PGDCS (Post Graduate Diploma in Information Security Management)
Course Description Embark on a cutting-edge journey in cybersecurity with our Online Postgraduate Diploma in Information Security Managementāa 12-month program meticulously crafted to equip professionals with strategic leadership skills in the realm of cybersecurity. Delivered entirely online, this program blends theoretical knowledge with practical insights, guided by industry-leading instructors, to prepare you for the challenges of securing digital landscapes in todayās rapidly evolving technological landscape. Next Cohort to start on 13th July 2026 Admission Requirements: Technical Proficiency -Demonstrated proficiency in fundamental IT concepts and technologies. Professional Experience -A minimum of two years of experience in information technology, cybersecurity, or a related field. Educational Background -A Bachelorās degree in a relevant field from a recognized institution. -Any two industry recognized certificates like CISSP, CISM, CISA, ISO27001 etc Tuition Fees: A fee of $259 is payable at the time of application. This application fee is refundable if you are not selected for the cohort Course Fees First installment payable within 2 weeks after issue of the acceptance letterDocument Verification Fees: $ 375Course Fees: $ 4000Capstone Project Expenses: $ 200Convocation Cost: $ 350 Total Estimated Tuition Cost: $4925 Application Process Apply and pay the application fees. Submit a completed online application form. Provide a detailed resume showcasing academic and professional achievements. Submit a statement of purpose outlining career goals and how the program aligns with those aspirations. Participate in a virtual interview to assess suitability for the program. Important Dates Application Closure Date: 9th June 2026 Interview Period: Until 23rdĀ June 2026 Acceptance Letters Sent By: 29th June 2026 Fee Payment (First Instalment): Before 10th July 2026 Course Commencement Date: 13th July 2026 Course Modules: Information Security Governance and Strategy Risk Management and Compliance Security Architecture and Design Security Operations and Incident Management Key Security Tooling & KPIs Capstone Project – Information Security Management ISG 101 – Understanding the concept of Information security governanceISG 102 – Frameworks and standards for Information security governanceISG 103 – Establishing governance structures and processesISD 114 – Aligning ISG with organizational objectives IRM 401 – Introduction to Risk ManagementIRM 407 – Risk Identification and AssessmentIRM 409 – Risk Mitigation and ControlICM 413 – Compliance ManagementICM 425 – Compliance Monitoring and Enforcement SED 300 – Introduction to Security ArchitectureSED 301 – Threat ModelingSED 302 – Security Design PrinciplesSED 303 – Secure Network DesignSED 304 – Cryptography and Security ProtocolsSED 307 – Access Control and AuthenticationSED 309 – Secure Software DevelopmentSED 311 – Security Testing and Evaluation SOM 811 – Roles and responsibilities of security operations teamsSOM 812 – Introduction to industry-standard security frameworksSOM 814 – Threat Detection and AnalysisSOM 815 – Incident Response PlanningSOM 817 – Incident Response ProcessSOM 818 – Digital Forensics FundamentalsSOM 820 – Post-Incident ActivitiesSOM 823 – Continuous Improvement and AdaptationSOM 826 – Security Incident Management Tools SOM 811 – Roles and responsibilities of security operations teamsSOM 812 – Introduction to industry-standard security frameworksSOM 814 – Threat Detection and AnalysisSOM 815 – Incident Response PlanningSOM 817 – Incident Response ProcessSOM 818 – Digital Forensics FundamentalsSOM 820 – Post-Incident ActivitiesSOM 823 – Continuous Improvement and AdaptationSOM 826 – Security Incident Management Tools Apply knowledge gained throughout the program to develop and present a comprehensive cybersecurity management plan, guided by industry mentors Ā ISG 101 – Understanding the concept of Information security governanceISG 102 – Frameworks and standards for Information security governanceISG 103 – Establishing governance structures and processesISD 114 – Aligning ISG with organizational objectives IRM 401 – Introduction to Risk ManagementIRM 407 – Risk Identification and AssessmentIRM 409 – Risk Mitigation and ControlICM 413 – Compliance ManagementICM 425 – Compliance Monitoring and Enforcement SED 300 – Introduction to Security ArchitectureSED 301 – Threat ModelingSED 302 – Security Design PrinciplesSED 303 – Secure Network DesignSED 304 – Cryptography and Security ProtocolsSED 307 – Access Control and AuthenticationSED 309 – Secure Software DevelopmentSED 311 – Security Testing and Evaluation SOM 811 – Roles and responsibilities of security operations teamsSOM 812 – Introduction to industry-standard security frameworksSOM 814 – Threat Detection and AnalysisSOM 815 – Incident Response PlanningSOM 817 – Incident Response ProcessSOM 818 – Digital Forensics FundamentalsSOM 820 – Post-Incident ActivitiesSOM 823 – Continuous Improvement and AdaptationSOM 826 – Security Incident Management Tools SOM 811 – Roles and responsibilities of security operations teamsSOM 812 – Introduction to industry-standard security frameworksSOM 814 – Threat Detection and AnalysisSOM 815 – Incident Response PlanningSOM 817 – Incident Response ProcessSOM 818 – Digital Forensics FundamentalsSOM 820 – Post-Incident ActivitiesSOM 823 – Continuous Improvement and AdaptationSOM 826 – Security Incident Management Tools Apply knowledge gained throughout the program to develop and present a comprehensive cybersecurity management plan, guided by industry mentors Ā Pedagogical Approach: Interactive Lectures: Engaging presentations covering theoretical concepts and practical applications.Case Studies: Analyzing real-world Cyber Security challenges to increase awareness & develop problem-solving skills.Group Discussions: Facilitating collaborative learning and sharing of diverse perspectives.Practical Exercises: Hands-on activities to reinforce learning and build technical skills.Guest Lectures: Industry experts sharing insights and experiences for a practical understanding of Information Security & Risk management.Online Resources: Access to supplementary materials, quizzes, and discussion forums for continuous learning and reinforcement.Capstone Project: Culminating experience to apply knowledge and skills acquired throughout the program in a comprehensive project.Apply now to join an elite cohort of InfoSecurity professionals and enhance your strategic leadership skills in Information Security Management. Secure your future in the digital age. Submit Application “Application fees is refundable if your application is not selected”
PGDCS (Post Graduate Diploma in Information Security Management) Read Post Ā»






