PG Certificate in AI/GenAI Powered Cybersecurity

Become the GenAI-native cyber defender every system needs. Engineer zero-trust pipelines.. test adversarial prompts.. automate remediation workflows — all in one full-stack cybersecurity journey.

Start Date

October 18, 2025

Course Fee

₹1.4 Lacs + GST

Duration

9 Months | 126+ Hours

Time

Live Online + 3-Day Campus Immersion

India’s First GenAI-Native Cybersecurity Certificate

End-to-End Marketing Orchestration

AI-Powered Personalization Across Funnels

Master 20+ GenAI and Agentic Tools

No-Code Stack Integration for Real Campaigns

Live AI Clinic Workshops Beyond Curriculum

Capstone Project With Live Campaign Build

Faculty from IIT & Top Marketing Leaders

Weekend Live Classes + Campus Immersion

Career Support + Futurense Breakfast Club

Built for LLM, API & Agent Defense, with 2 - 3 days of CISSP Training

Engineer Real-Time Response Systems Using SOAR, Python & AI workflows

Master 30+ Tools Across GenAI, Automation & Cloud Security

Secure Full-Stack Pipelines; Not Just Patch Risks

Red Teaming Labs + Prompt Injection Simulations for real-world attack modeling

Capstone Project on Live Threat Scenarios (no generic case studies)

Learn from IIT Roorkee Faculty & Mentorship from Industry Experts

Weekend Live Sessions + Optional 3-Day IIT Campus Experience

Curriculum aligned with CISSP and CEH standards for global recognition

Cyber Defenses Were Layered… But Never Linked

CISOs set the strategy… SOC teams watched alerts… engineers patched what they could.
But no one owned the full attack surface, and Silos turned defenses into delays.72% of breaches now trace back to fragmented response pipelines
— World Economic Forum Cyber Outlook, 2025When response is fragmented… risk becomes real.

Everyone Has Tools… Few Can Orchestrate Security

SIEMs alert… SOARs automate… LLMs generate playbooks. But unless someone connects them, breaches scale faster than response.89% of organisations now use GenAI in security, only 12% say they’ve integrated it across workflows.
— McKinsey State of Cybersecurity, 2025Tools don’t fail… disconnected defenses do.

AI Agents Detect Fast… But Act Alone

GenAI can flag deepfakes… summarize threat feeds… test adversarial prompts… But your XDR, LLM, and cloud gateway still don’t talk to each other.LLMs see the risk, but without orchestration, the response breaks.Speed without sync… is chaos at the nation-state scale

Real-Time Isn’t a Bonus. It’s Baseline.

When a prompt injection hits your public API… or an AI-generated voice impersonates the CEO… you don’t have hours. You have seconds.79% of security teams say response time is the #1 GenAI challenge
— Deloitte GenAI Threat Report, 2024Linear workflows can’t protect dynamic systems.

The Rise of Full-Stack Cyber Defenders

The new wave of security leaders isn’t just tool users; they’re system orchestrators. They understand LLMs, agent chaining, SOAR scripting, and behavioral risk, all at once.Roles like AI Security Architect, Prompt Injection Tester, and SecOps Automation Engineer are growing 18–24% YoY across top orgs.Tomorrow’s security isn’t a stack of tools; it’s a stack of humans who can wire it all together.

The New Cybersecurity Org Is Smaller, Smarter.. and Self-Healing

Today’s orgs don’t rely on bloated teams or endless ticket queues. They’re powered by a compact unit of generalists backed by LLMs, autonomous agents, anomaly detectors, and auto-remediation loops.One CISO at the top. A handful of orchestrators in the middle.And below it all… systems that defend themselves.This is the rise of the GenAI-native Cyber Defender: a security pro who doesn’t just respond to threats… but redesigns the entire response system.

This Program Doesn’t Just Upskill It Trains GenAI-Native Defenders

The PG Certificate in AI/GenAI Powered Cybersecurity is designed for one urgent mission:To prepare you to become the full-stack, AI-native security professional that modern systems demand. It’s more about orchestrating a layered defense using AI, agents, zero-trust frameworks, and adversarial testing.

About IIT Roorkee

Founded in 1847, IIT Roorkee is one of India’s oldest and most prestigious institutions, with a legacy of academic leadership and technological innovation. As a pioneer in interdisciplinary education, IIT Roorkee has been at the forefront of engineering, data science, AI, and management education.

Its executive education programs are designed to equip working professionals with industry-aligned, future-forward skill sets—combining academic rigor with hands-on learning and strategic thinking.

Dr. Gaurav Nayak

Assistant Professor at the Mehta Family School of Data Science and Artificial Intelligence, IIT Roorkee

Dr. Gaurav Nayak’s work lies at the intersection of cryptography, post-quantum security, and privacy-enhancing technologies. A PhD from IIT Guwahati, he focuses on building secure digital infrastructures that can withstand both traditional and next-gen attacks.

