Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

PG Program Cyber Security Course

Download as pdf or txt
Download as pdf or txt
You are on page 1of 18

Post Graduate

Program in
Cybersecurity
Build Cybersecurity skills to accelerate your career

Now with CompTIA Security + Bootcamp | 6 Weeks (Optional)

Live Mentorship Lab Sessions for Certificate of Completion from


20 Weeks
with Experts Hands-on Practice the University of Texas at Austin

A program by In collaboration with


There are only two types
of companies: those that
have been hacked, and
those that will be.
Robert Mueller
FBI Director, 2012
Image credit: Christopher Gregory/The New York Times

Malicious hackers are becoming increasingly adept at exploiting software vulnerabilities,


compelling organizations to build advanced Cybersecurity measures or risk losing their
reputation, billions of dollars and valuable data.

Organizations across the world are combating this challenge by upskilling their workforce,
recruiting skilled Cybersecurity professionals, and building robust cyber defense capabilities.

OVER 50% 3.5 MILLION JOBS $215 BILLION


organizations are beginning to in Cybersecurity to be Projected worldwide
recognize the importance of available by 2025, according end-user spending on
being secure from the start in to the U.S. Bureau of Labor security and risk
any transformation effort. Statistics. management in 2024.

- State of Cybersecurity - Cybersecurity Ventures, 2022 - Gartner


Resilience, 2023

A Cybersecurity professional is engaged in a strategic game of ever-changing defensive and offensive


techniques and must know the ins-and-outs of the domain to protect IT infrastructures effectively.

The Postgraduate Program in Cybersecurity equips you with the skills needed to investigate attacks
and build robust Cybersecurity systems while giving your resume the University of Texas at Austin
advantage. The program is ideal for cyber defense enthusiasts, enabling them to connect with
thought leaders in the industry and understand the process of securing digital infrastructure.

02
Program
Highlights

The new-age technological wave with GenAI has introduced the next level of
sophisticated threats, leading to a prominent demand for Cybersecurity professionals.
This program is crafted by experts to empower you with a skill set to analyze the
threat landscape and build long-term Cybersecurity strategies.

A curriculum by the leading Interactive live


faculty at the McCombs mentorship with
School of Business industry experts

Certificate of completion Lab sessions to


from the University of gain hands-on
Texas at Austin experience

12+ hands-on projects Dedicated program


and a 2-week Capstone support from
Project (optional) Great Learning

Live classes: 18 hours


(1.5 hours per week)

03
Who is this
program for?

The curriculum is designed to cater to various professional needs. Whether you’re an


early career professional looking to build a career in Cybersecurity, a mid-level IT profes-
sional looking to transition into the domain, or a senior professional actively participat-
ing in formulating your organization's Cybersecurity strategy, this program will equip
you with the tools and the strategies to help achieve your professional goals.

Young professionals: Senior and mid-level managers:


Learn the core concepts of Cybersecurity Enhance your expertise in safeguarding IT and
and build a solid foundation using the Cloud infrastructures with advanced
in-demand market skills. You will benefit Cybersecurity skills, preparing you to adeptly
from this if you are navigate and mitigate evolving digital threats.

A professional looking to transition An IT infrastructure manager wanting to


your career in Cybersecurity upskill in the field of Cybersecurity for
managing the security of your IT & Cloud
infrastructure

A fresh graduate wanting to break


into the Cybersecurity domain. A senior and mid-level manager involved
in Cybersecurity governance and decision
making for your organization

Successful completion of the program may qualify you for various roles in
Cybersecurity, including:

Cybersecurity Analyst Incident Response Professional

Cyber Threat Intelligence Analyst Cloud Security Analyst

Information Security Specialist SOC Analyst


04
SOC Specialist
Program
Outcomes

Upon completion of the program, you would have developed the skill set needed to:

1. Develop the 5. Comprehend the evolving


Security Mindset threat landscape by
understanding the biggest
cyber attacks to-date
2. Perform incident
investigations to identify
6. Build muscle memory for
the source of the threat,
responding to cyber attacks
assess the risk and respond,
by following Incident
and write clear and
Response playbooks
world-class incident reports

