What Is Cyber Security and Why Does It Matter in 2026?

Cyber security is no longer a niche IT concern — it is a board-level business priority across every industry in India. The 2024 AIIMS ransomware attack, repeated breaches at major Indian banks, and daily phishing campaigns targeting Indian businesses have made one thing clear: every organisation needs trained security professionals who can identify vulnerabilities, respond to incidents and build defences that actually work. India currently faces a shortage of over 800,000 cybersecurity professionals — a gap that is growing faster than universities can fill it.

🎓 Next Batch Starting Soon — Limited Seats

Free demo class available • EMI facility available • 100% placement support

Book Free Demo →

What makes Aapvex's Cyber Security programme genuinely different from most courses in Pune is the balance between offensive and defensive skills. Many courses teach theory and tool names without giving students real attack-and-defend experience. Our programme puts you in a dedicated cybersecurity lab environment where you run actual vulnerability scans, exploit real (deliberately vulnerable) systems, analyse packet captures, hunt through SIEM logs for threats, and write incident response reports — the same workflow you will follow on your first day in a SOC or security engineering role.

The curriculum is structured around the NIST Cybersecurity Framework — Identify, Protect, Detect, Respond, Recover — so you graduate with a mental model of how enterprise security programmes are actually built, not just a collection of unconnected tool skills. Whether you want to become a penetration tester, a SOC analyst, a cloud security engineer or eventually a CISO, this programme gives you the foundation. Our placement network includes IT services firms, banking and financial services institutions, government contractors, healthcare technology companies and cybersecurity consulting firms across Pune, Bangalore, Mumbai, Hyderabad and Delhi-NCR.

Who Should Join This Cyber Security Course?

Prerequisites — What You Need Before Joining

Red Team vs Blue Team — Both Sides Covered

🔴 Red Team — Offensive Security

  • Penetration testing methodology (PTES, OWASP)
  • Reconnaissance — OSINT, Shodan, Maltego
  • Scanning & enumeration — Nmap, Nessus
  • Exploitation — Metasploit, manual exploits
  • Web application attacks — SQLi, XSS, CSRF
  • Post-exploitation — privilege escalation, lateral movement
  • Report writing for VAPT engagements

🔵 Blue Team — Defensive Security

  • SOC operations and alert triage workflow
  • SIEM configuration and rule writing (Splunk)
  • Log analysis — Windows Event Logs, syslog
  • Network traffic analysis — Wireshark, Zeek
  • Incident response — containment, eradication, recovery
  • Threat hunting — IOC analysis, MITRE ATT&CK mapping
  • Vulnerability management and patch prioritisation

Tools & Technologies You Will Master

🐉
Kali Linux
Primary attack platform
💥
Metasploit
Exploitation framework
🗺️
Nmap
Network scanner
🦈
Wireshark
Packet analysis
🕷️
Burp Suite
Web app security
🔴
Nessus
Vulnerability scanner
📊
Splunk SIEM
Security monitoring
🌐
OWASP Tools
Web security testing
☁️
AWS Security
Cloud security labs
🔒
Hashcat / JtR
Password auditing
🕵️
Maltego
OSINT & recon
🐍
Python
Security scripting

Industry Certifications This Course Prepares You For

🏅

CompTIA Security+

Global baseline cert for security professionals

⚔️

CEH — Ethical Hacker

EC-Council certification for pen testers

💀

OSCP

Hands-on offensive security gold standard

🛡️

CompTIA CySA+

SOC and threat analysis certification

☁️

AWS Security Specialty

Cloud security practitioner cert

📋

ISO 27001 LA

Information security management system

Detailed Course Curriculum — 8 Comprehensive Modules

The programme is structured across 8 modules, each building on the previous. You move from networking foundations through to advanced penetration testing and cloud security. Every module has dedicated lab sessions where you apply what you have learned in a safe, isolated environment designed to mirror real enterprise infrastructure.

1
Networking & Security Foundations — Protocols, Architecture & Threat Landscape
Before attacking or defending any system, you need a thorough understanding of how those systems communicate. This module builds the networking foundation that every cybersecurity skill depends on — and then introduces the threat landscape that makes security work necessary.