His research spans lightweight encryption protocols, cryptographic algorithms, and secure system design, contributing to journals like Springer and IEEE. At IIT Roorkee, Dr. Nayak helps learners understand how to secure modern systems from the ground up with a strong foundation in both theory and cryptographic practice.

Dr. Raghavendra Rohit

Assistant Professor in the Department of Computer Science and Engineering at IIT Roorkee

Dr. Raghavendra Rohit specializes in the application of machine learning to cybersecurity. He holds a PhD in Computer Science from NIT Surathkal and has worked extensively on adversarial ML, automated threat detection, and intrusion prevention systems.
His research explores how AI can be used not just to detect threats, but to predict and respond to them in real time. At IIT Roorkee, Dr. Rohit blends deep technical expertise with industry relevance, helping professionals master GenAI-driven security operations that scale.

Traditional Digital Marketing vs. AI-Native Cybersecurity at IIT Roorkee

Dimension
Core Philosophy
Curriculum Style
Tool Exposure
GenAI & Prompting
Security Architecture
Threat Simulation
Mentor Access
Capstone Format
Learning Outcome
Mindset Trained
IIT Roorkee: AI-Native Cybersecurity
Engineering zero-trust, AI-secure, and adversarial-resilient pipelines from the ground up
GenAI-first, system-driven — rooted in emerging threat landscapes and active LLM-based threats
Hands-on with 30+ next-gen tools including CyberScreener, ATT&CK Navigator, GPT-based threat scanners
Prompt labs to simulate and attack AI systems, engineer responses, and harden LLM-based workflows
Full-stack architecture integrating GenAI defense, deception tech, automation, and zero-trust enforcement
Build-your-own lab: attack, defend, and iterate in AI-enabled cyber playgrounds
1:1 reviews with AI security experts, FLC mentors, and industry leaders in blue teaming + threat ops
Live security system design + simulation logs presented in a portfolio-ready project
Build adaptive, AI-secure pipelines across detection, prevention, and recovery
Security engineer who thinks like an attacker and defends like an AI-native defender
Traditional Cybersecurity Programs
Teaching tools, protocols, and compliance frameworks
Tool-based and reactive, with outdated case studies
Covers commercial SIEMs, firewalls, and antivirus tools
Rarely touched or only discussed in theory
Perimeter-focused models (firewall, IDS, endpoint)
Static assignments or red-team walkthroughs
Limited guest lectures
Basic report or static dashboard project
Understand tools and terms
Compliance executor or threat responder
Traditional Cybersecurity Programs
IIT Roorkee: AI-Native Cybersecurity
Core Philosophy
Teaching tools, protocols, and compliance frameworks
Engineering zero-trust, AI-secure, and adversarial-resilient pipelines from the ground up
Curriculum Style
Tool-based and reactive, with outdated case studies
GenAI-first, system-driven — rooted in emerging threat landscapes and active LLM-based threats
Tool Exposure
Covers commercial SIEMs, firewalls, and antivirus tools
Hands-on with 30+ next-gen tools including CyberScreener, ATT&CK Navigator, GPT-based threat scanners
GenAI & Prompting
Rarely touched or only discussed in theory
Prompt labs to simulate and attack AI systems, engineer responses, and harden LLM-based workflows
Security Architecture
Perimeter-focused models (firewall, IDS, endpoint)
Full-stack architecture integrating GenAI defense, deception tech, automation, and zero-trust enforcement
Threat Simulation
Static assignments or red-team walkthroughs
Build-your-own lab: attack, defend, and iterate in AI-enabled cyber playgrounds
Mentor Access
Limited guest lectures
1:1 reviews with AI security experts, FLC mentors, and industry leaders in blue teaming + threat ops
Capstone Format
Basic report or static dashboard project
Live security system design + simulation logs presented in a portfolio-ready project
Learning Outcome
Understand tools and terms
Build adaptive, AI-secure pipelines across detection, prevention, and recovery
Mindset Trained
Compliance executor or threat responder
Security engineer who thinks like an attacker and defends like an AI-native defender

This shift isn’t incremental… It’s a complete rewire of how security is built and scaled.

How You Go From Learning to defending with AI.. in Just 9 Months

  • Module 1: Fundamentals of Cybersecurity

    1
    Cybersecurity principles and threat landscape overview
    2
    Key cybersecurity terminologies
    3
    IT/ Networking essentials
    4
    Code of Ethics and Security Controls
    5
    Labs
  • Module 2: Risk Management and Threat Modeling

    6
    Business Continuity
    7
    Risk identification,assessment, response and monitoring
    8
    Threat Modeling approach and process
  • Module 3: Fundamentals of Cybersecurity and Cryptography

    9
    CIA triad
    10
    Symmetric cryptography: Stream ciphers, block ciphers, AES, DES, Chacha
    11
    Asymmetric cryptography: RSA, Diffe-Hellman Key exchange; Digital signatures
    12
    Key management protocols
    13
    Certificate generations and certificate authorities in India
    14
    Hash functions: MD4, MD5, SHA-1, SHA-2, SHA3, Ascon
    15
    Post quantum cryptographic algorithms
    16
    Specialized cryptography government organizations in India
    17
    Specialized cryptography government organizations in India
  • Module 4: Understanding Cryptographic Attacks and Protocols

