ISAC

Certified National Cyber Security Scholar

Learn to strengthen enterprise cybersecurity, explore emerging trends, and transform them into actionable insights.

Eligibility: 7+ years of work experience.

nsd-logo.png

NCSS: Techno-Managerial Cybersecurity Executive Program

Why do certain companies win against hackers, and why do others fail? What will state-sponsored attacks in the global economy mean for your organization? How can you defend against next generation cyberattacks by continually being one step ahead?

The NCSS Program will immerse you in new ways of thinking and provide insights that will significantly enhance your company defenses against emerging cyber-attacks and propel your career. This program aims to bridge the gap at the leadership level to drive cybersecurity initiatives and explore business opportunities in both the Government and the Industry. 

The National cybersecurity scholar (NCSS) is a comprehensive 18-week, 160 hours Instructor-led program for emerging cybersecurity leaders. The program is conducted by Information Sharing and Analysis Center (ISAC) with knowledge partner as CERT-IN and KDEM.

Enhancing National Security

Lead the initiatives at the national level for skill-building in emerging technologies, drive large scale programs that protect organizations from cyber threats, implement and drive projects of national importance on cybersecurity, and help create resilience in cyberspace of the country.

The professionals who complete this program will be deemed national assets under the National Security Database.

NCSSP

Program Benefits

Learn to build, manage, and deliver enterprise security even under the most pressing challenges in this techno-managerial executive program. The National Cyber Security Scholar program looks at the intricate relationship between technology, national security, intelligence, cyber warfare, and its impact on the organizations and businesses.

Experience Cyberwarfare with Phygital Cyber Range

The Phygital Cyber Range is a cutting-edge simulation of a smart-city’s Cyber Physical System (CPS), offering an immersive exploration of the interplay between physical and digital realms. The range features over 10 critical sectors of a city that are simulated using the latest industry hardware and software to provide a real-world understanding of how cyber-attacks can disrupt a nation’s economy.

During your on-campus visit, you will have the opportunity to engage in hands-on training on the world’s largest Phygital Cyber Range. You will gain practical experience in navigating the complexities of cyber security and learn about real-world case studies that target Internet of Things (IoT) and Supervisory Control and Data Acquisition (SCADA) systems, with the potential to impact large industries and critical infrastructures.

Hands-on

Cybercrisis Wargame

Engage in dynamic table-top exercises focused on cybersecurity, encompassing topics such as ransomware, incident response, and SOC maturity assessment. Gain insights into the perspectives of diverse stakeholders, and experience the challenges and rewards of adopting multiple roles within an organization to achieve optimal results.

Forensics / Support

How does a support or forensic team see the attack unfolding?

CISO / CXO

What are the priorities of a CISO or a CXO who is responsible for data security?

Attacker / Hacker

How does the hacker see the attack remotely and perceive the competence of the target?

CEO / Senior Leadership

How will the CEO react to the cyber breach, impacting millions of customers?

Customers

What will the customers do on knowing that their personal data has been hacked?

Media / Public

How will the media react? What will be the impact on the company stock market?

The scholar program provides a unique opportunity to gain hands-on experience with real-world cyber crisis scenarios through our war-game activities. Participants will assume the roles of various stakeholders, including attackers, security operations center (SOC) teams, Forensicators, chief information security officers (CISOs), and CEOs, and engage in table-top exercises that simulate a cyber crisis.

Through these exercises, participants will gain a deeper understanding of how their responses to a cyber crisis impact the financial performance of their organization, including sales and stock prices. This offers valuable insights into the economic impact of cyber security decisions and the importance of proactive risk management.

UNIQUE EXPERIENCE

Sector Specific Site Visits Included

The scholar program includes visits to various Critical Information Infrastructure facilities
that allow you to expand your exposure to sector-specific cyber risks.

airplane-at-the-airport-terminal-runway.jpg

Delhi International Airport

Visit the Delhi International Airport and understand the internal security measures adopted. Hosted by the GMR, India’s largest private Airport company.

chimney-of-a-power-plant-against-blue-sky.jpg

Energy Sector - Power Plant

Visit a modern power plant and understand the various cybersecurity practices that go in protecting the CII from cyber attacks, including potential gaps.

server-room-modern-data-center-.jpg

Modern Security Operations Center

Explore the cutting-edge Security Operations Center, from a leading PSU/ISP and learn how complex technologies are integrated for protecting enterprise organizations.

