was ever a time to enter the cybersecurity field, it is now. With cyber threats and
attacks increasing in both frequency and sophistication, the demand for cybersecurity
professionals is far more than the supply. This means that for qualified cybersecurity
specialists, job security is practically guaranteed. Thank you Great Learning for your
constant support in this journey!”
14
Admission
Process
Program Eligibility
We offer a pre-work course for fresh graduates and non-IT candidates to learn the
fundamentals required for the program.
The admissions are conducted on a rolling basis and the admission process is closed
once the requisite number of candidates has been enrolled into the program.
Selection Process
15
For more information on flexible payment options, please reach out to your program advisor.
Program
Partners
Great Learning is a leading global ed-tech company for professional and higher
education. It offers comprehensive, industry-relevant programs across various
cutting-edge Technology, Data, and Business domains. Great Learning's programs are
developed in collaboration with the world's foremost academic institutions. They are
constantly reimagined and revamped to address the dynamic needs of the industry.
Great Learning is the only ed-tech company to provide these programs in a blended
mode, classroom mode, and purely online mode, relying on its vast network of expert
mentors and highly qualified faculty to deliver an unmatched learning experience for
learners in India and the world over. Great Learning is on a mission to enable
transformative learning and career success in the digital economy for professionals and
students across the globe and till date, we have impacted over 9.2 million learners from
over 170 countries.
16
Ready to become a
cybersecurity expert?
APPLY NOW