    13
    SSH, TLS1.3, VPN
    14
    4G, 5G Protocols, RFID, Sensor Protocols
    15
    Whatsapp, Signal End to End Encryption Systems'
    16
    Security in meeting apps: Google Meet, MS Teams, Zoom, etc.
    17
    Labs
  • Module 5: Cryptographic Applications, Regulatory Bodies and Frameworks

    18
    Blockchain
    19
    Differential privacy
    20
    Federated Learning
    21
    NIST, ISP, IRTF
  • Module 6: AI Fundamentals

    22
    Foundations of Machine Learning
    23
    Foundations of Deep Learning
    24
    Labs
  • Module 7: GenAI for Cybersecurity

    25
    Previous GenAI Methods
    26
    Vision GenAI (Diffusion Models)
    27
    Vision and Language Models
    28
    Labs
  • Module 8: Security Operations with AI

    29
    Role of a SOC Analyst
    30
    SIEM and SOAR platforms with AI capabilities
    31
    Monitoring, analysing and tuning AI generated security alerts
    32
    Using AI models for anomaly and malware detection
    33
    AI Powered endpoint security and network intrusion detection
    34
    Labs
  • Module 9: Threat Intelligence and Security Data Analysis

    35
    Cyber threat intelligence lifecycle and data sources
    36
    Phishing analysis
    37
    Applying NLP to analyse threat reports
    38
    Data preparation and labeling security datasets for AI/ML training
    39
    Labs
  • Module 10: Cloud Security and AI

    40
    Cloud environment basics
    41
    Cloud security fundamentals
    42
    AI Driven cloud detection and misconfiguration monitoring
    43
    Automated cloud response and remediation techniques
    44
    Labs
  • Module 11: Automation and Orchestration in Security

    45
    Cybersecurity workflow automation concepts
    46
    Understanding container/ orchestration and implementation of zero trust
    47
    Use of SOAR tools for security automation and orchestration
    48
    Script development for automated indident response
    49
    Labs
  • Module 12: Ethical Hacking, Security Testing and AI Evaluation

    50
    Ethical hacking basics: pricniples, rules of engagement and Reconnaissance Techniques
    51
    Phishing, Social Engineering and Malware
    52
    Malware analysis using AI driven tools
    53
    Red team vs blue team exercises
    54
    Generating and defending against adversarial AI attacks on cybersecurity models
    55
    Evaluating efficacy and limitations of AI cyber technologies
    56
    Labs (including evaluating efficacy and limitation of AI cyber technologies)
  • Module 13: Penetration Testing and Vulnerability Assessment

    57
    Penetration testing fundamentals (automated and AI-Assisted)
    58
    Firewall  evasion, Web server and web application security
  • Module 14: AI Governance, Compliance and Ethics

    59
    Ethical concerns in AI and cybersecurity (bias, transparency, privacy)
    60
    Compliance frameworks for AI security (GDPR, NIST, HIPAA)
    61
    Designing security policies incorporating AI governance

By the End, You’ll Be Able to Do All This

Foundations of AI-Native Cyber Defense

Understand how GenAI, autonomous agents, and adversarial models are reshaping the cyber threat landscape—and how to defend against them.

Prompt Injection & Adversarial Testing

Simulate and defend against LLM-specific attacks using prompt engineering, jailbreaking techniques, and adversarial payload testing.

Security Automation with Python & SOAR

Build incident response workflows using Python, automate triage and remediation across SIEM, SOAR, and XDR platforms.

Cloud Security & Zero-Trust Architecture

Secure AWS, Azure, and GCP environments against misconfigurations and identity-based exploits using containerization and zero-trust principles.

AI Threat Intelligence & Risk Modeling

Analyze phishing, spoofing, and threat intel using NLP and GenAI models. Build dashboards and predictive models for breach risk.

Ethics, Governance & Compliance in AI Security

Design responsible AI defense strategies aligned with NIST AI RMF, GDPR, HIPAA, and India’s DPD Act.

Ethics & Governance in AI Marketing

Apply AI responsibly — with clarity on privacy, transparency, and bias

Capstone: Real-World Threat Simulation

Execute an AI-powered attack-defense simulation, from red teaming to real-time response design, based on live industry threat scenarios.

Inside One of India’s Most Advanced AI Clinics

Welcome to the AI Clinic

Where marketers stop watching AI demos… and start building with it.

Solve Real Threat Scenarios

Defend against GenAI-authored phishing, test adversarial prompts, and automate red teaming with live enterprise data.

Build Your Security Co-Pilot (FPA)

Futurense Project Assistant helps you simulate attacks, debug automations, and launch secure workflows.

