Executive Programme in Artificial Intelligence and Cyber Security for Organizations [EPAI&CSO]
IIM Indore
1st Session: 5.30 pm to 6.45 pm
2nd Session: 7.00 pm to 8.15 pm
Programme Overview
The Executive Programme in Artificial Intelligence and Cyber Security for Organizations is a comprehensive training initiative tailored for non-technical professionals, engineers, IT project managers, and early-career IT professionals seeking to understand and combat the evolving cyber threats faced by organizations today. Through a multi-disciplinary approach, participants gain insights into artificial intelligence, digital transformation, machine learning, big data analytics, and cybersecurity fundamentals. The programme equips participants with practical skills in risk management, incident response, compliance, and leadership, fostering critical thinking and empowering career advancement in the dynamic field of cybersecurity. Engage in case studies to hone critical thinking skills and network with industry peers and experts. The programme empowers participants to navigate the intricate intersections of artificial intelligence and cybersecurity, cultivating a deep understanding of how these technologies can be leveraged to bolster organizational defenses against evolving cyber threats while driving innovation and resilience in today’s digital landscape.
Programme Objectives
- Develop participants’ ability to critically evaluate AI techniques and solutions, considering factors such as performance, scalability, and ethical implications.
- Integrate knowledge from computer science, mathematics, and cognitive science for a comprehensive AI understanding.
- Cultivate awareness of ethical and societal impacts of AI development and deployment.
- Provide a multi-disciplinary approach to cyber security, fostering critical thinking on threats and vulnerabilities.
- Deepen understanding of network and system security technologies, such as firewalls and encryption.
- Proficiently respond to and investigate cyber incidents, including digital evidence collection and analysis.
- Understand legal frameworks and regulations governing cyber security for organizational compliance.
- Enable the application of learned concepts to real-world scenarios through hands-on exercises.
Programme Highlights
Executive Execution Alumni Status- IIM Indore
Certificate of Completion from IIM Indore
3 days On-campus Module
Holistic Curriculum
Interactive Online Learning
Admission Criteria
Eligibility & Selection
- Diploma (10+2+3)/Graduate/Post Graduate from Universities recognised by the Association of Indian Universities with minimum 50% marks in either diploma, graduation, or post-graduation (or its equivalent) with at least two years of work experience.
*Internships and Trainee experiences are not considered full-time work experience.
Who should attend?
Syllabus Breakdown
- Introduction to Cybersecurity: Issues and Challenges
- Introduction to Defensive and offensive Cybersecurity Landscape
- Security in the inter-connected world: Cloud, Mobile, IoT
- Incident Response and Digital Forensics
- Ethical Hacking
- Identify and Access Management (IAM) Concepts, IAM Layers and Technology
- Data Privacy, and Data Protection
- Overview of Cyber Crime
- Information Risk Management
- Information Security: Strategy and Policy
- Information Security Governance
- Designing Cyber Security Framework for an Organization
- Cyber Security Audit in Organizations
- Overview of Prevailing Cyber Law
- Capstone Project: Student Boardroom Role Play to prepare Cyber security roadmap for an organisation
- Why is Cyber Security Important?
- Common Cyber Threats
- Creating Defensive Landscape
- Creating Offensive Landscape
- Protecting Against Cyber Threats
- Security of Cloud and Hybrid Infrastructure
- Security of Mobile and IoT Infrastructure
- Implementing Security Measures
- Educating Users
- Incident Response
- Developing Incident Response Plans
- Roles and Responsibilities
- Communication Protocols
- Containment Procedures
- Forensic Analysis
- Overview of Ethical Hacking
- Reconnaissance and Scanning
- Types of Reconnaissance
- Tools for Reconnaissance and Scanning
- Risks and Mitigation Strategies
- System and Web Application Hacking
- System Hacking
- Web Application Hacking
- Wireless Network Hacking and Social Engineering
- Practical Exercises
- Overview of IAM
- What is Access Control?
