ISAC
Certified National Cyber Security Scholar
Learn to strengthen enterprise cybersecurity, explore emerging trends, and transform them into actionable insights.
Eligibility: 7+ years of work experience.
NCSS: Techno-Managerial Cybersecurity Executive Program
Why do certain companies win against hackers, and why do others fail? What will state-sponsored attacks in the global economy mean for your organization? How can you defend against next generation cyberattacks by continually being one step ahead?
The NCSS Program will immerse you in new ways of thinking and provide insights that will significantly enhance your company defenses against emerging cyber-attacks and propel your career. This program aims to bridge the gap at the leadership level to drive cybersecurity initiatives and explore business opportunities in both the Government and the Industry.
The National cybersecurity scholar (NCSS) is a comprehensive 18-week, 160 hours Instructor-led program for emerging cybersecurity leaders. The program is conducted by Information Sharing and Analysis Center (ISAC) with knowledge partner as CERT-IN and KDEM.
Enhancing National Security
Lead the initiatives at the national level for skill-building in emerging technologies, drive large scale programs that protect organizations from cyber threats, implement and drive projects of national importance on cybersecurity, and help create resilience in cyberspace of the country.
The professionals who complete this program will be deemed national assets under the National Security Database.
NCSSP
Program Benefits
Learn to build, manage, and deliver enterprise security even under the most pressing challenges in this techno-managerial executive program. The National Cyber Security Scholar program looks at the intricate relationship between technology, national security, intelligence, cyber warfare, and its impact on the organizations and businesses.
- Comprehend the macro level cyber security issues and the convergence with National Security.
- Evaluate the importance of cyber security; understand the cyber risks to national and international security in developing and developed states.
- Identify the risks of cybercrime, cyber terrorism, and cyber war.
- Evaluate different paradigms for cyber security and determine the approach that best applies in an individual organization.
- Assess the strengths and weaknesses of the various international and national cyber security strategies.
- Understand the role of government and the private sector in cyber security and critical infrastructure protection.
- Develop strategies, plans and programs to prevent terrorist attacks and reduce a nation’s vulnerability to terrorism.
- Help National agencies to improve homeland security preparedness by formulating “real world” actionable policy and strategy development.
Experience Cyberwarfare with Phygital Cyber Range
The Phygital Cyber Range is a cutting-edge simulation of a smart-city’s Cyber Physical System (CPS), offering an immersive exploration of the interplay between physical and digital realms. The range features over 10 critical sectors of a city that are simulated using the latest industry hardware and software to provide a real-world understanding of how cyber-attacks can disrupt a nation’s economy.
During your on-campus visit, you will have the opportunity to engage in hands-on training on the world’s largest Phygital Cyber Range. You will gain practical experience in navigating the complexities of cyber security and learn about real-world case studies that target Internet of Things (IoT) and Supervisory Control and Data Acquisition (SCADA) systems, with the potential to impact large industries and critical infrastructures.
Hands-on
Cybercrisis Wargame
Engage in dynamic table-top exercises focused on cybersecurity, encompassing topics such as ransomware, incident response, and SOC maturity assessment. Gain insights into the perspectives of diverse stakeholders, and experience the challenges and rewards of adopting multiple roles within an organization to achieve optimal results.
Forensics / Support
How does a support or forensic team see the attack unfolding?
CISO / CXO
What are the priorities of a CISO or a CXO who is responsible for data security?
Attacker / Hacker
How does the hacker see the attack remotely and perceive the competence of the target?
CEO / Senior Leadership
How will the CEO react to the cyber breach, impacting millions of customers?
Customers
What will the customers do on knowing that their personal data has been hacked?
Media / Public
How will the media react? What will be the impact on the company stock market?
The scholar program provides a unique opportunity to gain hands-on experience with real-world cyber crisis scenarios through our war-game activities. Participants will assume the roles of various stakeholders, including attackers, security operations center (SOC) teams, Forensicators, chief information security officers (CISOs), and CEOs, and engage in table-top exercises that simulate a cyber crisis.
Through these exercises, participants will gain a deeper understanding of how their responses to a cyber crisis impact the financial performance of their organization, including sales and stock prices. This offers valuable insights into the economic impact of cyber security decisions and the importance of proactive risk management.
UNIQUE EXPERIENCE
Sector Specific Site Visits Included
The scholar program includes visits to various Critical Information Infrastructure facilities
that allow you to expand your exposure to sector-specific cyber risks.
