

MBA-INFORMATION-TECHNOLOGY-SICSR in Information Security Management at Symbiosis International University (SIU)


Pune, Maharashtra
.png&w=1920&q=75)
About the Specialization
What is Information Security Management at Symbiosis International University (SIU) Pune?
This Information Security Management program at Symbiosis International University, SICSR, focuses on developing professionals adept at protecting an organization''''s digital assets. Given India''''s rapid digital transformation, there''''s a critical need for cybersecurity experts. The program integrates advanced technical skills with management principles to prepare leaders in the field. It emphasizes a holistic approach to security, addressing both technical and governance aspects.
Who Should Apply?
This program is ideal for engineering graduates with a keen interest in cybersecurity or IT professionals looking to specialize in security roles. It also suits working professionals seeking to enhance their security knowledge for career advancement or those transitioning into cybersecurity leadership. A foundational understanding of IT concepts is beneficial, but the program is designed to bring diverse backgrounds up to speed.
Why Choose This Course?
Graduates of this program can expect to secure roles such as Security Analyst, Security Consultant, GRC Specialist, or Information Security Manager within various Indian and multinational companies. Entry-level salaries typically range from INR 6-10 LPA, growing significantly with experience. The program aligns with certifications like CISSP, CISM, and CEH, boosting career trajectories in the rapidly expanding Indian cyber security market.

Student Success Practices
Foundation Stage
Build a Strong IT & Security Foundation- (Semester 1-2)
Focus rigorously on core IT concepts and initial security principles covered in the common MBA (IT) curriculum. Actively participate in discussions, seek clarifications, and form study groups. Ensure a solid grasp of networking, operating systems, and basic security models.
Tools & Resources
Online courses (Coursera, NPTEL) for IT fundamentals, Cybersecurity blogs (KrebsOnSecurity, The Hacker News), Basic virtual lab setups (VirtualBox, VMware)
Career Connection
A robust foundation is critical for understanding advanced security topics and performing well in technical interviews for entry-level security analyst roles.
Engage in Early Skill Development Workshops- (Semester 1-2)
Look for college-organized or external workshops on fundamental cybersecurity tools and concepts, such as Linux basics, basic scripting (Python), or network scanning (Nmap). Apply theoretical knowledge gained from ''''Cyber Security & Governance'''' in practical scenarios.
Tools & Resources
HackerRank, LeetCode (for logic), TryHackMe, Hack The Box (beginner-friendly labs), Python tutorials
Career Connection
Hands-on experience with tools makes resumes stand out and prepares students for practical challenges in internships and job roles.
Network with Peers & Mentors- (Semester 1-2)
Actively participate in student clubs related to technology or cybersecurity. Connect with senior students and alumni working in the information security domain for guidance and insights into industry trends and career paths in India.
Tools & Resources
LinkedIn, College alumni network platforms, Student technical communities
Career Connection
Networking opens doors to internship opportunities, mentorship, and a better understanding of the Indian job market, aiding in early career planning.
Intermediate Stage
Specialize through Electives and Certifications- (Semester 3)
Deep dive into your chosen specialization by selecting relevant electives in Semester 3. Simultaneously, pursue industry-recognized certifications like CompTIA Security+, CEH, or ISC2 SSCP. This demonstrates practical expertise beyond academics.
Tools & Resources
Official certification guides, Practice exams, Dedicated online certification training platforms (e.g., Simplilearn, EC-Council)
Career Connection
Certifications are often a mandatory requirement for many cybersecurity roles in India and significantly enhance employability for specialized positions.
Undertake Intensive Summer Internship Projects- (Summer after Semester 2)
Secure a meaningful summer internship (after Semester 2) in an information security role. Focus on applying classroom knowledge to real-world problems. Document learnings, contribute actively, and build a strong professional network during the internship.
Tools & Resources
Company-specific tools, Project management software, Professional networking platforms
Career Connection
Internships provide invaluable practical experience, improve problem-solving skills, and often lead to pre-placement offers in top Indian and multinational companies.
Participate in CTFs and Security Challenges- (Semester 3)
Regularly engage in Capture The Flag (CTF) competitions, hackathons, and online security challenges. This hones practical hacking skills, problem-solving, and teamwork in a simulated environment, crucial for roles like ethical hacking or penetration testing.
Tools & Resources
CTFtime.org, Platforms like RootMe, OverTheWire, Local college hackathon events
Career Connection
Success in these competitions demonstrates advanced technical skills and a proactive learning attitude, highly valued by Indian security employers.
Advanced Stage
Master Dissertation/Capstone Project- (Semester 4)
Choose a dissertation topic aligned with your specialization and career interests. Conduct thorough research, implement practical solutions, and develop a comprehensive report. This project should showcase your expertise and problem-solving abilities.
Tools & Resources
Research databases, Academic journals, Data analysis tools, Project management methodologies
Career Connection
A well-executed dissertation serves as a strong portfolio piece, demonstrating in-depth knowledge and research capabilities, which is crucial for higher-level roles.
Refine Interview & Soft Skills for Placements- (Semester 4)
Actively participate in campus placement training programs. Focus on mock interviews, group discussions, and aptitude tests. Develop strong communication, presentation, and negotiation skills essential for corporate roles.