TCP/IP is covered in depth: the four-layer model, how packets travel from source to destination, the role of ARP, ICMP, DNS, DHCP and the other protocols that underpin all network communication. Understanding these protocols is essential because most network attacks exploit weaknesses in how they work. Subnetting and CIDR notation are practised until second nature — a skill that separates junior candidates from credible security engineers in every interview. Routing, switching, VLANs, NAT and firewall concepts are covered with hands-on Cisco Packet Tracer labs. The OSI model is not just memorised — each layer's role in real attacks (ARP spoofing at Layer 2, IP spoofing at Layer 3, session hijacking at Layer 5) is demonstrated concretely. The threat landscape is introduced through real-world case studies: how the AIIMS ransomware attack unfolded, how the SolarWinds supply chain attack worked, how phishing campaigns successfully compromise large organisations. The MITRE ATT&CK framework is introduced as the professional vocabulary for describing attacker behaviour — students learn to map real attacks to specific ATT&CK tactics and techniques.
TCP/IPOSI ModelDNS & DHCPFirewalls & VLANsMITRE ATT\&CKThreat LandscapeNetwork Protocols
2
Reconnaissance & Information Gathering — OSINT, Scanning & Enumeration
Every professional penetration test begins before a single packet is sent — with open-source intelligence gathering that maps an organisation's digital footprint from publicly available sources. This module covers the full reconnaissance workflow that attackers (and ethical hackers) use to understand their target before launching any active techniques.

Passive reconnaissance using OSINT tools is covered in practical depth: Google dorking to find exposed sensitive files and login pages, Shodan and Censys to discover internet-facing infrastructure, Maltego for visualising relationships between domains, IP ranges, email addresses and employees, and WHOIS and certificate transparency logs for mapping an organisation's infrastructure. The difference between passive reconnaissance (no direct contact with the target) and active reconnaissance (direct interaction) is taught with real examples of when each approach is appropriate. Active scanning with Nmap is covered exhaustively — every scan type (SYN scan, UDP scan, version detection, OS fingerprinting, script scanning), the stealth trade-offs of each technique, and how to interpret scan results to identify potential attack vectors. Enumeration of discovered services is practised hands-on: SMB enumeration with enum4linux, LDAP enumeration, SMTP enumeration, and web application directory bruteforcing with Gobuster and Dirsearch. Students document their findings in a reconnaissance report that mirrors the deliverable from a real VAPT engagement.
OSINTGoogle DorkingShodanMaltegoNmapPort ScanningService EnumerationVAPT Recon
3
Vulnerability Assessment — Scanning, Analysis & Risk Prioritisation
Finding vulnerabilities before attackers do is the core value proposition of any penetration tester or security engineer. This module teaches the systematic process of vulnerability assessment — the structured identification, classification and prioritisation of security weaknesses across infrastructure, applications and configurations.

Nessus Essentials is deployed for authenticated and unauthenticated vulnerability scans against the course lab environment. Students learn to configure scan policies, interpret scan results, filter false positives, and understand the difference between a Critical CVSS 9.8 vulnerability that needs immediate attention and a Medium CVSS 5.0 finding that can wait for the next patch cycle. The Common Vulnerability Scoring System (CVSS v3.1) is covered in detail — understanding how the base score, temporal score and environmental score are calculated, and how to use CVSS alongside business context to make intelligent prioritisation decisions. CVE and NVD databases are used daily in this module — students practice looking up vulnerability details, understanding proof-of-concept exploit availability, and checking whether patches or mitigations exist. OpenVAS is also introduced as the open-source alternative to Nessus. The module culminates in a vulnerability assessment report written to professional standards — the format expected in real VAPT deliverables for enterprise clients.
NessusOpenVASCVECVSS v3.1Vulnerability ScanningRisk PrioritisationVAPT Report
4
Exploitation & Penetration Testing — Metasploit, Manual Exploits & Post-Exploitation
This is where theory becomes reality. With a list of confirmed vulnerabilities from the previous module, this module covers the systematic exploitation workflow used in professional penetration testing engagements — from selecting the right exploit to establishing persistence and documenting findings.