Orchestrate the AI-Powered SOC Stack

Master 40+ tools across red teaming, cloud hardening, SIEM/SOAR, and GenAI defense.

Dive Deeper Than the Curriculum

Join live clinics on prompt injection testing, jailbreaking defenses, SOC tuning, and attack path modeling.

Ship Response Workflows Weekly

Build, simulate, and test using real dashboards, alerts, and exploit data.

Get Expert Feedback

Projects are reviewed by mentors from Gallagher, Amazon, Lenskart, and others hiring in AI-cybersecurity roles.

Break stuff & learn fast

Push systems till they break in GPU-powered labs where failure is the fastest teacher.

Build Your AI Copilot (FPA)

The Futurense Project Assistant helps you debug, prompt smarter, and connect your AI stack

Deep Dives Beyond the Syllabus

Join 6 expert-led workshops on CRMs, dashboards, A/B testing, and funnel automation

Get Feedback From the Frontlines

Your builds are reviewed by leaders from Google, AmEx, Lenskart, and the Futurense
leadership council

Master the GenAI-Powered MarTech Stack

Get hands-on with 30+ tools across copy, design, CRM, analytics, automation, and more

Ship Live Campaigns Every Week

Go from whiteboard to working prototypes using real data and tools

Break Stuff… Learn Fast

Experiment in GPU-powered labs where failure is part of the brief

Built for People Like You?

Educational Qualification

Bachelor’s degree in Computer Science, IT, Engineering, Mathematics, or a related field (Minimum 50%)

Work Experience

1+ year of technical or operations experience preferred

Freshers

Exceptional freshers with strong fundamentals may be considered via screening

Prior Knowledge

Familiarity with programming (Python preferred), networking, and systems basics

Selection Process

Short, 2-hour IIT Gateway Test covering logical reasoning, basic tech, and coding

IIT Gateway Test Details

All applicants must clear a readiness IIT Gateway Test to qualify for the program. This test ensures each learner meets IIT Roorkee’s academic and technical standards.

What You’ll Be Tested On
Important Guidelines

1. Logical Reasoning

2. Quantitative Aptitude

3. Digital & AI Awareness

4. Applied Scenario (Situational Judgment)

₹Give the range (+ EMI interest, if any)

What You’ll Be Tested On

  • Logical Reasoning

  • Basic coding (Python or Java)

  • Cybersecurity fundamentals

  • Scenario-based thinking

Important Guidelines

Format
  • 2-hour

  • Non-invasive online test with coding + MCQs

  • No prior experience in cybersecurity required.

New to Cybersecurity or AI?

Weʼve Got You Covered.
Kickstart your journey with the Futurense Bridge Course, a 6-week industry-aligned bootcamp included free with your enrollment.

Key Highlights

  • 60+ hours of GenAI-first cybersecurity learning

  • Weekly live sessions with AI + cybersecurity mentors

  • Python scripting for incident response and threat automation

  • Foundations in probability, statistics, and risk-based modeling

  • Intro to AI/GenAI with real SOC use-case mapping

  • Prepares you to hit the ground running from Day 1

Worth ₹99,000 — included free with your enrollment.

What You’ll Learn in 6 Weeks

Week 1

GenAI & Cybersecurity Basics

Understand GenAI threats and practice CVE patching using ChatGPT.

Week 2

Prompting for Defense

Use AI prompts to simulate phishing and detect breaches.

Week 3

Python for Cyber Ops

Build basic Python scripts for log parsing and anomaly detection.

Week 4

Math for AI & Security

Learn probability, logic, and graph theory for threat modeling.

Week 5

AI & GenAI Fundamentals

Grasp how LLMs, pipelines, and hallucinations impact cybersecurity.

Week 6

Capstone Simulation

Deploy a GenAI-powered SOC response using Python.