Tools & Resources
Career services cell, Online interview preparation platforms, Public speaking clubs, Peer feedback
Career Connection
Polished soft skills are as crucial as technical expertise for securing desirable positions in the competitive Indian job market.
Build a Professional Portfolio & Online Presence- (Semester 4 & beyond)
Curate a professional portfolio showcasing your projects, certifications, internship reports, and any publications. Maintain an updated LinkedIn profile highlighting your skills and achievements to attract recruiters.
Tools & Resources
GitHub (for code projects), Personal website/blog, LinkedIn
Career Connection
A strong professional portfolio and online presence significantly increase visibility to recruiters and prospective employers in India''''s tech industry.
Program Structure and Curriculum
Eligibility:
- Graduate from any statutory University with minimum 50% marks (45% for SC/ST) at qualifying examination. Appearing students can also apply. Valid SNAP score.
Duration: 2 years (4 semesters)
Credits: 100 Credits
Assessment: Internal: 40%, External: 60%
Semester-wise Curriculum Table
Semester 1
| Subject Code | Subject Name | Subject Type | Credits | Key Topics |
|---|---|---|---|---|
| T5001 | Organizational Behavior | Core | 3 | Foundations of OB, Perception and Learning, Motivation Theories, Leadership and Power, Team Dynamics, Conflict Management |
| T5002 | Economics for Business Decisions | Core | 3 | Micro and Macro Economics, Demand and Supply Analysis, Market Structures, National Income Accounting, Inflation and Unemployment, Fiscal and Monetary Policy |
| T5003 | Financial Management | Core | 3 | Financial Decisions, Time Value of Money, Capital Budgeting, Working Capital Management, Cost of Capital, Capital Structure Theories |
| T5004 | Marketing Management | Core | 3 | Marketing Environment, Consumer Behavior, Market Segmentation, Product Life Cycle, Pricing Strategies, Promotion and Distribution |
| T5005 | Business Statistics | Core | 3 | Data Collection and Presentation, Probability Distributions, Hypothesis Testing, Regression and Correlation, Time Series Analysis, Index Numbers |
| T5006 | Business Research Methods | Core | 3 | Research Process, Research Design, Sampling Techniques, Data Collection Instruments, Data Analysis Techniques, Report Writing and Ethics |
| T5007 | Design Thinking | Core | 3 | Introduction to Design Thinking, Empathize and Define, Ideation Techniques, Prototyping Principles, Testing and Iteration, Innovation and Creativity |
| T5008 | Management Information Systems | Core | 3 | IS Fundamentals, IT Infrastructure, E-commerce Systems, Decision Support Systems, IS Strategy and Planning, Emerging Trends in IS |
| T5NC01 | Business Communication | Non-Credit | 0 | Verbal and Non-Verbal Communication, Presentation Skills, Report Writing, Email Etiquette, Cross-Cultural Communication, Negotiation Skills |
| T5NC02 | Professional Skills | Non-Credit | 0 | Critical Thinking, Problem Solving, Time Management, Stress Management, Interpersonal Skills, Professional Etiquette |
Semester 2
| Subject Code | Subject Name | Subject Type | Credits | Key Topics |
|---|---|---|---|---|
| T5009 | Operations Management | Core | 3 | Operations Strategy, Process Design and Analysis, Capacity Planning, Inventory Management, Quality Management Systems, Supply Chain Management |
| T5010 | Human Resource Management | Core | 3 | HR Planning and Policies, Recruitment and Selection, Training and Development, Performance Appraisal, Compensation Management, Industrial Relations |
| T5011 | Cyber Security & Governance | Core | 3 | Information Security Principles, Cyber Threats and Attacks, Risk Management Frameworks, Security Policies and Procedures, Legal and Ethical Aspects of Security, Security Governance Models |
| T5012 | Business Intelligence and Data Warehousing | Core | 3 | Business Intelligence Concepts, Data Warehousing Architecture, ETL Process, Data Mining Techniques, OLAP and Reporting Tools, Big Data Fundamentals |
| T5013 | IT Project Management | Core | 3 | Project Life Cycle, Project Planning and Scheduling, Risk Management in IT Projects, Resource Management, Agile Methodologies, Project Monitoring and Control |
| T5014 | Enterprise Resource Planning | Core | 3 | ERP Concepts and Evolution, ERP Modules and Features, ERP Implementation Challenges, Supply Chain Management Integration, Customer Relationship Management, Business Process Reengineering |
| T5IS01 | Fundamentals of Cryptography | Elective | 3 | Symmetric Key Cryptography, Asymmetric Key Cryptography, Hashing and Message Digests, Digital Signatures, Key Management, Public Key Infrastructure (PKI) |
| T5IS02 | Cloud Security | Elective | 3 | Cloud Computing Models, Cloud Security Threats, Data Security in Cloud, Identity and Access Management, Cloud Compliance and Audit, DevOps Security |