Delhi International Airport
Visit the Delhi International Airport and understand the internal security measures adopted. Hosted by the GMR, India’s largest private Airport company.
Energy Sector - Power Plant
Visit a modern power plant and understand the various cybersecurity practices that go in protecting the CII from cyber attacks, including potential gaps.
Modern Security Operations Center
Explore the cutting-edge Security Operations Center, from a leading PSU/ISP and learn how complex technologies are integrated for protecting enterprise organizations.
Off-Grid Skills
Unleash Your Inner Privacy Beast Mode: Join the Survival Training Workshop for Cybersecurity Professionals.
What’s a cyber security professional without essential life hacking skills?
It’s time to elevate your leadership and team-building potential by channeling your inner off-grid privacy beast mode. Immerse yourself and your team in a transformative experience that blends the thrill of hardware hacking with essential survival skills, all while fostering collaboration, resilience, and strategic thinking.
The immersive 3-day experience designed not only to equip you with lifesaving and life-enhancing skills but also to strengthen your ability to lead and inspire others. Gain immersive experience at our dedicated outdoor campsite in Hyderabad, where this workshop offers an intensive program of interactive lectures, practical demonstrations, and hands-on activities that will challenge and empower your team to work together, adapt to new challenges, and build stronger bonds.
In the fast-paced and high-stakes world of cybersecurity, professionals are constantly under pressure to defend against relentless cyber threats.
With long hours spent sitting in front of screens and the sedentary nature of the job, it’s no wonder that cybersecurity is considered one of the most stressful professions, significantly impacting well-being and increasing risk.
ISAC ALUMNI BENEFITS
Upon successful completion of the Scholar Program, you will be granted Alumni status within the esteemed ISAC Foundation. This prestigious designation offers a wide array of advantages designed to facilitate your ongoing professional development and enhance your career prospects for a lifetime.
01 Connectivity
An alumni network offers a platform to stay connected with your alma mater and keep abreast of the latest news and events. Additionally, it provides a chance to reconnect with former classmates and colleagues
02 Career Advancement
This network offers a wealth of opportunities for networking and career advancement. You can connect with alumni working in your field and gain access to job postings and career guidance.
03 PEER SUPPORT
Access the scholar network to immediately get peer-support in emergency situations such as cyber-attacks or critical breaches impacting the organization
04 Access Technical programs
As a scholar , you will enjoy lifetime discounted access to ISAC technical IT Security Certifications , reflecting our commitment to your academic and professional development. To be eligible for these benefits, one is expected to render 10 hours of voluntary work pro bono towards awareness,training or advancing professional ethics at workplace.
Testimonial
Lt Col (Dr.) Santosh Khadsare
Vice President - eSec Forte
Blended Delivery Program
A fully online course that incorporates live sessions and industry visits for a comprehensive learning experience.
Contact
Executive Director - ISAC
+91 97317 45635
Email: pan@isacfoundation.org
Contact
Director - ISAC
+91 8527465252
Email: rajsm@isacfoundation.org
SCHOLARS ALUMNI
Meet our Scholars
Meet
Our Speakers
The scholar program has guest speakers on Thursdays. Below are some of our esteemed speakers from previous cohorts.
Lt Gen (Dr) Rajesh Pant
National Cyber Security Coordinator, Prime Minister’s Office Government of India
(NSD Scholar – Cohort Two)
Dr Ajeet Bajpai
Former Director General – National Critical Information Infrastructure Protection Center
Yaduveer Krishnadatta
Maharaja of Mysuru – Leading India’s largest cyber security hub initiative
Dr Emandi Sankara Rao
Former Chairman – MDI and CEO, IFCI Ltd, Government of India
Dr Pavan Duggal
Founder & Chairman of International Commission on Cyber Security Law
Jarrett W. Kolthoff
Jarrett Kolthoff, Founder/CEO of SpearTip and a former Counterintelligence Special Agent.
Dr Manjari Khanna Kapoor
CPTED Specialist, Founder of ABSI, Chairman – SEQURE Standards for Physical Security
Usha Rengaraju
Kaggle Grandmaster 2020, Data scientist, Adjunct Faculty at IIT Madras for Data Science
Tarun Wig
Founder – Innefu Labs, Counter Intelligence Specialist and Cyber Security Expert