Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Stanford Advanced Cyber Security Program

Download as pdf or txt
Download as pdf or txt
You are on page 1of 15

CYBER SECURITY

MASTER CYBER SECURITY WITH THE

STANFORD ADVANCED
CYBER SECURITY PROGRAM

A Program by: Delivered and Supported by:


WHY CYBER
SECURITY?
150% $35 BILLION 1 MILLION
increase in demand for size of India’s Cyber cyber security
cyber security jobs Security market in 2025 professionals
needed by 2020
Source: Indeed.com Source: NASSCOM

Source: NASSCOM

`2 CRORE+ 22.2L
salary drawn by Chief median salary for
information security cyber security
officers (CISOs) at the architects
top of the Cyber
Source: Payscale
Security pyramid

Source: TheEconomic Times

SALARY
TRENDS

`15L `20L `35-40L


per annum per annum per annum

2 years exp 2-3 years exp 5-8 years exp


G R E AT L E A R N I N G
INDIA'S LEADING PROFESSIONAL
L E A R N I N G C O M PA N Y

20+
Top-Ranked programs

1 MILLION+
Learners

2500+
Faculty & Mentors

160+
Countries

500+
Hiring Partners

Best Ed-tech Company


of the Year
EdTechReview Awards 2020
PROGRAM
BENEFITS
Get the Stanford Center for Learn from internationally
Professional Development advantage renowned faculty

Build cutting-edge Cyber Security skills Learn from pioneers in the field
with a pioneering computer science of Cyber Security, both in research and
school industry

Gain practical Cyber Security Get mentored by industry experts


experience Learn the tricks of the trade from
Work on hands-on projects that develop seasoned Cyber Security
your ability to solve real-world problems practitioners

Get a certificate from Stanford Center Learn with minimal disruption


for Professional Development to your job
Showcase your skills with a certificate Completely online learning experience
from the Stanford Center for that’s both convenient and immersive
Professional Development

C E R T I F I C AT E
Upon successful completion of the
course, participants will receive a
certificate from the Stanford Center
for Professional Development.
PROGRAM
HIGHLIGHTS
WOR L D- C L ASS LE A R NI NG MATERI AL

1 Online content distilled from the latest research and best practices by
leading Cyber Security professionals and Stanford faculty.

G AI N R E A L-WO R LD INSI GHTS

2 Get access to exclusive insights from senior industry practitioners from


leading organizations such as Google, LinkedIn and Data Theorem.

PE ER -TO - P E E R LE A R NI NG

3 Learn from highly accomplished peers. Participate in discussions, engage in


community problem-solving and build your network.

H A N DS- O N P R OJE C TS

4 Gain industry-relevant skills through hands-on projects. Apply what you’ve


learnt to real-world problems and build your professional portfolio.
PROGRAM
CURRICULUM
This course will help you navigate the foundations and skills necessary to build a
successful cyber security career. You’ll learn how to meet basic security objectives
like confidentiality, integrity, non-repudiation by using secure systems and design
methodologies. You will also learn about major security breaches that have
occurred over the years, and how to build countermeasures for the same.

MODULE 1 1 Exam

Foundations Of Information Security


Course Overview Introduction to Cryptography
Motivation Cryptography in the Field
Security Design Foundations in Practice
Application Security Attacks and Interviews from Industry
Defenses
MODULE 2 4 Quizzes 1 Project 1 Exam

Exploiting and Protecting Web Applications


In this course, you will learn about the vulnerabilities, what kind of attacks exploit
them, and the methods and procedures used to mitigate them. Some of the
vulnerabilities include SQL Injection, cross-site scripting attacks, user tracking, and
HTTP header injection.

Injection and Cross-Domain Attacks Web Security: Session Management


Web Security: HTTPS and the Lock Web Background and Browser
Icon Security Model

MODULE 3 1 Quiz 1 Exam

Using Cryptography Correctly

Cryptography as a baseline is an important tool to achieve security goals. This


course covers how to use cryptography correctly, and teaches programmers how
to avoid many common mistakes that result in gaping security holes.