3. Familiarize yourself with the 7. Comprehend the role and


Standards and Frameworks importance of international
such as: National Institute of and national regulations,
Standards and Technology standards, and legislation in
(NIST), MITRE ATT&CK, Center shaping the Information
for Internet Security (CIS) Security Programs
Benchmarks

4. Demonstrate the
understanding of how to
identify and defend against
modern-day threats such
as Ransomware

The program also helps in preparing learners for the CompTIA Security+, CompTIA
Cybersecurity Analyst (CySA+), and EC-Council Certified SOC Analyst (CSA) certifications. 05
CompTIA Security+
Bootcamp (Optional)
Take a step ahead into your Cybersecurity Career

About CompTIA Security+

CompTIA Security+ is a widely accepted entry-level vendor-neutral Cybersecurity


certification that validates your competency in the field of security. CompTIA Security+
is compliant with ISO 17024 standards and approved by the US DoD to meet directive
8140/8570.01-M requirements.

What Does This Bootcamp Contain?

Live Mentor Sessions with Dedicated Question


Industry Experts Bank and 2 Mock Exams

5-6 Hours of Learning Free Exam Voucher


per Week worth USD 392

Mind Maps and


Exam-Taking Strategies

Certificate of Completion
From Great Learning

06
Disclaimer: Great Learning delivers the CompTIA Security+ Bootcamp. The University of Texas at Austin is
not involved in the program's design or delivery.
Curriculum

The Post Graduate Program in Cybersecurity comprises 5 milestones: A strong


foundation in Cybersecurity, network security, in-depth exploration of various cyber
attacks, designing security controls for resilience, and GRC (Governance, Risk and
Compliance).

MODULE 1 INTRODUCTION TO CYBERSECURITY | 2 WEEKS

Acquire essential knowledge in Risk Management, Cryptography,


and emerging trends in Cybersecurity.

TOPICS
• Careers in Cybersecurity • Global Cyber Warfare
• Introduction to CIA triad • Understanding Cryptography
• Basics of Authentication • Cryptocurrency & blockchain
• Risk Management
• Emerging trends - Artificial Intelligence &
Cybersecurity, Operations Technology &
Internet of Things

TAKEAWAYS
• Gain insights on Importance of Cybersecurity
• Develop the ability to choose the appropriate authentication methods
• Identify & assess different types of risks
• Gain hands-on experience or practical exercises using AI-driven tools for
Cybersecurity use cases
• Discover the different patterns in the cyber attacks going on as a part of global
cyber warfare
• Familiarize yourself with the cryptocurrency transactions & the crypto payment
ecosystem in today's cyber world.

07
MODULE 2 NETWORK SECURITY & FIREWALL ESSENTIALS | 3 WEEKS

Skill yourself with Network Security concepts and experience Network Security tools
such as Firewall for safeguarding your assets.

• TOPICS
• Networking basics - OSI Model, IP • Virtual Private Network (VPN)
Addressing, TCP/IP, Network services,
• Next Generation Firewall (NGFW)
Public/ Private IP, Load Balancing, Proxy
• Intrusion Detection Systems (IDS)
• Wireshark
and Intrusion Prevention Systems
• Network segmentation (IPS)

TAKEAWAYS
• Develop the most in-demand skills in a majority of IT job roles such as Networking
& Network security
• Practice the skill of capturing and analyzing network traffic for cyber
investigations & troubleshooting
• Understand the implementation of VPN for securing the remote workforce
• Explore the Next Generation Firewall (NGFW) for network security
• Distinguish between security technologies like IDS & IPS and their usage

MODULE 3 UNDERSTANDING MODERN CYBER ATTACKS | 2 WEEKS

Discover the cyber attack methodology and learn to view attacks from the
lens of an attacker.

• TOPICS
• MITRE ATT&CK • Attacks on Networks
• Cyber Kill Chain • Attacks on Endpoints
• APT (Advanced Persistent Threats) • Attacks on Applications
• Ransomware Attacks & Cyber Insurance • