SIU Pune-image

MBA-INFORMATION-TECHNOLOGY-SICSR in Information Security Management at Symbiosis International University (SIU)

Symbiosis International University, Pune, established in 1971, is a premier UGC-recognized Deemed University with an A++ NAAC grade. Spanning over 400 acres, it offers over 60 diverse UG, PG, and doctoral programs. Known for academic excellence and global recognition, it consistently ranks high in NIRF and boasts strong placements.

READ MORE
location

Pune, Maharashtra

Compare colleges

About the Specialization

What is Information Security Management at Symbiosis International University (SIU) Pune?

This Information Security Management program at Symbiosis International University, SICSR, focuses on developing professionals adept at protecting an organization''''s digital assets. Given India''''s rapid digital transformation, there''''s a critical need for cybersecurity experts. The program integrates advanced technical skills with management principles to prepare leaders in the field. It emphasizes a holistic approach to security, addressing both technical and governance aspects.

Who Should Apply?

This program is ideal for engineering graduates with a keen interest in cybersecurity or IT professionals looking to specialize in security roles. It also suits working professionals seeking to enhance their security knowledge for career advancement or those transitioning into cybersecurity leadership. A foundational understanding of IT concepts is beneficial, but the program is designed to bring diverse backgrounds up to speed.

Why Choose This Course?

Graduates of this program can expect to secure roles such as Security Analyst, Security Consultant, GRC Specialist, or Information Security Manager within various Indian and multinational companies. Entry-level salaries typically range from INR 6-10 LPA, growing significantly with experience. The program aligns with certifications like CISSP, CISM, and CEH, boosting career trajectories in the rapidly expanding Indian cyber security market.

Student Success Practices

Foundation Stage

Build a Strong IT & Security Foundation- (Semester 1-2)

Focus rigorously on core IT concepts and initial security principles covered in the common MBA (IT) curriculum. Actively participate in discussions, seek clarifications, and form study groups. Ensure a solid grasp of networking, operating systems, and basic security models.

Tools & Resources

Online courses (Coursera, NPTEL) for IT fundamentals, Cybersecurity blogs (KrebsOnSecurity, The Hacker News), Basic virtual lab setups (VirtualBox, VMware)

Career Connection

A robust foundation is critical for understanding advanced security topics and performing well in technical interviews for entry-level security analyst roles.

Engage in Early Skill Development Workshops- (Semester 1-2)

Look for college-organized or external workshops on fundamental cybersecurity tools and concepts, such as Linux basics, basic scripting (Python), or network scanning (Nmap). Apply theoretical knowledge gained from ''''Cyber Security & Governance'''' in practical scenarios.

Tools & Resources

HackerRank, LeetCode (for logic), TryHackMe, Hack The Box (beginner-friendly labs), Python tutorials

Career Connection

Hands-on experience with tools makes resumes stand out and prepares students for practical challenges in internships and job roles.

Network with Peers & Mentors- (Semester 1-2)

Actively participate in student clubs related to technology or cybersecurity. Connect with senior students and alumni working in the information security domain for guidance and insights into industry trends and career paths in India.

Tools & Resources

LinkedIn, College alumni network platforms, Student technical communities

Career Connection

Networking opens doors to internship opportunities, mentorship, and a better understanding of the Indian job market, aiding in early career planning.

Intermediate Stage

Specialize through Electives and Certifications- (Semester 3)

Deep dive into your chosen specialization by selecting relevant electives in Semester 3. Simultaneously, pursue industry-recognized certifications like CompTIA Security+, CEH, or ISC2 SSCP. This demonstrates practical expertise beyond academics.

Tools & Resources

Official certification guides, Practice exams, Dedicated online certification training platforms (e.g., Simplilearn, EC-Council)

Career Connection

Certifications are often a mandatory requirement for many cybersecurity roles in India and significantly enhance employability for specialized positions.

Undertake Intensive Summer Internship Projects- (Summer after Semester 2)

Secure a meaningful summer internship (after Semester 2) in an information security role. Focus on applying classroom knowledge to real-world problems. Document learnings, contribute actively, and build a strong professional network during the internship.

Tools & Resources

Company-specific tools, Project management software, Professional networking platforms

Career Connection

Internships provide invaluable practical experience, improve problem-solving skills, and often lead to pre-placement offers in top Indian and multinational companies.

Participate in CTFs and Security Challenges- (Semester 3)

Regularly engage in Capture The Flag (CTF) competitions, hackathons, and online security challenges. This hones practical hacking skills, problem-solving, and teamwork in a simulated environment, crucial for roles like ethical hacking or penetration testing.

Tools & Resources

CTFtime.org, Platforms like RootMe, OverTheWire, Local college hackathon events

Career Connection

Success in these competitions demonstrates advanced technical skills and a proactive learning attitude, highly valued by Indian security employers.