Off-Grid Skills

Unleash Your Inner Privacy Beast Mode: Join the Survival Training Workshop for Cybersecurity Professionals.

What’s a cyber security professional without essential life hacking skills?

It’s time to elevate your leadership and team-building potential by channeling your inner off-grid privacy beast mode. Immerse yourself and your team in a transformative experience that blends the thrill of hardware hacking with essential survival skills, all while fostering collaboration, resilience, and strategic thinking.

The immersive 3-day experience designed not only to equip you with lifesaving and life-enhancing skills but also to strengthen your ability to lead and inspire others. Gain immersive experience at our dedicated outdoor campsite in Hyderabad, where this workshop offers an intensive program of interactive lectures, practical demonstrations, and hands-on activities that will challenge and empower your team to work together, adapt to new challenges, and build stronger bonds.

In the fast-paced and high-stakes world of cybersecurity, professionals are constantly under pressure to defend against relentless cyber threats.

With long hours spent sitting in front of screens and the sedentary nature of the job, it’s no wonder that cybersecurity is considered one of the most stressful professions, significantly impacting well-being and increasing risk.

ISAC ALUMNI BENEFITS

Upon successful completion of the Scholar Program, you will be granted Alumni status within the esteemed ISAC Foundation. This prestigious designation offers a wide array of advantages designed to facilitate your ongoing professional development and enhance your career prospects for a lifetime.

01  Connectivity

An alumni network offers a platform to stay connected with your alma mater and keep abreast of the latest news and events. Additionally, it provides a chance to reconnect with former classmates and colleagues

02  Career Advancement

This network offers a wealth of opportunities for networking and career advancement. You can connect with alumni working in your field and gain access to job postings and career guidance.

03  PEER SUPPORT

Access the scholar network to immediately get peer-support in emergency situations such as cyber-attacks or critical breaches impacting the organization

04  Access Technical programs

As a scholar , you will enjoy lifetime discounted access to ISAC technical IT Security Certifications , reflecting our commitment to your academic and professional development. To be eligible for these benefits, one is expected to render 10 hours of voluntary work pro bono towards awareness,training or advancing professional ethics at workplace.

Testimonial

Lt Col (Dr.) Santosh Khadsare

Vice President - eSec Forte

Blended Delivery Program

A fully online course that incorporates live sessions and industry visits for a comprehensive learning experience.

Contact

Group Captain Aanand Naidu (Retd)
Executive Director - ISAC
+91 97317 45635
Email: pan@isacfoundation.org

Contact

Rajshekhar P
Director - ISAC
+91 8527465252
Email: rajsm@isacfoundation.org

Meet

Our Speakers

The scholar program has guest speakers on Thursdays. Below are some of our esteemed speakers from previous cohorts.

Lt Gen (Dr) Rajesh Pant

National Cyber Security Coordinator, Prime Minister’s Office Government of India

(NSD Scholar – Cohort Two)

Dr Ajeet Bajpai

Former Director General – National Critical Information Infrastructure Protection Center

Yaduveer Krishnadatta

Maharaja of Mysuru – Leading India’s largest cyber security hub initiative

Dr Emandi Sankara Rao

Former Chairman – MDI and CEO, IFCI Ltd, Government of India

Dr Pavan Duggal

Founder & Chairman of International Commission on Cyber Security Law

Jarrett W. Kolthoff

Jarrett Kolthoff, Founder/CEO of SpearTip and a former Counterintelligence Special Agent.

Dr Manjari Khanna Kapoor

CPTED Specialist, Founder of ABSI, Chairman – SEQURE Standards for Physical Security

Usha Rengaraju

Kaggle Grandmaster 2020, Data scientist, Adjunct Faculty at IIT Madras for Data Science

Tarun Wig

Founder – Innefu Labs, Counter Intelligence Specialist and Cyber Security Expert