Executive Programme in Artificial Intelligence and Cyber Security for Organizations [EPAI&CSO]

IIM Indore

Batch
02
Course Duration
10 months
Commencement Date
30th June 2024
Application Closure Date
21st July 2024
Session Timings
Saturday, 5:30 pm to 8:15 pm

Programme Overview

The Executive Programme in Artificial Intelligence and Cyber Security for Organizations is a comprehensive training initiative tailored for non-technical professionals, engineers, IT project managers, and early-career IT professionals seeking to understand and combat the evolving cyber threats faced by organizations today. Through a multi-disciplinary approach, participants gain insights into artificial intelligence, digital transformation, machine learning, big data analytics, and cybersecurity fundamentals. The programme equips participants with practical skills in risk management, incident response, compliance, and leadership, fostering critical thinking and empowering career advancement in the dynamic field of cybersecurity. Engage in case studies to hone critical thinking skills and network with industry peers and experts. The programme empowers participants to navigate the intricate intersections of artificial intelligence and cybersecurity, cultivating a deep understanding of how these technologies can be leveraged to bolster organizational defenses against evolving cyber threats while driving innovation and resilience in today’s digital landscape.

Programme Objectives

  • Develop participants’ ability to critically evaluate AI techniques and solutions, considering factors such as performance, scalability, and ethical implications.
  • Integrate knowledge from computer science, mathematics, and cognitive science for a comprehensive AI understanding.
  • Cultivate awareness of ethical and societal impacts of AI development and deployment.
  • Provide a multi-disciplinary approach to cyber security, fostering critical thinking on threats and vulnerabilities.
  • Deepen understanding of network and system security technologies, such as firewalls and encryption.
  • Proficiently respond to and investigate cyber incidents, including digital evidence collection and analysis.
  • Understand legal frameworks and regulations governing cyber security for organizational compliance.
  • Enable the application of learned concepts to real-world scenarios through hands-on exercises.

Programme Highlights

virtual-classroom

Executive Execution Alumni Status- IIM Indore

certificate

Certificate of Completion from IIM Indore

icon

3 days On-campus Module

online-assessment

Holistic Curriculum

degree-program

Interactive Online Learning

campus

Capstone Project

Admission Criteria

Eligibility & Selection

  • Diploma (10+2+3)/Graduate/Post Graduate from Universities recognised by the Association of Indian Universities with minimum 50% marks in either diploma, graduation, or post-graduation (or its equivalent) with at least two years of work experience.

*Internships and Trainee experiences are not considered full-time work experience.

Who should attend?

Management at the middle and upper levels, as well as senior functionaries in civil society organisations. This programme is primarily for those in Strategy and International Business, as well as those in other senior positions. Furthermore, participants with experience in Legal professionals in organisations, Economists & Research Scholars, C-Suite Professionals, Consulting Professionals, Political Leaders, Government roles, Defense Leaders, and so on are welcome to attend.

Syllabus Breakdown

  • Introduction to Cybersecurity: Issues and Challenges
  • Introduction to Defensive and offensive Cybersecurity Landscape
  • Security in the inter-connected world: Cloud, Mobile, IoT
  • Incident Response and Digital Forensics
  • Ethical Hacking
  • Identify and Access Management (IAM) Concepts, IAM Layers and Technology
  • Data Privacy, and Data Protection
  • Overview of Cyber Crime
  • Information Risk Management
  • Information Security: Strategy and Policy
  • Information Security Governance
  • Designing Cyber Security Framework for an Organization
  • Cyber Security Audit in Organizations
  • Overview of Prevailing Cyber Law
  • Capstone Project: Student Boardroom Role Play to prepare Cyber security roadmap for an organisation
  • Why is Cyber Security Important?
  • Common Cyber Threats
  • Creating Defensive Landscape
  • Creating Offensive Landscape
  • Protecting Against Cyber Threats
  • Security of Cloud and Hybrid Infrastructure
  • Security of Mobile and IoT Infrastructure
  • Implementing Security Measures
  • Educating Users
  • Incident Response
  • Developing Incident Response Plans
  • Roles and Responsibilities
  • Communication Protocols
  • Containment Procedures
  • Forensic Analysis
  • Overview of Ethical Hacking
  • Reconnaissance and Scanning
  • Types of Reconnaissance
  • Tools for Reconnaissance and Scanning
  • Risks and Mitigation Strategies
  • System and Web Application Hacking
  • System Hacking
  • Web Application Hacking
  • Wireless Network Hacking and Social Engineering
  • Practical Exercises
  • Overview of IAM
  • What is Access Control?
  • Key Principles of IAM
  • Types of Access Controls
  • Importance of IAM in Security
  • IAM Best Practices
  • Network Security
  • Threats to Network Security
  • Technologies Used in Network Security
  • Introduction to Data Privacy and Protection
  • Why is Data Privacy Important?
  • How does Data Privacy Affect Businesses?
  • Best Practices for Data Privacy and Protection
  • Legal Frameworks and Compliance
  • Introduction to Cybercrime
  • Definition of Cybercrime
  • History of Cybercrime
  • Current Trends in Cybercrime
  • Types of Cybercrime
  • Preventing Cybercrime
  • Responding to Cybercrime
  • Back Up Your Data
  • Principles of Data Security
  • Principles of Risk Management
  • Risk Identification
  • Risk Assessment
  • Risk Mitigation
  • Risk Monitoring
  • Best Practices for Data Security and Risk Management
  • Information Security Strategy formulation
  • IS Policy development
  • Best Practices for Cyber Security

Information Security Governance

Designing Cyber Security Framework for an Organization