Post Graduate Program in
Cyber Security and Defense

Apply Now

About the Program

Edology’s PGP in Cyber Security and Defense prepares the learners to hone their programming skills and participate in industry-standard cybersecurity training. You will learn to use new technologies, detect new threats, and prevent massive data breaches. In 2021, the global job market in Cybersecurity and Defence is expected to boom with 3.5 million opportunities making this field a futuristic career choice for tech aspirants. Kick-off your journey to becoming the “hot commodity” of the tech world today!

Program Overview

Key Highlights

Earn Badges after completion of each module from Rangeforce

Realistic Network Simulation Reflecting real-world environment cyberattacks

Career Essential programs

Live Q&A with doubt sessions; 2 hours per week

100% Placement Assistance

Automated Attack Bots for Scenario Building

Gamification and cloud-based training with challenges

24/7 Lab and Content access

Detailed Curriculum

Best-in-class content by highly experienced faculty and eminent industry leaders. Live online classes, case-studies, projects, and assignments.

  • SOC Introduction, Linux Syslog, Event Logs: PowerShell Queries & Filters
  • Threat Landscape, Splunk Basics, Splunk Fields & Transforms 
  • Malware Analysis Intro, Yara Overview, Email Header Analysis
  • Email URL Analysis, Wireshark Basics, Email Challenge
  • Intro to RegEx, Recorded Future, Splunk: Visualizations
  • VARA Rule Generaton, VARA Rule Management, Splunk: Alerts
  • Suricata Basics, VARA Rule Writing, Threat Intel Challenge
  • IDS Rules, Suricata Rule Management, Procmon
  • Malware Analysis: VirusTotal, Privilege Escalation Intro, Remote Code Execution Intro
  • Pass the Hash, Linux System Into Gathering, RegEx Basic
  • Capstone Challenge
  • AD Rights Management, PCAP Forensics, IPS Rules
  • PCAP Forensics 2, Visual Spoofing, Basic Shell Scripting
  • PowerShell Basic 1, Investigations with Wireshark, Suricata Challenge
  • PowerShell Basic 2, AD GPO LOKI IOC Scanner
  • Systemd Journal, Splunk API, Identifying Linux10Cs
  • Weak & Reused Credentials, Nikto, Linux Investigation Challenge
  • Firewoll Policies: Fortis0S, Lateral Movement, Greenbone Vulnerability Management
  • PowerShell Logging, Splunk Input Configuration, Botnet Takedown Challenge
  • Windows, NTLM, Process Injection IR CVE-2019-15107 WebMin 1.890 Exploit Unauthorized RCE
  • OpenSCAP, Sudo Killer, TLP Overview
  • Utilize above skills and experience learned to perform
  • scanning, enumeration and exploitation
  • Require setup of virtual machines on student's laptop/ desktop as their own labs for hacking.
    • Perform Open Source Intelligence investigations (User Profiles IDs, Photographs, Emails, Maps, Satellite Images, Social Network, Telephones)
    • Setup Cybersecurity Lab and perform exploitation on vulnerable Operating System/Services
Security tools training using the following technologies

Program Leads
Dr. Akashdeep Bhardwaj
Dr. Akashdeep Bhardwaj
Department of Systemics, UPES
He has 25 years of IT experience in areas of Information Security, IT Infrastructure, and Operations Management working for various multinational organizations. He has published one patent, 46 research papers and seven books/ chapters in highly referred international journals and has taken leading initiatives for academic-industry collaborations: Cybersecurity COE, & MoU with NVIDIA AI, Data Security Council of India, Softlink, CompTIA.
Rupert Collier
Rupert Collier
He has over 20 years of experience in in the IT industry in a variety of roles and specialist areas. He has extensive experience in many areas of technology - primarily in the areas of cyber-security, virtualization, storage and network monitoring. He is also a proven sales leader and performer, through both direct and indirect channels. Collier also has extensive experience in building IT brands, solution-selling, channel & product management, and team leadership.
Archie Jackson
Archie Jackson
Sr. Director, Head & IT & Security
Cyber Security Evangelist & Mentor
He has 20 Years of insightful experience in IT Infrastructure design, IT implementation, IT operations, IT Service Management with specialization in Cyber Security with strong leadership and digital transformation skills. He is recognised as Top 20 Cyber Security Influencers by CISO Platform and multiple awards like CIO 100 honouree by IDG, CIO APAC award by IDC and more.

