PGDCS (Post Graduate Diploma in Information Security Management)

Advance in skills protecting digital systems with our comprehensive Post Graduate Diploma in Information Security Management.
GIM offers 15-day grace period for free withdrawal with full refund

Course Includes

Application fees will be fully refunded if your application is not selected

BlockChain Based Certificate of Completion

Course

Embark on a cutting-edge journey in cybersecurity with our Online Postgraduate Diploma in Information Security Management—a 12-month program meticulously crafted to equip professionals with strategic leadership skills in the realm of cybersecurity. Delivered entirely online, this program blends theoretical knowledge with practical insights, guided by industry-leading instructors, to prepare you for the challenges of securing digital landscapes in today’s rapidly evolving technological landscape.

Next

Admission Requirements:

Technical Proficiency

-Demonstrated proficiency in fundamental IT concepts and technologies.

Professional Experience

-A minimum of two years of experience in information technology, cybersecurity, or a related field.

Educational Background

-A Bachelor’s degree in a relevant field from a recognized institution.
-Any two industry recognized certificates like CISSP, CISM, CISA, ISO27001 etc

Tuition Fees:

A fee of $259 is payable at the time of application. This application fee is refundable if you are not selected for the cohort

Course Fees

First installment payable within 2 weeks after issue of the acceptance letter
Document Verification Fees: $ 375
Course Fees: $ 4000
Capstone Project Expenses: $ 200
Convocation Cost: $ 350

Total Estimated Tuition Cost: $4925

Application Process

  • Apply and pay the application fees.

  • Submit a completed online application form.

  • Provide a detailed resume showcasing academic and professional achievements.

  • Submit a statement of purpose outlining career goals and how the program aligns with those aspirations.

  • Participate in a virtual interview to assess suitability for the program.

Important Dates

  • Application Closure Date: 9th June 2026

  • Interview Period: Until 23rd  June 2026

  • Acceptance Letters Sent By: 29th June 2026

  • Fee Payment (First Instalment): Before 10th July 2026

  • Course Commencement Date: 13th July 2026

Course Modules:

ISG 101 – Understanding the concept of Information security governance
ISG 102 – Frameworks and standards for Information security governance
ISG 103 – Establishing governance structures and processes
ISD 114 – Aligning ISG with organizational objectives

IRM 401 – Introduction to Risk Management
IRM 407 – Risk Identification and Assessment
IRM 409 – Risk Mitigation and Control
ICM 413 – Compliance Management
ICM 425 – Compliance Monitoring and Enforcement

SED 300 – Introduction to Security Architecture
SED 301 – Threat Modeling
SED 302 – Security Design Principles
SED 303 – Secure Network Design
SED 304 – Cryptography and Security Protocols
SED 307 – Access Control and Authentication
SED 309 – Secure Software Development
SED 311 – Security Testing and Evaluation

SOM 811 – Roles and responsibilities of security operations teams
SOM 812 – Introduction to industry-standard security frameworks
SOM 814 – Threat Detection and Analysis
SOM 815 – Incident Response Planning
SOM 817 – Incident Response Process
SOM 818 – Digital Forensics Fundamentals
SOM 820 – Post-Incident Activities
SOM 823 – Continuous Improvement and Adaptation
SOM 826 – Security Incident Management Tools

SOM 811 – Roles and responsibilities of security operations teams
SOM 812 – Introduction to industry-standard security frameworks
SOM 814 – Threat Detection and Analysis
SOM 815 – Incident Response Planning
SOM 817 – Incident Response Process
SOM 818 – Digital Forensics Fundamentals
SOM 820 – Post-Incident Activities
SOM 823 – Continuous Improvement and Adaptation
SOM 826 – Security Incident Management Tools

Apply knowledge gained throughout the program to develop and present a comprehensive cybersecurity management plan, guided by industry mentors

 

Pedagogical Approach:

Interactive Lectures: Engaging presentations covering theoretical concepts and practical applications.
Case Studies: Analyzing real-world Cyber Security challenges to increase awareness & develop problem-solving skills.
Group Discussions: Facilitating collaborative learning and sharing of diverse perspectives.
Practical Exercises: Hands-on activities to reinforce learning and build technical skills.
Guest Lectures: Industry experts sharing insights and experiences for a practical understanding of Information Security & Risk management.
Online Resources: Access to supplementary materials, quizzes, and discussion forums for continuous learning and reinforcement.
Capstone Project: Culminating experience to apply knowledge and skills acquired throughout the program in a comprehensive project.
Apply now to join an elite cohort of InfoSecurity professionals and enhance your strategic leadership skills in Information Security Management. Secure your future in the digital age.