Advanced Stage

Master Dissertation/Capstone Project- (Semester 4)

Choose a dissertation topic aligned with your specialization and career interests. Conduct thorough research, implement practical solutions, and develop a comprehensive report. This project should showcase your expertise and problem-solving abilities.

Tools & Resources

Research databases, Academic journals, Data analysis tools, Project management methodologies

Career Connection

A well-executed dissertation serves as a strong portfolio piece, demonstrating in-depth knowledge and research capabilities, which is crucial for higher-level roles.

Refine Interview & Soft Skills for Placements- (Semester 4)

Actively participate in campus placement training programs. Focus on mock interviews, group discussions, and aptitude tests. Develop strong communication, presentation, and negotiation skills essential for corporate roles.

Tools & Resources

Career services cell, Online interview preparation platforms, Public speaking clubs, Peer feedback

Career Connection

Polished soft skills are as crucial as technical expertise for securing desirable positions in the competitive Indian job market.

Build a Professional Portfolio & Online Presence- (Semester 4 & beyond)

Curate a professional portfolio showcasing your projects, certifications, internship reports, and any publications. Maintain an updated LinkedIn profile highlighting your skills and achievements to attract recruiters.

Tools & Resources

GitHub (for code projects), Personal website/blog, LinkedIn

Career Connection

A strong professional portfolio and online presence significantly increase visibility to recruiters and prospective employers in India''''s tech industry.

Program Structure and Curriculum

Eligibility:

  • Graduate from any statutory University with minimum 50% marks (45% for SC/ST) at qualifying examination. Appearing students can also apply. Valid SNAP score.

Duration: 2 years (4 semesters)

Credits: 100 Credits

Assessment: Internal: 40%, External: 60%

Semester-wise Curriculum Table

Semester 1

Subject CodeSubject NameSubject TypeCreditsKey Topics
T5001Organizational BehaviorCore3Foundations of OB, Perception and Learning, Motivation Theories, Leadership and Power, Team Dynamics, Conflict Management
T5002Economics for Business DecisionsCore3Micro and Macro Economics, Demand and Supply Analysis, Market Structures, National Income Accounting, Inflation and Unemployment, Fiscal and Monetary Policy
T5003Financial ManagementCore3Financial Decisions, Time Value of Money, Capital Budgeting, Working Capital Management, Cost of Capital, Capital Structure Theories
T5004Marketing ManagementCore3Marketing Environment, Consumer Behavior, Market Segmentation, Product Life Cycle, Pricing Strategies, Promotion and Distribution
T5005Business StatisticsCore3Data Collection and Presentation, Probability Distributions, Hypothesis Testing, Regression and Correlation, Time Series Analysis, Index Numbers
T5006Business Research MethodsCore3Research Process, Research Design, Sampling Techniques, Data Collection Instruments, Data Analysis Techniques, Report Writing and Ethics
T5007Design ThinkingCore3Introduction to Design Thinking, Empathize and Define, Ideation Techniques, Prototyping Principles, Testing and Iteration, Innovation and Creativity
T5008Management Information SystemsCore3IS Fundamentals, IT Infrastructure, E-commerce Systems, Decision Support Systems, IS Strategy and Planning, Emerging Trends in IS
T5NC01Business CommunicationNon-Credit0Verbal and Non-Verbal Communication, Presentation Skills, Report Writing, Email Etiquette, Cross-Cultural Communication, Negotiation Skills
T5NC02Professional SkillsNon-Credit0Critical Thinking, Problem Solving, Time Management, Stress Management, Interpersonal Skills, Professional Etiquette

Semester 2

Subject CodeSubject NameSubject TypeCreditsKey Topics
T5009Operations ManagementCore3Operations Strategy, Process Design and Analysis, Capacity Planning, Inventory Management, Quality Management Systems, Supply Chain Management
T5010Human Resource ManagementCore3HR Planning and Policies, Recruitment and Selection, Training and Development, Performance Appraisal, Compensation Management, Industrial Relations
T5011Cyber Security & GovernanceCore3Information Security Principles, Cyber Threats and Attacks, Risk Management Frameworks, Security Policies and Procedures, Legal and Ethical Aspects of Security, Security Governance Models
T5012Business Intelligence and Data WarehousingCore3Business Intelligence Concepts, Data Warehousing Architecture, ETL Process, Data Mining Techniques, OLAP and Reporting Tools, Big Data Fundamentals
T5013IT Project ManagementCore3Project Life Cycle, Project Planning and Scheduling, Risk Management in IT Projects, Resource Management, Agile Methodologies, Project Monitoring and Control
T5014Enterprise Resource PlanningCore3ERP Concepts and Evolution, ERP Modules and Features, ERP Implementation Challenges, Supply Chain Management Integration, Customer Relationship Management, Business Process Reengineering
T5IS01Fundamentals of CryptographyElective3Symmetric Key Cryptography, Asymmetric Key Cryptography, Hashing and Message Digests, Digital Signatures, Key Management, Public Key Infrastructure (PKI)
T5IS02Cloud SecurityElective3Cloud Computing Models, Cloud Security Threats, Data Security in Cloud, Identity and Access Management, Cloud Compliance and Audit, DevOps Security
T5IS03Network SecurityElective3Network Topologies and Protocols, Network Attacks and Vulnerabilities, Firewalls and Intrusion Detection Systems, Virtual Private Networks (VPNs), Wireless Network Security, Network Access Control
T5IS04Information Security AuditingElective3Audit Principles and Standards, Types of Security Audits, Audit Frameworks (COBIT, ISO), Compliance Audits, Audit Reporting and Follow-up, Tools for Security Auditing
T5IS05Data Privacy and GovernanceElective3Data Privacy Regulations (GDPR, PII), Data Lifecycle Management, Privacy by Design, Data Protection Impact Assessment, Legal Frameworks for Data Protection, Ethical Data Use and Sharing
T5IS06Application SecurityElective3Secure Software Development Lifecycle, OWASP Top 10, Secure Coding Practices, Web Application Security, Mobile Application Security, Penetration Testing Fundamentals
T5NC03Foreign LanguageNon-Credit0Basic Vocabulary and Grammar, Conversational Practice, Cultural Nuances, Reading Comprehension, Listening Skills, Basic Sentence Formation
SIPSummer Internship ProjectProject4Problem Definition, Literature Review, Methodology Development, Data Collection and Analysis, Report Writing, Presentation Skills