Metasploit Framework is covered comprehensively: the module structure (exploits, payloads, auxiliaries, post-exploitation modules), msfconsole navigation, searching for exploits by CVE or service name, configuring exploit options, staged vs stageless payloads, Meterpreter shell capabilities and the full post-exploitation workflow. Manual exploitation is emphasised alongside Metasploit — because real OSCP exams and real engagements require understanding what an exploit actually does, not just running modules. Buffer overflow concepts are introduced with a practical exercise exploiting a deliberately vulnerable service. Privilege escalation techniques are covered for both Linux (SUID binaries, sudo misconfigurations, writable cron jobs, kernel exploits) and Windows (token impersonation, unquoted service paths, AlwaysInstallElevated, DLL hijacking). Lateral movement concepts — pass-the-hash, pass-the-ticket, credential dumping with Mimikatz — are demonstrated in the lab environment. The entire module is conducted on deliberately vulnerable machines: Metasploitable, DVWA, VulnHub machines and HackTheBox-style environments. Clean, professional penetration test report writing is practised for every lab exercise.
MetasploitMeterpreterPrivilege EscalationBuffer OverflowLateral MovementMimikatzPost-Exploitation
5
Web Application Security — OWASP Top 10, Burp Suite & API Security
Web applications are the most common attack surface in modern organisations — and web application security testing is one of the most in-demand skills in the entire cybersecurity field. This module covers the OWASP Top 10 vulnerabilities in exhaustive hands-on depth, using Burp Suite Professional as the primary testing tool.

SQL Injection is covered beyond the basic single-quote test: time-based blind SQLi, error-based SQLi, second-order injection, and using sqlmap for automated exploitation — alongside manual techniques for the exam and interview scenarios where automation is not sufficient. Cross-Site Scripting (XSS) is covered in three forms: reflected, stored and DOM-based — with exercises on DVWA, WebGoat and real-world-mirroring applications. Cross-Site Request Forgery (CSRF), Insecure Direct Object Reference (IDOR), Security Misconfiguration, Broken Authentication, Sensitive Data Exposure, XXE injection, and Server-Side Request Forgery (SSRF) are all covered with live exploitation exercises. Burp Suite is used throughout — intercepting and modifying requests, using the Repeater for manual testing, Intruder for fuzzing and credential attacks, and the Scanner for automated vulnerability discovery. API security testing is covered as its own dedicated section, addressing the OWASP API Security Top 10 — because modern applications are largely API-driven and API vulnerabilities are increasingly the most critical attack vectors.
OWASP Top 10SQL InjectionXSSCSRFSSRFBurp SuiteAPI SecurityDVWA
6
SOC Operations & SIEM — Splunk, Alert Triage & Incident Response
While Modules 2–5 cover the offensive Red Team perspective, this module and the next focus on the defensive Blue Team skills that represent the majority of corporate cybersecurity job openings. The Security Operations Centre is where most entry-level cybersecurity professionals in India begin their careers — and this module teaches you to work effectively in one.

The SOC workflow is covered in practical detail: how alerts are generated from SIEM rules, how Level 1 analysts triage alerts (true positive vs false positive determination), when and how to escalate to Level 2, how investigations are tracked in ticketing systems, and how incident documentation is maintained. Splunk SIEM is the primary platform — students install Splunk in the lab, ingest Windows Event Logs, Linux syslog, firewall logs and web server logs, and write detection rules using Splunk Search Processing Language (SPL). Real attack scenarios are replayed in the lab environment (brute force login attempts, lateral movement events, data exfiltration behaviour) and students practice identifying them from log data alone — building the pattern recognition skills that experienced SOC analysts develop over months of real-world exposure. The NIST Incident Response lifecycle is covered in depth: Preparation, Identification, Containment, Eradication, Recovery and Lessons Learned. Threat intelligence feeds, IOC management and the MITRE ATT&CK framework are used throughout as the analytical scaffolding for alert interpretation.
Splunk SPLSIEMSOC AnalystIncident ResponseAlert TriageMITRE ATT\&CKLog AnalysisNIST IR
7
Cloud Security — AWS, Azure & Cloud-Native Attack Surfaces
Cloud infrastructure has fundamentally changed the cybersecurity landscape. Misconfigurations in AWS S3 buckets have exposed millions of records. Overly permissive IAM roles have led to complete cloud account takeovers. Container and Kubernetes environments introduce new attack surfaces that traditional security tools do not cover. This module addresses cloud security from both attack and defence perspectives.