Roles Thatʼll Be
Looking for You

Role Now
IT Support / Helpdesk
Salary Today
3 LPA
Role Upgraded
AI-Augmented SOC Analyst
Earning Potential
6-13 LPA
Top Recruiters
GoogleMicrosoft_logoamazonDeloitte.svgInfosys_logo
Role Now
QA Tester / Junior Dev
Salary Today
4 LPA
Role Upgraded
GenAI Threat Analyst
Earning Potential
7-15 LPA
Top Recruiters
ABBmahindra and mahindrabhel logofanucl&t logo
Role Now
Cloud Ops / Sys Admin
Salary Today
4.5 LPA
Role Upgraded
Cloud Security Associate
Earning Potential
6.5 - 12 LPA
Top Recruiters
Google logonvidiafluturaDetect Technologies
Role Now
SOC Support Engineer
Salary Today
3.6 LPA
Role Upgraded
Security Automation Engineer
Earning Potential
8-14 LPA
Top Recruiters
Tata SteelReliance IndustriesAltizonGrene Robotics
Role Now
Entry-Level Security Analyst
Salary Today
4.2 LPA
Role Upgraded
Prompt Injection Tester
Earning Potential
10 - 18 LPA
Top Recruiters
Tata SteelReliance IndustriesAltizonGrene Robotics
Role Now
Junior Python Dev
Salary Today
5 LPA
Role Upgraded
LLM Security Specialist
Earning Potential
10 - 20 LPA
Top Recruiters
Tata SteelReliance IndustriesAltizonGrene Robotics
Role Now
Cybersecurity Intern
Salary Today
3 LPA
Role Upgraded
AI Red Team Lead
Earning Potential
16 - 22 LPA
Top Recruiters
Tata SteelReliance IndustriesAltizonGrene Robotics
Role Now
Cloud Admin / DevOps
Salary Today
5 LPA
Role Upgraded
Zero Trust Architect
Earning Potential
12 - 22 LPA
Top Recruiters
Tata SteelReliance IndustriesAltizonGrene Robotics
Role Now
Python Developer
Salary Today
6 LPA
Role Upgraded
SOAR Workflow Engineer
Earning Potential
12 - 18 LPA
Top Recruiters
Tata SteelReliance IndustriesAltizonGrene Robotics
Role Now
Risk Analyst / IT Ops
Salary Today
4.8 LPA
Role Upgraded
Compliance Automation Engineer
Earning Potential
10 - 16 LPA
Top Recruiters
Tata SteelReliance IndustriesAltizonGrene Robotics
Role Now
Risk Analyst
Salary Today
5.5 LPA
Role Upgraded
GenAI Governance Associate
Earning Potential
10 - 16 LPA
Top Recruiters
Tata SteelReliance IndustriesAltizonGrene Robotics
Role Now
Functional Analyst
Salary Today
5 LPA
Role Upgraded
Security Data Analyst
Earning Potential
6 - 10 LPA
Top Recruiters
Tata SteelReliance IndustriesAltizonGrene Robotics
Role Now
Audit / GRC Support
Salary Today
4 LPA
Role Upgraded
DPDP + NIST Compliance Analyst
Earning Potential
8 - 14 LPA
Top Recruiters
Tata SteelReliance IndustriesAltizonGrene Robotics
Role Now
Tech Ops or QA
Salary Today
3.8 LPA
Role Upgraded
AI Security Architect
Earning Potential
18 - 30 LPA
Top Recruiters
Tata SteelReliance IndustriesAltizonGrene Robotics
Role Now
Support Engineer
Salary Today
4.5 LPA
Role Upgraded
Cross-Domain SOC Strategist
Earning Potential
15 - 22 LPA
Top Recruiters
Tata SteelReliance IndustriesAltizonGrene Robotics

Your Path to Becoming the Cybersecurity Expert that Every System Needs

1

Submit Your Application

Begin by filling out the online application form.

2

Application Review and Eligibility Criteria Approval

Ensure your profile meets the required eligibility criteria

3

Appear for the Pre-Screening IIT Gateway Test

Take a 2-hour, non-invasive IIT Gateway Test covering tech, logic, and cybersecurity basics, including MCQs and coding.

4

Pay the Application Processing Fee

Secure your spot with a token amount of ₹5,000, fully adjustable against your total program fee.

5

Receive Your Offer Letter

If shortlisted, you’ll receive an official offer letter from Futurense confirming your admission into the program.

6

Complete Your Full Payment

Choose from flexible payment options or explore financing solutions to finalize your enrollment.

7

Begin the Futurense Cybersecurity Bridge Course

Access a fully-sponsored prep module built for non-cyber professionals, covering GenAI basics, prompt engineering, ethical AI, and real-world SOC use-cases.

8

Start Your IIT Roorkee PG Certificate Journey

Pursue the PG Certificate in AI/GenAI Powered Cybersecurity program led by IIT Roorkee faculty and industry experts.

Fee Structure

Upfront Payment
EMI Plan (via NBFC Partners)
Application Token
₹5000 (non-refundable, adjustable)
₹5000 (non-refundable, adjustable)
Bridge Course Fee
₹99,000 (waived off with enrollment )
₹99,000 (waived off with enrollment)
Certification Fee
₹1,40,000 + GST (18%)
₹1,40,000 + GST (18%) (via 3, 6, 9-month EMIs)
Campus Immersion Fee
₹10,000 (optional)
₹10,000 (optional)
Total (Including GST)
₹165,200
₹165,200

1. A non-refundable application deposit of ₹5,000 will be adjusted in the total fee. Program fees are refundable only if the student withdraws before the start date. No refunds will be made after the program begins.

