Main Languages, Tools, and Standards/Frameworks that you will learn to become top cybersecurity professional.

Key Program Highlights

Request a Call Back

Batch Starts:

Batch 1 - 25th June 2019


11 Months

Preparatory Session:

15 days to prepare yourself prior to start of program


7-10 Hours per week



Post Graduate Diploma in Cyber Security (PGD-CS) awarded by Amity University


Rs. 135000/- (All-Inclusive)

Options- One Time Payment, Cardless EMI Payment


Online + Optional Campus Sessions


  • 1-1 Mentoring
  • Industry-driven comprehensive curriculum
  • 24/7 access to study material & video lectures
  • Live interactions with Cyber security experts and Corporate leaders
  • Real-world Projects & Case Studies
  • Capstone Cyber Security Project
  • Career guidance and support
  • Get Alumni Status from Amity University

About Program

    • Asia’s No. 1 online education platform
    • Ruling in the area of online education for more than two decades
    • Only internationally accredited online university with over 200,000 international students across 135 countries
    • Most preferred online degree by employers and recruiters across the globe
  • Industry Insights
    The world needs more experts with computer security degrees.
    • According to IBM – 3 Million cybersecurity professionals are required in the country but the supply is not even 100,000 now.
    • Cisco reported that currently more than 1,000,000 available Cyber Security jobs in the U.S. alone and 6,000,000 globally.
    • The cybersecurity market is expected to grow from $75 billion in 2015 to $170 billion by 2020 according to Forbes
  • Cybercrime is the greatest threat to every company in the world.
    • 76% of Indian Businesses hit by Cyber Attack according to Sophos EDR Survey
    • Nearly 75% of security professionals say they do not have enough staff to defend their organizations against current threats, according to a survey from the Black Hat USA computer conference.
    • 82% of organizations expect a cyberattack, yet 35% are unable to fill open security jobs.
  • Program Overview
    Amity University’s Post Graduate Diploma in Cyber Security (PGD - CS) has been designed to build cyber security experts around the globe.
    How will PGD - CS help you?
    • People often say that if you want to make your house theft-proof, hire the best thief in town, Similarly, to be able to secure a system thoroughly, it is very important to think like a hacker or a black hat (there is even a stellar tech hacking movie called “Blackhat”).
    • Amity’s PGD -CS prepares you to see from a real world hacker perspective and understand different stages of an exploit to adopt adequate detective and preventive cyber security controls.
    • Learn how to align cyber security objectives with Corporate Business Strategies.
    • Develop overall understanding of organization’s information assets, incorporating detective controls such as Security Event and Incident Management, Incident Response Management.
    • Learn compliance management with the organization, develop a business acumen to present risk and mitigation plans aligned to business strategies.
    • Work on a capstone projects to develop cyber skills in a real time environment, work as a team to solve cyber problems.

Program Structure & Format

Candidates can complete the 11-months course of study through:
  • Unlimited access to recorded video lectures and reading material from faculties with real-world expertise
  • Regular on-campus contact sessions with industry mentors and leading cybersecurity professionals to solve queries or doubts
  • Online coursework that includes case studies, mini-projects and assignments
  • Capstone Cybersecurity Project to work on practical real world case
  • Instructor-led practice sessions to learn popular tools and languages covered in the program
Our Campuses for Contact Classes
  • Amity Bangalore, Kormangala

  • Amity Chennai, Gopalapuram

  • Amity Hyderabad, Punjagutta

  • Amity Mumbai, Malad & Kurla

  • Amity Pune, Senapati Bapat Road

  • Amity Noida, Sector 125

  • Amity Dubai, UAE

  • Amity Singapore, 3 Kay Siang Road

If the contact classes are not available in your city, don’t worry. You will be provided access to the recorded lectures of contact sessions of another nearby city.

Eligibility & Selection

    • Bachelor’s or Master’s degree in any discipline with a minimum of 50% aggregate marks is compulsory.
      Minimum of one year of full-time work experience in IT after graduation or post-graduation is preferred.
    • For meritorious fresher students / Young Professionals (CGPA > 6/10) is preferred.
    • Candidates from IT and Engineering background will be preferred.


Our team of world-class faculties have years of experience as professional trainers and have worked closely with security adopters across various sectors. Their industry exposure will help you to understand the everyday nitty-gritty to be a successful cyber security professional.