AWS security architecture is covered in depth: the shared responsibility model (where AWS's security responsibilities end and the customer's begin), IAM — users, roles, policies and the principle of least privilege, S3 bucket security — public access blocks, bucket policies, ACLs and encryption at rest and in transit, VPC security — security groups, NACLs, flow logs and private subnet design, CloudTrail for audit logging and GuardDuty for threat detection. Common cloud misconfigurations and how attackers exploit them are demonstrated: exposed S3 buckets with sensitive data, SSRF to the EC2 metadata endpoint, overly permissive Lambda execution roles, and weak security group rules allowing unnecessary inbound access. The PACU framework (AWS exploitation framework) is introduced for cloud penetration testing. Azure and GCP security architectures are covered at the conceptual and policy level. Container security fundamentals — Docker security hardening, image vulnerability scanning, Kubernetes RBAC and namespace isolation — are introduced as increasingly important skills in cloud-native organisations.
AWS IAMS3 SecurityCloudTrailGuardDutyShared ResponsibilityContainer SecurityKubernetes RBACPACU
8
Security Compliance, Risk Management & Career Preparation
Technical skills alone do not make a complete cybersecurity professional. Organisations need security practitioners who understand the governance, risk and compliance (GRC) frameworks that give security programmes their structure, budget justification and regulatory standing. This module covers the frameworks and professional skills that security professionals need throughout their careers.

ISO 27001 is covered as the international standard for Information Security Management Systems — the control domains, the risk treatment process, the documentation requirements and how ISO 27001 certification audits work. The NIST Cybersecurity Framework (Identify-Protect-Detect-Respond-Recover) is applied as a practical tool for assessing and improving an organisation's security posture. GDPR and India's DPDP Act (Digital Personal Data Protection Act, 2023) are covered with emphasis on the security obligations they impose on organisations handling personal data — directly relevant to the compliance requirements that any Indian security professional will encounter. Risk management fundamentals — risk identification, likelihood and impact assessment, risk treatment options (accept, mitigate, transfer, avoid) — are covered in the context of real security programme decisions. Security awareness training design is introduced, because most security breaches involve a human element. The module concludes with intensive career preparation: security-specific resume writing, how to position lab projects and certifications, common technical interview questions for SOC analyst and security engineer roles, and a mock interview session with feedback.
ISO 27001NIST CSFGDPRDPDP ActGRCRisk ManagementSecurity ComplianceInterview Prep

Hands-On Lab Projects You Will Build

Every concept in this course is reinforced through real lab exercises. These are not toy examples — they are the kinds of tasks that security professionals perform in actual enterprise environments. Your lab portfolio becomes a key differentiator in job interviews.

🗺️ Full Network Penetration Test

Complete engagement against a multi-machine lab network — reconnaissance through exploitation, privilege escalation, lateral movement and final report delivered to professional VAPT standards.

🕷️ Web Application Security Audit

Full OWASP Top 10 assessment of a deliberately vulnerable web application using Burp Suite, manual testing and sqlmap. Written report with severity ratings and remediation recommendations.

📊 Splunk SOC Dashboard & Detection Rules

Ingest multi-source log data into Splunk, build a SOC monitoring dashboard and write SPL detection rules for 5 common attack patterns. Detect a simulated intrusion from log data alone.

☁️ AWS Security Misconfiguration Audit

Audit an intentionally misconfigured AWS environment — identify exposed S3 buckets, overly permissive IAM roles, unencrypted data and open security groups. Write a cloud security remediation report.

🔍 Incident Response Investigation

Given a simulated breach scenario with SIEM logs, endpoint telemetry and network captures, perform a complete incident response investigation — timeline reconstruction, IOC identification and executive summary.

📋 VAPT Engagement Report

Full professional penetration test report document for a complete lab engagement — executive summary, technical findings with CVSS scores, proof-of-concept evidence and prioritised remediation roadmap.

Career Paths & Salary After Cyber Security

The cybersecurity job market in India is one of the tightest in the technology sector — there are significantly more open positions than qualified candidates, which keeps salaries high and hiring timelines short. Here is what you can realistically target after completing this programme.

SOC Analyst (L1/L2)

₹4L–₹9L/yr

Alert triage, SIEM monitoring, incident response. The most common entry point into corporate cybersecurity.

Penetration Tester / VAPT Engineer

₹7L–₹18L/yr

External and internal network pen tests, web app assessments, reporting. High demand across IT services firms.

Security Engineer

₹9L–₹20L/yr

Firewall management, security architecture, hardening, vulnerability management. Core enterprise security team role.