2. An additional ₹10,000 will be applicable if you opt for the Campus Immersion (optional).

EMI Plans

3, 6, 9 & 12 months available

NBFC Partners

Zero-cost EMI for eligible candidates

Payment Modes

UPI, Netbanking, Credit/Debit Cards

GST

18% applicable on Certification Fee

ashish dabas
Ashish Dabas
Vice
President
nitin srivastava
Nitin Srivastava
Data & Analytics
India Lead
anupam gupta
Anupam Gupta
VP Enterprise Data &
Analytics
muthumari s
Muthumari S
Global Head of Data &
AI Studio
anand das
Anand Das
Chief digital & AI Officer: Engineering
a v rahul
A V Rahul
Director,
Analytics
madhu hosadurga
Madhu Hosadurga
Global Vice President,
Enterprise AI
aditya khandekar
Aditya Khandekar
President
pankaj srivastava
Pankaj Srivastava
Partner
satyam mohanty
Satyakam Mohanty
Founder & Managing
Partner
sharmistha chaterjee
Sharmistha Chaterjee
Vice President - Data and AI Shared Capabilities
anirban nandi
Anirban Nandi
Head of AI Products & Analytics (Vice President)
monica s pirgal
Monica S Pirgal
Managing Director &Site head - Board member
sumon mal
Sumon Mal
Head of
Engineering
pankaj rai
Pankaj Rai
Group Chief Data and
Analytics Officer
vishal nagpal
Vishal Nagpal
Data Science and
Analytics Leader
Tushar sahu
Tushar Sahu
Director
Engineering
Ishu jain
Ishu Jain
Head of
Analytics
kaushik das
Kaushik Das
Managing
Director
shrisha ray
Shrisha Ray
Director of
Engineering
divesh singla
Divesh Singla
Head  APAC & Managing Director India & Philippines
Ruchika singh
Ruchika Singh
Director , Data Science
& Insights
arvind balasundaram
Arvind Balasundram
Executive Director, Commercial Insights & Analytics
Indrani goswami
Indrani Goswami
Director of
Analytics
Saurabh kumar
Saurabh Kumar
Director - Data
Engineering
saurabh agarwal
Saurabh Agarwal
Chief Executive
Officer
supriya dhanda
Supria Dhanda
Co-Founder & Managing
Partner
ankit mogra
Ankit Mogra
Director - BI &
Analytics
srini oduru
Srini Oduru
Head of IT Delivery and Operations
alok tiwari
Alok Tiwari
Vice President -
Data
akshay kumar
Akshay Kumar
Research & Analytics
Leader
deepa mahesh
Deepa Mahesh
Head of Strategy & Operations, Board Member
swati jain
Swati Jain
Partner - Digital, AI &
Analytics
krithika muthukrishnan
Krithika Muthukrishnan
Chief Data Science
Officer
tushar chahal
Tushar Chahal
Chief Technology
Officer
sulabh jain
Sulabh Jain
Chief Analytics
Officer
aneel kumar
Aneel kumar
Global Chapter Leader - ICSS, DD&T
arpit agarwal
Arpit Agarwal
Head of Data Science and Analytics
bhairav m
Bhairav M
Senior Manager Data Science and Product Management
saurabh agarwal
Saurabh Agarwal
Chief Executive
Officer
supriya dhanda
Supria Dhanda
Co-Founder & Managing
Partner
ankit mogra
Ankit Mogra
Director - BI &
Analytics
pankaj rai
Pankaj Rai
Group Chief Data and
Analytics Officer
Tushar sahu
Tushar Sahu
Director
Engineering
vishal nagpal
Vishal Nagpal
Data Science and
Analytics Leader
Ishu jain
Ishu Jain
Head of
Analytics
kaushik das
Kaushik Das
Managing
Director
shrisha ray
Shrisha Ray
Director of
Engineering
divesh singla
Divesh Singla
Head  APAC & Managing Director India & Philippines
Ruchika singh
Ruchika Singh
Director , Data Science
& Insights
arvind balasundaram
Arvind Balasundram
Executive Director, Commercial Insights & Analytics
Indrani goswami
Indrani Goswami
Director of
Analytics
Saurabh kumar
Saurabh Kumar
Director - Data
Engineering
saurabh agarwal
Saurabh Agarwal
Chief Executive
Officer
supriya dhanda
Supria Dhanda
Co-Founder & Managing
Partner
ankit mogra
Ankit Mogra
Director - BI &
Analytics
ashish dabas
Ashish Dabas
Vice
President
nitin srivastava
Nitin Srivastava
Data & Analytics
India Lead
anupam gupta
Anupam Gupta
VP Enterprise Data and
Analytics
muthumari s
Muthumari S
Global Head of Data &
AI Studio
anand das
Anand Das
Chief digital & AI Officer: Engineering
aditya khandekar
Aditya Khandekar
President
satyam mohanty
Satyakam Mohanty
Founder & Managing
Partner
sharmistha chaterjee
Sharmistha Chaterjee
Vice President - Data and AI Shared Capabilities
anirban nandi
Anirban Nandi
Head of AI Products & Analytics (Vice President)
monica s pirgal
Monica S Pirgal
Managing Director &Site head - Board member
sumon mal
Sumon Mal
Head of
Engineering
srini oduru
Srini Oduru
Head of IT Delivery and Operations
alok tiwari
Alok Tiwari
Vice President -
Data
akshay kumar
Akshay Kumar
Research & Analytics
Leader
deepa mahesh
Deepa Mahesh
Head of Strategy & Operations, Board Member
swati jain
Swati Jain
Partner - Digital, AI &
Analytics
krithika muthukrishnan
Krithika Muthukrishnan
Chief Data Science
Officer
tushar chahal
Tushar Chahal
Chief Technology
Officer
sulabh jain
Sulabh Jain
Chief Analytics
Officer
aneel kumar
Aneel kumar
Global Chapter Leader - ICSS, DD&T
arpit agarwal
Arpit Agarwal
Head of Data Science and Analytics
bhairav m
Bhairav M
Senior Manager Data Science and Product Management
a v rahul
A V Rahul
Director,
Analytics
madhu hosadurga
Madhu Hosadurga
Global Vice President,
Enterprise AI