Skills you will learn

Security operation, Detection/investigations, Threat hunting and intelligence, Scanning, Alert evaluation and validation, Incident handling, Security tools usage, Common attack TTPs, Enumeration, Reconnaissance, Malware analysis, OSINT


Career Prospects

Cyber security defender, Cyber security architect, Threat intelligence analyst, Vulnerability analyst, Cyber security analyst, Information security analyst or administrator, Security administrator, Cyber Security Manager, Cyber Security Engineer


Who Is This Program For?

Computer Science Graduate or equivalent from any recognized University globally. Working IT professionals with 3- 5 years of experience and hands on exposure to Windows & Linux Servers, Networking and IT Support


Minimum Eligibility

Bachelor’s Degree with minimum 50% or equivalent passing marks. No coding experience required.

Post Graduate Program in Cyber Security and Defense

On the successful completion of the course, you’ll get a Post Graduate Program Certification from Rangeforce

  • Awarded Cybersecurity Training Market Leader by Cyber Defense Global InfoSec Awards for 2021.
  • 2020 Security Training Program of the Year in Computing Security Excellence Awards.
  • CREST- accredited training provider
Diploma in Cyber Security and Defense (5 months)
  • Earn badges after completing each module.
  • Build cyber resilience through hands-on training in entirely emulated, realistic environments
  • 100% placement assistance
Live Online
INR 90,000 + GST
No cost EMI options available
Apply Now
Post Graduate Program in Cyber Security and Defense (11 months)
  • Earn badges after completing each module.
  • Build cyber resilience through hands-on training in entirely emulated, realistic environments
  • 100% placement assistance
Live Online
INR 1,80,000 + GST
No cost EMI options available
Apply Now

Over 2000 Careers Transformed


Average Salary Hike


Career Transitions

27 LPA

Highest Salary


Hiring Partners

Career Support

Get Industry ready with Dedicated our Career Support

Career Couselling
Resume Feedback
Interview Preparation
Job Assistance

Refer someone you know and receive Flipkart vouchers worth INR 3,000!*

*Referral offer is valid only on the Post Graduate Program in Data Science.

Start Referring

Frequently asked questions

Why should I study PGP in Cybersecurity & Defense with Edology?

Cybersecurity and defense studies are more popular than ever. The rapid rise of digital age has increased the fear of hackers and cyberterrorists who have endless opportunities to exploit individuals, government institutions, and global larger organizations. To defend against cyber-attacks and security breaches, the demand for cyber security experts, who can protect their data and remove vulnerabilities, has also increased. Besides, the pay scale offered in this sector is driving the learners to choose this sector as their career options. This domain offers one of the highest-paid job roles in the country. The PG program in Cybersecurity & Defense with Edology is one of the most sought-after programs in this domain.

What are the minimum eligibility criteria for the program?

Working professionals or freshers graduated with 50% aggregate marks in their graduation.

The work experience is relaxed basis on application and profile. Basic knowledge of computer programming will be an added advantage.

What is the time commitment for the program?

A time commitment of 4 to 6 hours per week on an average is recommended to complete the program successfully.

Will I receive career assistance and support after the program completion?

Mentoring on how to make the best resume for a cybersecurity and defense professional, highlighting technical and domain expertise. Cybersecurity interview preparation and mentoring by industry experts and provide job assistance at the end of the program.

Do I get to interact with Industry Experts during the program?

Yes, there will be live online interactive sessions with faculty and industry experts.

Is there any financial support provided for the program?

To ensure no barrier in the path of your learning, we offer financing options with our partner company Financepeer to help you make this Cybersecurity and Defense program more financially manageable.

What certification will I get after the course?

Upon successful completion of the program, you will be awarded with industry-recognized Postgraduate Certification in Cybersecurity and Defense by the following institutions – Edology and RangeForce.

What are the job prospects after completing the program?

As per latest BLS prediction, cybersecurity jobs will grow almost 31% through 2029, almost seven times faster than the national average job growth of 4%. With the worldwide shift to remote work and online learning due to the global pandemic; and an increase in concerns around election security, cybersecurity and defense is an increasingly critical topic. Starting from healthcare to education, government to top private organizations – the demand for skilled cyber professionals are increasing rapidly.