Introduction to Cryptography Identification Protocols


Symmetric Encryption Advance Primitives
Public key Cryptography

MODULE 4 4 Quizzes 1 Project 1 Exam

Network Security
Network security is one of the most important Cyber Security verticals today. It
helps organizations meet compliance regulations, protect customer data, and
reduce the risk of legal action. This course covers the practices for building reliable
and secure infrastructure to defend against various attacks and viruses.

Course Overview Defenses and Tools


Internet Protocols Denial of Service Attacks
MODULE 5 1 Exam

Emerging Threats and Defenses


Cyber attacks are a serious economic and security threat. To combat both
immediate and future dangers, businesses and governments are investing in Cyber
Security. This course explores the growing challenges of securing sensitive data,
networks, mobile devices, and applications with different privacy controls to
defend against malicious acts.

Course Overview Cloud Security


Dealing with a Data Breach Privacy Concerns
Attacks and Defenses

MODULE 6 1 Project 1 Exam

Writing Secure Code


In this course, learn and experience intermediate and advanced techniques that
systems and applications programmers can use to write new code securely, as well
as to find and mitigate vulnerabilities in existing code. In addition, you will also
learn various techniques used to secure legacy code

Course Overview Static Analysis, Dynamic Analysis,


Introduction and Fuzzing
Control Hijacking Attacks Language-based Security
Isolation
PROJECTS

V U L NE R AB ILITY TE STIN G O N A WEB APPLI CATI ON

Exploiting the web app using


injection techniques and other
vulnerabilities.

M EC H A N I C S O F VA R IO US F L AWS THAT OCCUR WHI LE WRI TI NG CODE

Stack smashing Format Strings


Function Pointers Fuzzing with American Fuzzylop
Smashing Integers

V U L NE R AB ILITY E X P LO ITIN G I N A VI RTUAL MACHI NE

Port scanning with Nmap Exploiting the Linux machine


Packet sniffing using Wireshark using Metasploit
P R O G R A M FA C U LT Y
DAN BONEH
Co-Director of the Stanford Computer Security Lab, Stanford University

Dan Boneh obtained his PhD in Computer Science from Princeton University.
In 2002, he co-founded a company called Voltage Security which was
acquired by Hewlett Packard in 2015. In 2018, Boneh became co-director of
the Center for Blockchain Research at Stanford.

JOHN C. MITCHELL
Co-Director of the Stanford Computer Security Lab, Stanford University

John C. Mitchell was the Vice Provost for Teaching and Learning at Stanford
University, and is a member of the steering committee for Stanford
University's Cyber Initiative.

NEIL DASWANI
Co-director of the Stanford Advanced Security Certification Program,
Stanford University

Neil Daswani is an expert in web application security. He is the lead author of


the book "Foundations of Security: What Every Programmer Needs To Know."
In 2008, he co-founded Dasient, a web security company. Daswani was
previously the Chief Information Security Officer at Lifelock, which was later
acquired by Symantec.

INDUSTRY MENTORS
TAMAGHNA GOUTAM PUDOTA MAYANK VIJH
BASU Cybersecurity Officer, Freelance Security
CTO, neoEYED Inc A.P. Moller Maersk Trainer

ANIKET SHYAM SUNDAR TAKSH


AMBEDKAR RAMASWAMI MEDHAVI
Security Services Lead Security & Threat Product Security
Manager, Instart Researcher, Cisco Manager, Philips
TESTIMONIALS

SAIKAT PRABHAKAR
Director Engineering, Guavus

“The Stanford Advanced Cyber Security Program" helped me identify the


multidimensional view one needs to have while thinking about Security. The course
content is competent enough to make you aware of the various technologies and
methodologies in use today. On top of that, the views depicted by some of the
industry experts and mentors helped me understand the correct approaches that
should be embedded in the software delivery model.”

THATO DITSEHO
IT Technician, Assmang Blanckrock mine

“I would like to thank Great learning for the great support they give me throughout
the program. When I started the program, I had little knowledge about
cybersecurity and now there is light at the end of the tunnel. I enjoyed the projects
and the mentoring sessions we had, we learned a lot from the best in the game.
This was a great foundation to start in cybersecurity and I'm looking forward to
becoming a cybersecurity specialist. I enjoyed all 6 topics but the ones I enjoyed
the most were Mobile Security and Network Security since I'm from the network
architecture environment. I would also like to give a special thanks to Vivek for
supporting us throughout the program. Keep up the great work and God bless
you!”