Ready to Redesign Cyber Defense for the GenAI Era?

Whether you're breaking in or leveling up… if you're ready to build secure, intelligent systems that defend in real-time, this is your moment.

Frequesntly Asked Questions

  • What is the name of the certificate program, and which IIT offers it?

    The program is called offered by the PG Certificate in AI/GenAI Powered Cybersecurity, offered by the Continuing Education Centre (CEC), IIT Roorkee.

  • What qualifications do I need to apply?

    The duration is 9 months(126+ hours)

  • What makes this program different?

    • Designed for the GenAI era, it covers:
    • AI-authored malware
    • SOC automation
    • LLM security
    • Hands-on tools & real-world simulations
  • How can I apply to the Advanced PG Certification in AI Engineering on Cloud and AIOps?

  • When will the application process to the program start?

    The application process for CEC, IIT Roorkee’s PG Certificate Program has already begun.

  • What is the program's fee, and what financing options are available?

    • The program fee is ₹1.40 lakhs + 18% GST.
    • ₹5,000 token amount at application (adjusted against total fee)
    • Campus immersion (optional):
  • Is there a selection process?

    Yes. Admission to the program requires clearing a pre-screening exam and meeting the eligibility criteria

  • What are the documents to be submitted for application?

    While the exact list is not provided for this program, similar IIT Roorkee programs typically require:

    • Application form
    • ID proof
    • Educational certificates (Class 10th, 12th, Graduation)
    • Work experience certificates (if applicable)
    • Passport-size photograph

    Note: The same may apply unless otherwise stated

  • Will there be any pre-screen exams for enrolling in the Program?

    Yes. Clearing the pre-screen exam is mandatory to be eligible for admission

  • Should I have experience in coding to qualify the pre-screening exam?

    No. Programming knowledge is not mandatory, thought having programming knowledge is beneficial. Futurense provides a Bridge Course covering Python basics, prompt engineering, and AI tool usage to help bridge the gap before the actual course commencement

  • How is the teaching format structured for this hybrid program?

    • Live online weekend classes: 3 hours each on Saturday and Sunday. (Final schedule will be shared based on faculty availability and discretion)
    • Includes labs, hands-on tools, real-world cybersecurity exercises.
    • 2–3 days of dedicated CISSP exam preparation workshops, conducted online by industry mentors
    • Optional 3-day campus immersion at IIT Roorkee.
    • Curriculum is , e aligned with CISSP and CEH competencies quipping learners for global certifications.
  • Why is this program considered unique compared to other certifications in AI?

    It is designed specifically for the GenAI era and covers AI-authored malware, SOC automation, LLM security, cloud misconfigurations, and prompt injection. It combines cybersecurity, AI, and hands-on real-world tools using a role-mapped, project-driven approach.

  • What if I can t take 2-day of leave at a stretch from my office for the Campus  Immersion?

    Campus immersion is optional, so it is not mandatory to attend.

  • Will there be any additional cost for attending the optional 2-day IIT Roorkee campus immersion?

    Yes. The campus immersion cost is ₹10,000 + taxes.

  • Will hostel accommodation be provided for outstation candidates during immersion?

    Hostel accommodation may be provided either on campus or off campus, depending on the availability of facilities.

  • What are some practical projects or hands-on learning outcomes included in the course?

    Projects include:

    • AI-augmented SOC simulation
    • Prompt engineering for phishing defense
    • Automated cloud misconfig detection
    • Malware analysis using GenAI tools
    • AI governance policy creation
  • What are the key modules in the program, starting from traditional AI to building multi-agent systems?

    Key modules include:

    • Fundamentals of Cybersecurity

    • Cryptography & Protocols
    • AI & GenAI for Cybersecurity
    • SOC Automation
    • Cloud Security
    • Threat Intelligence
    • Ethical Hacking & AI Attacks
    • AI Governance & Compliance
    • Capstone Project
  • What is the significance of teaching multi-agent systems and agent collaboration in the program?

    Multi-agent systems are essential for:

    • Autonomous threat detection
    • Red teaming
    • Running GenAI-based simulations
    • Executing real-time audits across cloud and endpoints
  • Who is the program director, and why is their expertise significant?