Semester 3

Subject CodeSubject NameSubject TypeCreditsKey Topics
T5015IT StrategyCore3IT and Business Alignment, IT Governance Frameworks, Strategic Planning for IT, Enterprise Architecture, IT Sourcing and Vendor Management, Digital Transformation Strategy
T5016IT Laws & EthicsCore3Cyber Laws (IT Act, India), Intellectual Property Rights, Data Protection Laws, Privacy Issues and Regulations, Ethical Hacking and Legalities, Professional Ethics in IT
T5IS07Ethical Hacking and Penetration TestingElective3Reconnaissance and Footprinting, Scanning and Enumeration, Vulnerability Analysis, Exploitation Techniques, Web Application Penetration Testing, Reporting and Remediation
T5IS08Security Operations & Incident ResponseElective3SOC Operations and Functions, Incident Response Lifecycle, Threat Intelligence, SIEM Deployment and Analysis, Digital Forensics in Incident Response, Business Continuity and Disaster Recovery
T5IS09Risk Management & ComplianceElective3Risk Assessment Methodologies, Risk Treatment Strategies, Compliance Frameworks (ISO 27001, NIST), Policy Management, Audit and Assurance, Legal and Regulatory Requirements
T5IS10Secure Software DevelopmentElective3SDLC Security Integration, Threat Modeling, Secure Design Principles, Static and Dynamic Analysis, Code Review Techniques, Security Testing Methodologies
T5IS11Digital ForensicsElective3Digital Forensics Process, Data Acquisition and Preservation, Disk and File System Analysis, Network Forensics, Mobile Device Forensics, Forensic Reporting and Expert Witness
T5IS12Blockchain SecurityElective3Blockchain Fundamentals, Cryptographic Primitives in Blockchain, Smart Contract Security, Consensus Mechanism Attacks, Decentralized Application Security, Quantum Cryptography and Blockchain
T5OE01Business AnalyticsOpen Elective3Descriptive Analytics, Predictive Analytics Models, Prescriptive Analytics, Data Visualization Techniques, Business Reporting, Big Data Analytics Introduction
T5NC04Research ProjectNon-Credit0Project Planning, Data Collection Methods, Analysis and Interpretation, Report Writing, Presentation Skills, Academic Integrity

Semester 4

Subject CodeSubject NameSubject TypeCreditsKey Topics
T5DIS1DissertationProject8Research Design and Methodology, Literature Review and Gap Analysis, Data Analysis and Interpretation, Scientific Writing and Formatting, Thesis Presentation, Original Contribution to Knowledge
T5IS13Governance, Risk & Compliance ManagementElective3GRC Frameworks and Strategies, Regulatory Landscape and Standards, Policy Implementation and Review, Continuous Monitoring and Audit, Legal and Ethical Compliance, GRC Tooling and Automation
T5IS14Advanced Threat ManagementElective3Advanced Persistent Threats (APTs), Zero-Day Exploits, Malware Analysis and Reverse Engineering, Threat Hunting Techniques, Deception Technologies, Cyber Warfare and State-Sponsored Attacks
T5IS15IoT SecurityElective3IoT Architecture and Components, IoT Attack Surfaces, Device Security in IoT, Network Security for IoT, Data Privacy and Trust in IoT, Cloud Integration Security for IoT
T5IS16Cyber Intelligence and WarfareElective3Cyber Intelligence Cycle, Cyber Espionage and Sabotage, Nation-State Attacks, Critical Infrastructure Protection, Attack Attribution, Counterintelligence Strategies
whatsapp

Chat with us