“Application fees is refundable if your application is not selected”

GIM offers 15-day grace period for free withdrawal with full refund

Course Includes

BlockChain Based Certificate of Completion

Application fees will be fully refunded if your application is not selected

Course

Embark on a cutting-edge journey in cybersecurity with our Online Postgraduate Diploma in Information Security Management—a 12-month program meticulously crafted to equip professionals with strategic leadership skills in the realm of cybersecurity. Delivered entirely online, this program blends theoretical knowledge with practical insights, guided by industry-leading instructors, to prepare you for the challenges of securing digital landscapes in today’s rapidly evolving technological landscape.

Next

Admission Requirements:

Technical Proficiency

-Demonstrated proficiency in fundamental IT concepts and technologies.

Professional Experience

-A minimum of two years of experience in information technology, cybersecurity, or a related field.

Educational Background

-A Bachelor’s degree in a relevant field from a recognized institution.
-Any two industry recognized certificates like CISSP, CISM, CISA, ISO27001 etc

Tuition Fees:

A fee of $259 is payable at the time of application. This application fee is refundable if you are not selected for the cohort

Course Fees

First installment payable within 2 weeks after issue of the acceptance letter
Document Verification Fees: $ 375
Course Fees: $ 4000
Capstone Project Expenses: $ 200
Convocation Cost: $ 350

Total Estimated Tuition Cost: $4925

Application Process

  • Apply and pay the application fees.

  • Submit a completed online application form.

  • Provide a detailed resume showcasing academic and professional achievements.

  • Submit a statement of purpose outlining career goals and how the program aligns with those aspirations.

  • Participate in a virtual interview to assess suitability for the program.

Important Dates

  • Application Closure Date: 9th June 2026

  • Interview Period: Until 23rd  June 2026

  • Acceptance Letters Sent By: 29th June 2026

  • Fee Payment (First Instalment): Before 10th July 2026

  • Course Commencement Date: 13th July 2026

Course Modules:

ISG 101 – Understanding the concept of Information security governance
ISG 102 – Frameworks and standards for Information security governance
ISG 103 – Establishing governance structures and processes
ISD 114 – Aligning ISG with organizational objectives

IRM 401 – Introduction to Risk Management
IRM 407 – Risk Identification and Assessment
IRM 409 – Risk Mitigation and Control
ICM 413 – Compliance Management
ICM 425 – Compliance Monitoring and Enforcement

SED 300 – Introduction to Security Architecture
SED 301 – Threat Modeling
SED 302 – Security Design Principles
SED 303 – Secure Network Design
SED 304 – Cryptography and Security Protocols
SED 307 – Access Control and Authentication
SED 309 – Secure Software Development
SED 311 – Security Testing and Evaluation

SOM 811 – Roles and responsibilities of security operations teams
SOM 812 – Introduction to industry-standard security frameworks
SOM 814 – Threat Detection and Analysis
SOM 815 – Incident Response Planning
SOM 817 – Incident Response Process
SOM 818 – Digital Forensics Fundamentals
SOM 820 – Post-Incident Activities
SOM 823 – Continuous Improvement and Adaptation
SOM 826 – Security Incident Management Tools

SOM 811 – Roles and responsibilities of security operations teams
SOM 812 – Introduction to industry-standard security frameworks
SOM 814 – Threat Detection and Analysis
SOM 815 – Incident Response Planning
SOM 817 – Incident Response Process
SOM 818 – Digital Forensics Fundamentals
SOM 820 – Post-Incident Activities
SOM 823 – Continuous Improvement and Adaptation
SOM 826 – Security Incident Management Tools

Apply knowledge gained throughout the program to develop and present a comprehensive cybersecurity management plan, guided by industry mentors

 

Pedagogical Approach:

Interactive Lectures: Engaging presentations covering theoretical concepts and practical applications.
Case Studies: Analyzing real-world Cyber Security challenges to increase awareness & develop problem-solving skills.
Group Discussions: Facilitating collaborative learning and sharing of diverse perspectives.
Practical Exercises: Hands-on activities to reinforce learning and build technical skills.
Guest Lectures: Industry experts sharing insights and experiences for a practical understanding of Information Security & Risk management.
Online Resources: Access to supplementary materials, quizzes, and discussion forums for continuous learning and reinforcement.
Capstone Project: Culminating experience to apply knowledge and skills acquired throughout the program in a comprehensive project.
Apply now to join an elite cohort of InfoSecurity professionals and enhance your strategic leadership skills in Information Security Management. Secure your future in the digital age.

“Application fees is refundable if your application is not selected”

Copyright © 2026   –  Georgia Institute of Management

Scroll to Top