    Dr. Gaurav Nayak (IIT Roorkee)

    Expert in GenAI, video understanding, vision-language models

  • How do industry leaders and the Futurense Leadership Council (FLC) contribute to the program?

    Industry experts from Google, Microsoft, Infosys, Lenskart, AmEx, and more teach live sessions.

    The Futurense Leadership Council offers:

    • Masterclasses
    • Mentorship
    • Real-world MarTech case walkthroughs

    50% of sessions are taught by industry faculty, ensuring applied learning

  • What areas of AI does this program cover, and how does it integrate traditional AI, generative AI, and agentic AI?

    The program covers:

    • Traditional AI: Marketing analytics, automation, ML-based personalization
    • Generative AI: Tools like ChatGPT, Jasper, Claude, Gemini for content, campaigns, and strategy
    • Agentic AI: Frameworks for building autonomous, AI-driven marketing journeys and user experiences
  • What tools and platforms are covered in this program?

    • GenAI: GPT 4, Claude 3, LangChain, AutoGPT, Guardrails, OpenRouter
    • Cybersecurity: Hack The Box, Wireshark, Splunk Sim, ELK Stack, Shodan
    • Cryptography: OpenSSL, GnuPG, PyCryptodome, TLSCertGen.io
    • Dev Tools: VSCode, GitHub Copilot, Replit
    • PromptOps: Promptfoo, PromptArmor, ChatGPT, PromptInject
  • Why is agentic AI called the next big thing in AI technology?

    Agentic AI allows systems to make decisions, learn from feedback, and autonomously execute tasks, which is critical for in cybersecurity real-time security, dynamic response, and continuous learningoperations.

  • What makes this certification program particularly suitable for engineers and tech professionals?

    While designed primarily for marketers, it is also suitable for tech professionals as it includes:

    • Full-stack security operations.
    • Prompt engineering.
    • Cloud and container security.
    • System-level automation using Python, SOAR, and SIEM tools
  • How does the program enable participants to specialize in their specific engineering domains?

    This program is primarily marketing-focused, but enables specialization by:

    • Teaching system design and full-stack MarTech strategy
    • Providing domain-agnostic tools to customize for e-commerce, edtech, fintech, SaaS, and more
    • Allowing engineers to pivot into growth, CRM, product, or AI marketing roles
  • What is the difference between traditional AI, generative AI, and agentic AI?

    • Traditional AI: Relies on structured data for specific tasks (e.g., rule-based automation)
    • Generative AI: Uses LLMs to create content like text, images, and videos
    • Agentic AI: Builds autonomous systems capable of learning, decision-making, and task execution
  • How are agentic AI systems used across industries like healthcare, manufacturing, and telecom?

    • Healthcare: Automates diagnosis and treatment recommendations
    • Manufacturing: Enables process optimization and predictive maintenance
    • Telecom: Powers AI-driven customer support and network optimization
  • What job roles can participants expect to pursue after completing this program?

    Roles include:

    • AI Marketing Strategist
    • LLM Risk Evaluator
    • AI Cyber Governance Analyst
    • SOC Analyst
    • Cloud Security Associate
    • GenAI Red Teamer
    • Threat Intelligence Specialist
    • Security Automation Engineer
  • How does having skills in generative AI and agentic AI impact salary and job prospects?

    Professionals with GenAI and Agentic AI skills see:

    • 40–60% salary hikes
    • Entry-level packages from ₹6–12 LPA
    • Roles paying up to in metro cities and GCCs
  • How does this program align with the rapid adoption of generative AI by companies like Infosys, TCS, and startups?

    • Companies are establishing GenAI labs and AI agents in both metros and tier-2 cities
    • The program prepares professionals to meet rising demand for AI-literate marketers in sectors like e-commerce, SaaS, fintech, and edtech
  • Why will this certification future-proof their careers in a rapidly evolving market?

    • Designed from scratch for GenAI-native cybersecurity
    • Includes hands-on AI defense, compliance, and red-teaming
    • Equips learners to not build, just operate, next-gen security systems
  • What is the Payment Schedule and Process?

    • Full fee payment of ₹1.40 lakhs + GST must be completed within 5 days of receiving the offer letter
    • A non-refundable application deposit of ₹5,000 is required at the time of submission (adjusted in final fee)
    • Loan options are also available with a 5 10% subvention charge to the eligible applicants.
  • Can I self-fund this program?

    Yes. If you or your family are funding the program, you can choose to self-fund either partially or in full.

  • Does Futurense help with loans?

    Yes. Futurense has partnered with various financial institutes to offer financial assistance

  • What is the interest rate on the loans?

    Interest rates vary depending on the repayment plan and financial partner. Rates are described as reasonable and competitive considering the recent rise in unsecured loan rates in India.

  • What are the documents I should keep handy?

    Student's Documents:

    • PAN
    • Aadhar
    • Last 3 months’ bank statements

    Income Documents

    • Last 3 months’ payslips