| T5IS03 | Network Security | Elective | 3 | Network Topologies and Protocols, Network Attacks and Vulnerabilities, Firewalls and Intrusion Detection Systems, Virtual Private Networks (VPNs), Wireless Network Security, Network Access Control |
| T5IS04 | Information Security Auditing | Elective | 3 | Audit Principles and Standards, Types of Security Audits, Audit Frameworks (COBIT, ISO), Compliance Audits, Audit Reporting and Follow-up, Tools for Security Auditing |
| T5IS05 | Data Privacy and Governance | Elective | 3 | Data Privacy Regulations (GDPR, PII), Data Lifecycle Management, Privacy by Design, Data Protection Impact Assessment, Legal Frameworks for Data Protection, Ethical Data Use and Sharing |
| T5IS06 | Application Security | Elective | 3 | Secure Software Development Lifecycle, OWASP Top 10, Secure Coding Practices, Web Application Security, Mobile Application Security, Penetration Testing Fundamentals |
| T5NC03 | Foreign Language | Non-Credit | 0 | Basic Vocabulary and Grammar, Conversational Practice, Cultural Nuances, Reading Comprehension, Listening Skills, Basic Sentence Formation |
| SIP | Summer Internship Project | Project | 4 | Problem Definition, Literature Review, Methodology Development, Data Collection and Analysis, Report Writing, Presentation Skills |
Semester 3
| Subject Code | Subject Name | Subject Type | Credits | Key Topics |
|---|---|---|---|---|
| T5015 | IT Strategy | Core | 3 | IT and Business Alignment, IT Governance Frameworks, Strategic Planning for IT, Enterprise Architecture, IT Sourcing and Vendor Management, Digital Transformation Strategy |
| T5016 | IT Laws & Ethics | Core | 3 | Cyber Laws (IT Act, India), Intellectual Property Rights, Data Protection Laws, Privacy Issues and Regulations, Ethical Hacking and Legalities, Professional Ethics in IT |
| T5IS07 | Ethical Hacking and Penetration Testing | Elective | 3 | Reconnaissance and Footprinting, Scanning and Enumeration, Vulnerability Analysis, Exploitation Techniques, Web Application Penetration Testing, Reporting and Remediation |
| T5IS08 | Security Operations & Incident Response | Elective | 3 | SOC Operations and Functions, Incident Response Lifecycle, Threat Intelligence, SIEM Deployment and Analysis, Digital Forensics in Incident Response, Business Continuity and Disaster Recovery |
| T5IS09 | Risk Management & Compliance | Elective | 3 | Risk Assessment Methodologies, Risk Treatment Strategies, Compliance Frameworks (ISO 27001, NIST), Policy Management, Audit and Assurance, Legal and Regulatory Requirements |
| T5IS10 | Secure Software Development | Elective | 3 | SDLC Security Integration, Threat Modeling, Secure Design Principles, Static and Dynamic Analysis, Code Review Techniques, Security Testing Methodologies |
| T5IS11 | Digital Forensics | Elective | 3 | Digital Forensics Process, Data Acquisition and Preservation, Disk and File System Analysis, Network Forensics, Mobile Device Forensics, Forensic Reporting and Expert Witness |
| T5IS12 | Blockchain Security | Elective | 3 | Blockchain Fundamentals, Cryptographic Primitives in Blockchain, Smart Contract Security, Consensus Mechanism Attacks, Decentralized Application Security, Quantum Cryptography and Blockchain |
| T5OE01 | Business Analytics | Open Elective | 3 | Descriptive Analytics, Predictive Analytics Models, Prescriptive Analytics, Data Visualization Techniques, Business Reporting, Big Data Analytics Introduction |
| T5NC04 | Research Project | Non-Credit | 0 | Project Planning, Data Collection Methods, Analysis and Interpretation, Report Writing, Presentation Skills, Academic Integrity |
Semester 4
| Subject Code | Subject Name | Subject Type | Credits | Key Topics |
|---|---|---|---|---|
| T5DIS1 | Dissertation | Project | 8 | Research Design and Methodology, Literature Review and Gap Analysis, Data Analysis and Interpretation, Scientific Writing and Formatting, Thesis Presentation, Original Contribution to Knowledge |
| T5IS13 | Governance, Risk & Compliance Management | Elective | 3 | GRC Frameworks and Strategies, Regulatory Landscape and Standards, Policy Implementation and Review, Continuous Monitoring and Audit, Legal and Ethical Compliance, GRC Tooling and Automation |
| T5IS14 | Advanced Threat Management | Elective | 3 | Advanced Persistent Threats (APTs), Zero-Day Exploits, Malware Analysis and Reverse Engineering, Threat Hunting Techniques, Deception Technologies, Cyber Warfare and State-Sponsored Attacks |
| T5IS15 | IoT Security | Elective | 3 | IoT Architecture and Components, IoT Attack Surfaces, Device Security in IoT, Network Security for IoT, Data Privacy and Trust in IoT, Cloud Integration Security for IoT |
| T5IS16 | Cyber Intelligence and Warfare | Elective | 3 | Cyber Intelligence Cycle, Cyber Espionage and Sabotage, Nation-State Attacks, Critical Infrastructure Protection, Attack Attribution, Counterintelligence Strategies |




