Cyber security has become one of the most critical skill areas in today’s digitally connected world. As organizations increasingly rely on cloud platforms, digital payments, data-driven systems, and interconnected devices, protecting information from cyber threats has become essential. This course is designed to build a strong foundation in modern cyber security concepts, tools, and practices.
The course covers essential areas such as Enterprise & Endpoint Security Network Security, Cryptography, Ethical Hacking, Cloud security, Malware Analysis, Security Operations, and Cyber Laws. Through labs, case studies, and practical simulations, learners gain the skills needed to safeguard systems, manage risks, and protect critical digital assets.
DAY – 1 Cybersecurity – Enterprise & Endpoint Security
Session 1
Topic: Importance of Cybersecurity & Defense in Depth
- Content: Risk, Threat, Controls & Vulnerabilities, Layered security architecture, Endpoint hardening, Network segmentation, CIA Triad, etc.
- Learning Outcome: Ability to design multi-layered enterprise defense strategies
Session 2
Topic: Endpoint Detection & Response (EDR)
- Content: EPP vs EDR, Sentinel One EDR, Malware detection, Response workflows
- Learning Outcome: Skills to deploy and operate EDR solutions
Session 3
Topic: Information & Data Protection
- Content: PKI, Cryptography, Data Governance, DLP, Data Privacy Laws i.e. DPDP, GDPR, CCPA, etc.
- Learning Outcome: Ability to understand & protect data/information.
DAY – 2 Cybersecurity – Network & Application Security
Session 1
Topic: Secure SDLC & DevSecOps
- Content: Security in CI/CD, code scanning, container security
- Learning Outcome: Ability to integrate security into application development pipelines
Session 2
Topic: Vulnerability Management & Patching
- Content: Automated patching, vulnerability scanning tools
- Learning Outcome: Skills to manage vulnerabilities across enterprise systems
Session 3
Topic: IAM, Risk & Compliance Frameworks
- Content: Least Privilege, ABAC, SOD, MFA, SSO, JIT, PIM/PAM, NIST CSF, ISO 27001, PCI-DSS
- Learning Outcome: Understanding identity security, enterprise risk management and compliance alignment
Session 4
Topic: Network Security & Containment
- Content: Segmentation, DMZ, Zero Trust Architecture, Layered Security – Defence in Depth
- Learning Outcome: Understanding network security & perimeter defence
Speaker Profile: Sujay Pathakji – CCSP, AWS- CSOA, CISSP, ISO 27001 LA, ITIL V3 IT Security, Cyber Security, Trainer in Security
Seasoned, technically inclined and highly empowered IT professional with strong emphasis on understanding business vision, requirements, effective communication and team building to deliver robust IT solutions and services. Ardent Cloud Architect with expertise in AWS cloud Migration for key Business software and multi cloud Management.
Redefining IT Operations, Business Process Re-engineering, Data centre design and implementation, IT infrastructure and Security Management Innate strengths in bringing clarity & results with conviction. Industry Agnostic, Technology Agnostic and Cross-Functional spanning domains across industry sectors.
Consistently delivering ROI & operational growth while leveraging skills in operational transformation and ensuring growth in the organisation’s strategic decision.
An ambassador of change, a keen strategist with expertise in providing effective business solutions and technical architecture to leverage technology in creating revenue opportunities; adept in analysing information system needs, evaluating user requirements, custom designing solutions, and troubleshooting critical issues in the process.
A specialist in IT Governance and Compliance. Data protection, Cyber Security, Compliance Audits.
Who should attend:
IT Professionals, Network Administrator, CISO, CTO, CISA, ISO, CIO, IT Manager, IT administrators