Cloud Security Engineer

₹11L–₹24L/yr

AWS/Azure/GCP security architecture, IAM design, cloud compliance. Fastest-growing security specialisation.

Security Consultant

₹12L–₹28L/yr

Client-facing security assessments, compliance advisory, risk management. Big 4 and boutique firms.

CISO / Head of Security (8yr)

₹40L–₹1Cr+/yr

Enterprise security programme leadership. Board-level accountability for organisational security posture.

"I joined this course with basic networking knowledge and zero security experience. The lab sessions were the game-changer — running actual Metasploit exploits, building Splunk dashboards, doing a full web app pen test. By the time I attended interviews, I had real project experience to talk about. Got hired as a SOC Analyst at an MNC in Pune within 6 weeks of completing the course."
— Rohan Deshmukh, SOC Analyst L2, MNC Security Operations, Pune

Industries Actively Hiring Cyber Security Professionals

Frequently Asked Questions — Cyber Security

What is the difference between Cyber Security, Information Security and Network Security?
These terms are related but have different scopes. Network Security specifically covers protecting network infrastructure — firewalls, IDS/IPS, VPNs, network segmentation and monitoring network traffic for threats. Information Security is a broader field covering the protection of all forms of information — digital and physical — through people, processes and technology, governed by frameworks like ISO 27001. Cyber Security is the broadest modern term, encompassing network security, application security, cloud security, endpoint security, identity management, incident response, threat intelligence and the entire lifecycle of defending digital systems and data. In practice, the terms are used interchangeably by most employers — what matters is the specific skills: can you find vulnerabilities, monitor for threats, and respond to incidents?
Is Cyber Security a good career in India in 2026?
Cyber Security is arguably one of the three best technology career choices in India right now — alongside Data Science and Cloud Engineering. India faces a shortage of over 800,000 cybersecurity professionals. The Indian government's mandate for critical infrastructure security, the RBI's cybersecurity framework for banks, the DPDP Act's data protection requirements and the explosion of cloud adoption have all created structural, long-term demand for security professionals that far outpaces supply. Entry-level SOC analyst roles in Pune, Bangalore and Hyderabad receive dozens of applications — but for candidates with hands-on lab skills and even one certification, the competition thins dramatically. Senior security roles often go unfilled for months because qualified candidates are so scarce.
What is VAPT and what does a VAPT engineer do on a typical engagement?
VAPT stands for Vulnerability Assessment and Penetration Testing. A VAPT engineer is hired by an organisation to systematically find and demonstrate security weaknesses before real attackers do. A typical engagement has four phases: Scoping (agreeing what systems are in scope, what techniques are permitted, and what the success criteria are), Reconnaissance and Scanning (passive OSINT gathering and active network/service scanning), Exploitation (attempting to exploit discovered vulnerabilities to demonstrate real impact — gaining unauthorised access, escalating privileges, exfiltrating simulated data), and Reporting (delivering a professional report with executive summary, detailed technical findings, proof-of-concept evidence, CVSS severity ratings and prioritised remediation recommendations). VAPT engineers are among the most in-demand and well-compensated cybersecurity professionals in India.
What is a SOC and what does a SOC Analyst do every day?
A Security Operations Centre (SOC) is a team and facility dedicated to monitoring an organisation's IT environment for threats 24x7. A SOC Analyst's typical day involves reviewing SIEM alerts generated by detection rules, triaging each alert to determine whether it represents a genuine threat (true positive) or a benign event that matched the rule pattern (false positive), investigating confirmed threats by correlating logs across multiple systems, escalating complex incidents to senior analysts, and documenting all activity in a ticketing system. SOC Analysts work with tools like Splunk, IBM QRadar, Microsoft Sentinel and Elastic Security. L1 analysts handle initial triage, L2 analysts perform deeper investigation, and L3 analysts do threat hunting and detection engineering. SOC Analyst is the most common entry point into corporate cybersecurity in India.
What is ethical hacking and is it legal in India?
Ethical hacking (also called penetration testing or offensive security) is the practice of legally and deliberately attempting to breach an organisation's defences — with explicit written permission — to find vulnerabilities before malicious actors do. It is completely legal in India when performed under a signed scope-of-work agreement with the target organisation. The Information Technology Act, 2000 and its amendments govern cybercrime in India — unauthorised access is illegal, but authorised penetration testing is a legitimate and growing profession. Ethical hackers follow the same techniques as malicious attackers but operate within defined rules of engagement, document all findings professionally and help organisations fix the issues they find. This course teaches ethical hacking exclusively in lab environments and emphasises the legal and professional frameworks within which real security professionals operate.
