Cybersecurity is a dynamic field that requires constant adaptation to new challenges. With the increasing importance of cloud security in addressing sophisticated cyber threats, this field offers endless opportunities for growth and innovation.

Join us for an exclusive live masterclass with Sanjeev Kumar Rohilla, where you'll gain insights into the changing threat landscape and the essential role of cloud security. Discover effective strategies to safeguard your digital environment and explore the Post Graduate Program in Cybersecurity from Texas McCombs, designed to equip you with the skills needed to thrive in this field.

Webinar Registration

By submitting this form, you consent to our Terms of Use & Privacy Policy and to be contacted by us via Email/Call/Whatsapp/SMS.

Agenda for the session

  • Understanding the Evolving Threat Landscape
  • Cloud Security Challenges and Solutions
  • Texas McCombs's Cybersecurity Program
  • Live Q&A

About Speakers

Sanjeev Kumar Rohilla

Cyber Security Senior Specialist, HCL Technologies

Sanjeev Kumar Rohilla is a seasoned cybersecurity professional with expertise in SIEM technologies like Splunk, ArcSight, QRadar, and RSA Envision. He specializes in security monitoring, event analysis, incident response, and remediation, leveraging tools like Microsoft Network Monitor and ServiceNow. Additionally, he mentors new associates, manages incident workflows, and ensures proactive threat mitigation through detailed analysis and process improvements.

Post Graduate Program in Cybersecurity

This 20-week cybersecurity course will help you navigate the foundations and skills necessary to build a security mindset. The program is designed with four milestones: Start strong with the foundations of cybersecurity. You then do a deep dive into the different types of cyberattacks. As you understand the attacks, you learn to design the security controls to build a resilient system. Finally, if an attack happens, you practice responding to these incidents by referring to the response playbooks given to you as part of the program. In this last section, you also learn to investigate these attacks.