Executive Programme in Artificial Intelligence and Cyber Security for Organizations [EPAI&CSO]
IIM Indore
1st Session: 5.30 pm to 6.45 pm
2nd Session: 7.00 pm to 8.15 pm
Programme Overview
This programme is designed for non-technical professionals, engineers, IT project managers, and early-career IT professionals seeking to understand and mitigate cyber threats. It equips participants with essential skills in artificial intelligence, digital transformation, and cybersecurity, making it ideal for career switchers and professionals aiming to advance in this field.
The curriculum covers AI fundamentals, machine learning, big data analytics, data visualization (Power BI, Tableau), generative AI, and emerging technologies like blockchain and quantum computing. It also delves into cybersecurity, risk management, threat mitigation, incident response, digital forensics, and compliance with global regulations.
With a strong focus on leadership and communication, this programme empowers professionals to navigate AI-driven innovations and the evolving cybersecurity landscape for career growth.
Programme Highlights
Executive Execution Alumni Status- IIM Indore
Certificate of Completion from IIM Indore
Designed for Working Executives
Holistic Curriculum
Interactive Online Learning
Curriculum taught by Best of the Domain Experts
Admission Criteria
Eligibility & Selection
- Diploma (10+2+3)/Graduate/Post Graduate from Universities recognised by the Association of Indian Universities with minimum 50% marks in either diploma, graduation, or post-graduation (or its equivalent) with at least two years of work experience.
*Internships and Trainee experiences are not considered full-time work experience.
Who should attend?
Syllabus Breakdown
- Introduction to Cybersecurity: Issues and Challenges
- Introduction to Defensive and offensive Cybersecurity Landscape
- Security in the inter-connected world: Cloud, Mobile, IoT
- Incident Response and Digital Forensics
- Ethical Hacking
- Identify and Access Management (IAM) Concepts, IAM Layers and Technology
- Data Privacy, and Data Protection
- Overview of Cyber Crime
- Information Risk Management
- Information Security: Strategy and Policy
- Information Security Governance
- Designing Cyber Security Framework for an Organization
- Cyber Security Audit in Organizations
- Overview of Prevailing Cyber Law
- Capstone Project: Student Boardroom Role Play to prepare Cyber security roadmap for an organisation
- Why is Cyber Security Important?
- Common Cyber Threats
- Creating Defensive Landscape
- Creating Offensive Landscape
- Protecting Against Cyber Threats
- Security of Cloud and Hybrid Infrastructure
- Security of Mobile and IoT Infrastructure
- Implementing Security Measures
- Educating Users
- Incident Response
- Developing Incident Response Plans
- Roles and Responsibilities
- Communication Protocols
- Containment Procedures
- Forensic Analysis
- Overview of Ethical Hacking
- Reconnaissance and Scanning
- Types of Reconnaissance
- Tools for Reconnaissance and Scanning
- Risks and Mitigation Strategies
- System and Web Application Hacking
- System Hacking
- Web Application Hacking
- Wireless Network Hacking and Social Engineering
- Practical Exercises
- Overview of IAM
- What is Access Control?
- Key Principles of IAM
- Types of Access Controls
- Importance of IAM in Security
- IAM Best Practices
- Network Security
- Threats to Network Security
- Technologies Used in Network Security
- Introduction to Data Privacy and Protection
- Why is Data Privacy Important?
- How does Data Privacy Affect Businesses?
- Best Practices for Data Privacy and Protection
- Legal Frameworks and Compliance
- Introduction to Cybercrime
- Definition of Cybercrime
- History of Cybercrime
- Current Trends in Cybercrime
- Types of Cybercrime
- Preventing Cybercrime
- Responding to Cybercrime
- Back Up Your Data
- Principles of Data Security
- Principles of Risk Management
- Risk Identification
- Risk Assessment
- Risk Mitigation
- Risk Monitoring
- Best Practices for Data Security and Risk Management
- Information Security Strategy formulation
- IS Policy development
- Best Practices for Cyber Security
Information Security Governance
Designing Cyber Security Framework for an Organization
- Introduction to Artificial Intelligence and Digital Transformation
- Machine Learning and AI
- Big Data and Analytics
- Data Visualization
- Generative AI including Prompt Engineering
- Emerging Technologies like Blockchain and Quantum Computing
- Introduction to Cyber Security: Issues and Challenges
- Introduction to Defensive and Offensive Cyber Security Landscape
- Security in the inter-connected world: Cloud, Mobile, IoT
- Incident Response and Digital Forensics
- Ethical Hacking
- Identity and Access Management (IAM) Concepts, IAM
- Layers and Technology
- Data Privacy, and Data Protection
- Overview of Cyber Crime
- Information Security: Strategy and Policy
- Designing Cyber Security Framework for an Organization
- Overview of Prevailing Cyber Law
Interactive Lectures
Project work
Case discussions
Term papers and Assignments
About IIM Indore
39th
FT Executive Education Rankings Business Standard 2022
1st
NIRF – Management Category 2022
Know the Facilitator
Hear from the Facilitator
Programme Certification
Note: The sample certificate is indicative. The Institute reserves the right to revise it.
Programme Fee Details
Note: *All the amounts mentioned above are exclusive of GST.
Career Transitions
It seems we can't find what you're looking for.
The Jaro Advantage
- Unparalleled career guidance and support
- Dedicated student support
- Immersive and lifelong learning experiences
- Learn from the best-suited academic, faculty, and industry mentors
- Be a part of discussions and forums for enhanced learning
- Leverage peer-to-peer learning experience
- Alumni Network of 3,50,000+ Professionals
- Access to alumni events & other benefits
- Stay up to date with the latest insights from your alma mater
Build 21st-Century Skill set to Gain Career Edge in the VUCA World
You’ll learn
- Understand cybersecurity threats, technologies, and best practices.
- Apply risk management and security measures like firewalls and encryption.
- Investigate cyber incidents and comply with regulations.
- Communicate with stakeholders and lead security teams.
- Gain hands-on experience and industry networking for career growth.
- Learn key AI concepts, including machine learning and neural networks.
- Apply AI algorithms to real-world problems.
- Develop skills in Python, big data, and model optimization.
- Explore ethical AI considerations and emerging trends.
- Engage in hands-on projects and interdisciplinary teamwork.
- Performance of participants will be monitored on a continuous evaluation basis through quizzes, assignments, tests and examinations. The participant is required to score minimum marks/grades as decided by the Institute from time to time to complete the course.
- The approach will combine lectures, case discussions, project work, term papers, and assignments to provide a well-rounded learning experience.
- This multi-disciplinary course is designed to equip non-engineers/non-tech graduates, managers, Engineers, and Cybersecurity Career aspirants: Early-career IT professionals, IT project managers and engineers wanting to gain the ability to think critically about the threat landscape, including vulnerabilities in cyber security for career advancement.
- Managers who lead technology functions.
- Participants are expected to attend all sessions of a given course. However, Participants may take leave on account of emergencies, subject to the approval of the Programme Coordinator. However, a 75% minimum attendance requirement would be considered for the final grading. For less than 75% attendance, a grade cut as per the norms will be applied.