JOSE LEJIN P J
Principal Software Engineer, Citrix

“The course structure was well organized with in-depth content. The mentors were
very knowledgeable with hands-on experience on the topics. I believe the
knowledge I gained through this program will help me in my career.”
ADMISSION
D E TA I L S
W HO I S THI S P R OGR AM A PPLI C AT I O N PR O CESS
F OR?
This program is suited for
professionals working in roles
that include: Apply
Fill an online application form
Information Technology
Professionals
Software Developers
Network Security Engineers
Software Engineers
App Developers Get reviewed
System Architects Go through a screening call
Systems Analysts with the Admission
Director’s office
VAPT/Pentesters

ELI GI BI LI T Y

Bachelor’s Degree

At least 3 years of professional


experience is recommended
Join the
Familiarity with programming, Cyber Security Course
computer systems Your profile will be shared
Knowledge about IT and with the Program Director
Technology industry will be a for final selection
plus

You can pursue this program even


if you do not meet all the above
requirements, provided you budget
the extra time and effort.
P R OG RA M F EE

US D 2 , 5 0 0
(Includes tuition fee + learning materials + mentorship.)

PAY ME NT OP TI ONS

Candidates can pay the program fee through:

Netbanking, credit/debit cards, cheque/DD.

Pay the full fee upfront and avail benefits.

F INANC I AL ASS I STANC E

Learning is now made easy with financing options at a 0% interest rate, 0%


processing fee and longer tenure of upto 60 months.

You will have to pay the Admission Fees of USD 350, before the start of your
course.

Loan Tenure Processing Fee Interest Rate Monthly EMI


3 Months 0% 0% ₹53,750
6 Months 0% 0% ₹26,875

12 Months 2% 0% ₹13,438

18 Months 3% 0% ₹8,958

24 Months 3% 6.50% ₹7,591

36 Months 3% 6.50% ₹5,356

48 Months 3% 7.20% ₹4,326

60 Months 3% 7.60% ₹ 3,710

This is a tentative course amount considered at an exchange rate of 1USD = INR 75.
*

For more information, please contact our admissions office at 080 47188427.
ABOUT US

The Stanford Center for Professional Development, a part of the Office of the Vice
Provost for Teaching and Learning (VPTL), makes it possible for today's best and
brightest professionals to enrol in Stanford University courses and programs while
they maintain their careers. Their portfolio reflects the exciting research and
world-class teaching of Stanford faculty from all of Stanford’s schools. Courses are
delivered online and, in some cases, at Stanford, at your worksite, or at international
locations - providing a global community of learners with flexibility and
convenience and enabling them to apply their education to their work.

In collaboration with:

Great Learning is one of India’s leading ed-tech companies for professional and
higher education. It offers comprehensive, industry-relevant programs in Software
Engineering, Business Management, Business Analytics, Data Science, Machine
Learning, Artificial Intelligence, Cloud Computing, Cyber Security, Digital Marketing,
Design Thinking, and more. Great Learning's programs are developed in
collaboration with the world's foremost academic institutions like Stanford
University, The University of Texas at Austin, Indian Institute of Technology, Madras
(IIT Madras), People's Education Society University, Bengaluru (PES University,
Bengaluru) and Great Lakes Institute of Management and are constantly
reimagined and revamped to address the dynamic needs of the industry.

Great Learning is the only ed-tech company to provide these programs in a


blended mode, classroom mode and in purely online mode, relying on its vast
network of expert mentors and highly qualified faculty to deliver an unmatched
learning experience for learners in India and the world over. Having impacted
1 Million+ learners from over 160+ countries, Great Learning is on a mission to
enable transformative learning and career success in the digital economy for
professionals and students across the globe.
R E A DY TO A DVA N C E
YO U R C A R E E R ?

APPLY NOW

Speak to a Program Advisor


080 47188427
or

Email us
cybersecurity@greatlearning.in

Visit Our Website


www.greatlearning.in

A Program by: Delivered and Supported by:

You might also like