The third quarter of 2022 saw a whopping 37% increase in data exposure due to breaches as compared to the previous quarter (Statista). From protecting their consumer data and maintaining trust to preventing millions of dollars of losses, top organizations are looking for cybersecurity talents with rewarding pay. 

 

Without a doubt, data protection and privacy are among the top scouted skills for cybersecurity experts. Join us for an interactive session with Aniket Amdekar, General Manager, Cyber Defence Education, Great Learning as he discusses the latest advancements in data protection and privacy and the UT Austin program’s role in helping you ace in-demand cyber defense skills.

 

Fill the details to unlock the video

By submitting this form, you consent to our Terms of Use & Privacy Policy and to be contacted by us via Email/Call/Whatsapp/SMS.

Agenda for the session

  • Tools, methods, and policies used to access and restrict data
  • Current cyber threat landscape and latest advancements in data protection
  • UT Austin’s PG Program in Cybersecurity experience
  • Q and A session

About Speakers

Aniket Amdekar

General Manager - Cyber Defense Education, Great Learning


Aniket Amdekar is a seasoned cybersecurity expert with over 15 years of work experience. He specializes in end-to-end e-commerce security. He has helped multiple organizations research, design, and implement cutting-edge security technology/processes to help them cope with ongoing threats. He is currently working with Great Learning as General Manager of Cyber Defence Education.

Post Graduate Program in Cybersecurity

This Cyber Security course will navigate the foundations and skills necessary to build a Security mindset. The programme is designed with 4 milestones - Start strong with the foundations of cybersecurity. You then deep dive into the different types of cyber attacks. As you understand the attacks, you learn to design the security controls needed to build a resilient system. Finally, if an attack happens, you practice responding to these incidents by referring to Incident Response playbooks given to you as part of the programme. In this last section you also learn to investigate these attacks.10