- Key Principles of IAM
- Types of Access Controls
- Importance of IAM in Security
- IAM Best Practices
- Network Security
- Threats to Network Security
- Technologies Used in Network Security
- Introduction to Data Privacy and Protection
- Why is Data Privacy Important?
- How does Data Privacy Affect Businesses?
- Best Practices for Data Privacy and Protection
- Legal Frameworks and Compliance
- Introduction to Cybercrime
- Definition of Cybercrime
- History of Cybercrime
- Current Trends in Cybercrime
- Types of Cybercrime
- Preventing Cybercrime
- Responding to Cybercrime
- Back Up Your Data
- Principles of Data Security
- Principles of Risk Management
- Risk Identification
- Risk Assessment
- Risk Mitigation
- Risk Monitoring
- Best Practices for Data Security and Risk Management
- Information Security Strategy formulation
- IS Policy development
- Best Practices for Cyber Security
Information Security Governance
Designing Cyber Security Framework for an Organization
- Introduction to Artificial Intelligence and Digital Transformation
- Machine Learning and AI
- Big Data and Analytics
- Data Visualization
- Adaptation Issues in Organization
- Introduction to Cyber Security: Issues and Challenges
- Introduction to Defensive and Offensive Cyber Security Landscape
- Security in the inter-connected world: Cloud, Mobile, IoT
- Incident Response and Digital Forensics
- Ethical Hacking
- Identity and Access Management (IAM) Concepts, IAM
- Layers and Technology
- Data Privacy, and Data Protection
- Overview of Cyber Crime
- Information Risk Management
- Information Security: Strategy and Policy
- Information Security Governance
- Designing Cyber Security Framework for an Organization
- Cyber Security Audit in Organizations
- Overview of Prevailing Cyber Law
Interactive Lectures
Project work
Case discussions
Term papers and Assignments
About IIM Indore
39th
FT Executive Education Rankings Business Standard 2022
1st
NIRF – Management Category 2022
Know the Facilitator
Hear from the Facilitator
Programme Certification
Note: The sample certificate is indicative. The Institute reserves the right to revise it.
Programme Fee Details
Note: *All the amounts mentioned above are exclusive of GST.
Career Transitions
It seems we can't find what you're looking for.
The Jaro Advantage
- Unparalleled career guidance and support
- Dedicated student support
- Immersive and lifelong learning experiences
- Learn from the best-suited academic, faculty, and industry mentors
- Be a part of discussions and forums for enhanced learning
- Leverage peer-to-peer learning experience
- Alumni Network of 3,50,000+ Professionals
- Access to alumni events & other benefits
- Stay up to date with the latest insights from your alma mater
Build 21st-Century Skill set to Gain Career Edge in the VUCA World
You’ll learn
- Understand the basics of Artificial Intelligence and its role in organizational Digital Transformation.
- Apply diverse AI algorithms for solving real-world challenges like classification and regression.
- Gain foundational knowledge of cyber threats and the cybersecurity landscape.
- Apply risk management methodologies to identify, assess, and mitigate cyber security risks.
- Deepen understanding of network and system security technologies, including firewalls and intrusion detection systems.
- Performance of participants will be monitored on a continuous evaluation basis through quizzes, assignments, tests and examinations. The participant is required to score minimum marks/grades as decided by the Institute from time to time to complete the course.
- The approach will combine lectures, case discussions, project work, term papers, and assignments to provide a well-rounded learning experience.
- This multi-disciplinary course is designed to equip non-engineers/non-tech graduates, managers, Engineers, and Cybersecurity Career aspirants: Early-career IT professionals, IT project managers and engineers wanting to gain the ability to think critically about the threat landscape, including vulnerabilities in cyber security for career advancement.
- Managers who lead technology functions.
- Participants are expected to attend all sessions of a given course. However, Participants may take leave on account of emergencies, subject to the approval of the Programme Coordinator. However, a 75% minimum attendance requirement would be considered for the final grading. For less than 75% attendance, a grade cut as per the norms will be applied.