What is the MITRE ATT&CK framework and why do security professionals use it?
MITRE ATT&CK (Adversarial Tactics, Techniques and Common Knowledge) is a globally recognised knowledge base that catalogues real-world attacker behaviours observed in actual breaches. It organises attack techniques into Tactics (the attacker's goal, such as Initial Access, Persistence, Privilege Escalation, Lateral Movement or Exfiltration) and Techniques (the specific method used to achieve that goal). Security teams use ATT&CK to write more effective SIEM detection rules (detecting specific techniques rather than generic anomalies), to assess gaps in their defensive coverage, to describe and communicate attack activity during incident response, and to evaluate security product capabilities. Understanding ATT&CK is expected of every SOC analyst and security engineer at serious organisations — it is the shared professional vocabulary of the security industry.
What programming skills do I need for Cyber Security?
You do not need to be a developer to succeed in cybersecurity, but basic scripting ability is genuinely useful and increasingly expected. Python is the most important language — security professionals use it for writing custom exploit scripts, automating repetitive reconnaissance tasks, parsing log files, building simple tools and modifying public proof-of-concept exploit code. Bash scripting is valuable for Linux-based automation. Some specialisations require more depth: web application security testers benefit from understanding JavaScript and PHP to recognise injection vulnerabilities; exploit development requires C/C++ knowledge; malware analysis requires understanding assembly. Our course teaches Python scripting specifically for security use cases within the main curriculum — you do not need prior Python knowledge.
How is this Cyber Security course different from YouTube tutorials and free online content?
Free online content — YouTube, TryHackMe, HackTheBox — is genuinely valuable for self-starters, and we actively encourage using these platforms alongside this course. What Aapvex's programme provides that free content cannot is structured progression (avoiding the scattered, topic-hopping problem of self-study), a dedicated lab environment with enterprise-grade configurations that TryHackMe free tier does not replicate, live interaction with an experienced security practitioner who can answer the "but why does this matter in a real company?" questions, peer learning in a small batch where lab scenarios are discussed collaboratively, and most importantly — placement support. Knowing how to use Metasploit is one thing. Knowing how to present yourself for a SOC analyst role, what to put on your resume, how to answer "tell me about a security project you have worked on" in an interview — that is what structured training with placement support provides.
What is the OSCP certification and should I target it after this course?
OSCP (Offensive Security Certified Professional) is widely regarded as the gold standard for hands-on penetration testing credentials. Unlike CEH (which is multiple-choice) and CompTIA Security+ (which is multiple-choice), OSCP requires you to actually compromise a series of machines in a 24-hour exam environment and submit a professional penetration test report — proving you can actually hack, not just answer questions about hacking. It is demanding, respected by every serious security employer, and commands a significant salary premium. Aapvex's course provides the foundations for OSCP preparation — exploitation techniques, privilege escalation, report writing — but OSCP is a standalone pursuit that typically requires 3–6 months of additional practice on platforms like HackTheBox after completing foundational training. We guide students who want to pursue OSCP on the recommended practice path.
What certifications should I get as a Cyber Security professional in India?
The most valued certifications in the Indian cybersecurity job market in 2026, in rough order of impact: CompTIA Security+ (baseline, globally recognised, excellent starting point), CEH — Certified Ethical Hacker (well-known in India, commonly listed in job descriptions), OSCP (highest respect in the offensive security community, required at serious pen testing firms), CompTIA CySA+ (valued for SOC and defensive roles), CISSP (for professionals with 5+ years experience targeting senior roles), CISM (management-oriented, valuable for CISOs and security managers), AWS Security Specialty (for cloud security roles). Our course prepares you for Security+ and provides strong foundations for CEH. We also provide guidance on the post-course path to OSCP for those who want to pursue offensive security seriously.
How do I enrol in the Cyber Security course at Aapvex Pune?
Call or WhatsApp 7796731656. Our counsellor will discuss your current background, confirm prerequisites are met, walk you through current batch dates and answer any questions about the curriculum or placement support. You can also fill out the contact form on our website and we will reach you within 2 hours. A free demo class is available before you commit to the full programme.