Jaizal Ali

  • Founder and CEO | RedTeam Cybersecurity Labs
  • 5+ years of experience
  • BCA, MS in Cyber Forensics & Information Security
  • EC Council - CASE, CHFI, CEI, CEH

Deepika Mahankali

  • Btech (CS), CCNA, CCNP, CCIE
  • Network security advocate - Cisco Systems
  • MBA (Asia school of Business, MIT Sloan), Stanford Ignite
  • 5+ years of experience

Srinivas Mahankali

  • Head Blockchain Centre of Excellence, ULTS
  • B.Tech, IIT Madras, PGP - IIM’B
  • 27+ Years of Experience in Technology Leadership
  • Ex- CIO - Logistics Arm, Apollo Tyres Group

Deep Shankar Yadav

  • 5+ years of experience
  • Manager - Incident response|Pyramid cybersecurity

Mishal KV

  • Associate trainer | RedTeam Cybersecurity Labs
  • 4+ years of experience
  • BCA, MSc in Cyber Forensics
  • EC Council- CEHv10, CEI, CASE Java, CASE.Net

Hemanth Kumar Mahadeva

  • Cyber Security Consultant | RedTeam Cybersecurity Labs
  • 11+ years of experience
  • C-DAC certified cyber security professional

Course Curriculum 11 Months | 9 Modules

  • Module I – Cyber Security Building blocks
    • Introduction to Cyber Security
      1. Understanding Cyberspace
      2. Defining Cyber security
      3. Importance of Cyber Security and Case studies
    • Threats and Vulnerabilities
      1. Types of Hackers
      2. Malicious Codes – Virus, Trojans, Worms, Spywares, and Advanced Persistent Threats (APT)
    • Cyber Security Breaches – Phishing, Vishing, Identity Theft, Cyberstalking, Water-Hole and Whaling Attacks.
    • Penetration Testing and Methodologies
    • Frameworks and Standards for Cyber Security – Introduction to ISO 27001 and NIST800
    • Cyber security practices – Governance, Operations and Assurance
    • Introduction to Cyber Security Risk Management, Roles and Responsibilities.
  • Module II – IT Infrastructure Technologies
    • Physical and Software elements of computer systems
    • Operating Systems – Windows and *NIX
    • System Administration
    • Windows – Servers, Active Directory, Exchange and Desktops
    • Authentication and Authorization
    • Basics of Linux Administration
    • Shell Commands
    • Introduction to Networks and Type of Networks
    • Understanding the OSI Layers
    • Networking Protocols – TCP / IP
    • Understanding IP addresses and Subnet Classes
    • Networking Infrastructure – Hubs, Switches, and Routers, Firewalls, Intrusion Prevention Systems and Proxies.
  • Module III – Scripting for Hackers.
    • Why Scripting ?
    • PowerShell Scripting
    • Linux shell Scripting
    • Python Scripting
  • Module IV – Enterprise Security
    • Introduction Sherwood Applied Business Security Architecture (SABSA)
    • The Confidentiality, Integrity and Availability (CIA) Triage
    • Governance – Security Organization and Policies
    • Physical Security
    • Access controls, Authentication and Authorization
    • Principles of Least Privilege
    • Implementing of Defense in Depth
    • Network Security Management – LAN, Corporate & Guest Wifi, DMZ and Perimeter Security
    • Network Access Controls
    • Endpoint Security
    • Patch Management
    • Security Baselining and Hardening
    • Vulnerability and Compliance Management
    • Cryptographic controls
    • Data Leak Prevention
    • The Human Factor
  • Module V – Cyber kill chain
    • Reconnaissance – Information harvesting and intelligence
    • Weaponization tactics
    • Exploiting – payload delivery and exploit
    • Gaining Foothold – installation and persistence
    • Remote C&C – Command and Control
    • Cover tracks and forensic evidences
  • Module VI – Blue Teaming & Cyber SOC
    • Introduction to SIEM
    • SIEM Architecture and Deployment
    • Logs , Events Collection and Event Correlation
    • Developing use cases and associated correlation rules
    • Detection and Prevention
    • Incident Management
    • Installing Alien vault SIEM
    • Using Web Interface
    • Configuring Sensor, Logger and Server
    • Creating reports and Visualization
    • Red & Blue teaming engagements
  • Module VII – Blockchain, Artificial Intelligence and Machine Learning for Cyber Security
    • Introduction to Artificial Intelligence – Machine learning, Deep Learning and Robotics
    • Strategic approach to adoption of AI in Cyber Security
    • Building business case for AI implementations in Cyber security
    • Salient features of Blockchain
    • Blockchain as a tool for cyber security
    • Blockchain for IoT security
    • Various attacks on Blockchain platforms
    • Security considerations for Blockchain platforms and systems.
  • Module VIII – Regulatory Compliances in Cybersecurity
    • Defining compliance and compliance management
    • Developing compliance baselines for systems
    • Regulatory compliance
    • Introduction to commercial and non-commercial compliance scanners
    • Compliance Scanning .
  • Module IX – Business and Cybersecurity
    • Aligning cyber security with business strategies
    • Aligning roles and responsibilities for cyber security
    • Threat Intelligence
    • Conducting business impact analysis for cyber threats
    • Developing reports and presentations for non-technical business community
    • Introduction to the roles of Cyber Security Managers and CISOs

Case Studies

Case 1

PopVote: Assessing the Risk of DDoS

Case 2

The Vulnerability Economy: Zero-Days, Cybersecurity, and Public Policy

Case 3

Student Hacking into University's Learning Management System to Save His Grades: A Cautionary Tale

Case 4

Data Breach at Equifax


Case 5

The Phoenix Project: Remediation of a Cybersecurity Crisis at the University of Virginia

Case 6

Presentation Report on Recent Cyber Breaches

Case 7

Conduct Risk Assessment w.r.t ISO 27001

Case 8

Conduct VAPT technical report to Management report

download detailed syllabus

You will receive the download link in your email.

Application Process

  • 1. Fill up the Application Form

  • 2. Screening call from Admission Director's Office basis on Profile

  • 3. Final Application to be shared with Admission Committee for final selection

Program Fees

135000 /- (All-Inclusive)

  • One Time Payment

    Rs. 135000/-

    • No Interest EMI Option
    • Faster payment with Credit Card, Debit Card, Net Banking
  • Cardless EMI Payment


    • Pay Hassle free Zero percent EMI in 12 months.
    • No Credit Card required

Learning Outcomes

By the end of the PGD - CS program, you will be able to:
  • Understand terminologies and tactics commonly heard in cyberworld.
  • Understand various components of IT systems and networks and how do they interoperate to form the cyberspace.
  • Write comprehensive programs in scripting technologies like Powershell, Linux, and Python.
  • Master Enterprise level security strategies, governance structures and associated technology components. Discover, Analyze, and Deal with threats to an organization.
  • Understand different stages of an exploit to adopt adequate detective and preventive cyber security controls.
  • Install and configure Alienvault SIEM.
  • Recognize common threat behaviors and attack vectors, hunt threat across enterprise network.
  • Collect forensics data and Investigate a cyber attack.
  • Network monitoring and provide real - time security solutions.
  • Use incident response best practices.
  • Apply Blockchain in IoT security
  • Define Information Security Management Framework, and manage compliance with an organization.
  • Conduct penetration testing, developing reports outlining vulnerabilities and risk mitigation strategies.

Hands-on Training:
  • Architecturing Enterprise Network using Cisco PPDIOO Lifecycle Approach
  • Write Comprehensive program in each scripting language
  • Check compliance of security controls w.r.t International Standards/ Frameworks(ISO 27001)
  • Capture the Flag session 
  • Installing and Configuring Alienvault SIEM
  • Writing Python code using Blockchain and ML libraries
  • Capstone project work in teams to attack and defend


Earn a Certificate of Post Graduate Diploma in Cyber Security (PGD - CS) from Amity University

Add the internationally accredited certificate to your CV and improve your job / business prospects


  • Online Quiz
    • Be responsible for your own learning with optional online quizzes at the end of each module
    • Test your subject understanding and determine your readiness for program completion
  • Assignments
    • Uncover opportunities to think and learn about ideas and topics and ask questions
    • Submit assignments at the end of each module and test your conceptual knowledge
    • Assess your progress with grade/score of each assignment that contributes to the overall grade
  • Case Studies
    • Get hands-on experience with real-life case studies
    • Build a portfolio of demonstrable work by referring to these cases published at Harvard Business Publishing’s case portal
  • Capstone Project
    • Capstone Project carries 40% of weightage in the overall assessment.
    • Get an opportunity to apply tools and techniques learnt in the program against real time environment conducting penetration testing, developing reports outlining vulnerabilities and risk mitigation strategies.
    • Have access to continuous guidance from a Project Mentor to execute the project.
    • Work in a team to attack and defend each other. Submit a detailed report along with a recorded presentation to achieve success in the project.

Career Paths

The common cybersecurity Pathway
But this is not the defined career path you need to follow in the cyber world
  • Some people enter the security field straight out of college with an IT or a security degree, while others transition from other feeder roles.
  • No matter where you start, all cybersecurity careers begin with general IT exposure and learnings. You need to understand how the technology works before you can learn how to secure and protect it.
  • PGD - CS at Amity’s Careers of Tomorrow gives you the real world learning experience with our rigorous curriculum, case studies and a capstone project to help you step forward your learning curve at the workspace.
  • Amity’s Careers of Tomorrow with our Industry experts and career assistance helps you start with the best career path to reach your potential.

Career Assistance

  • Enhance your career aspirations with assistance from our Career partners cutshort, iimjobs and existing Corporate and Alumni network
  • On successful completion of the program, equip yourself with sophisticated expertise to apply for jobs in Cyber security space in the roles of Security Architect, Network Security Engineer, Cyber Security Analyst, Security Architect, and Cyber Security Engineer.

Frequently Asked Questions

Request a Call Back from our Admission Counsellors to know more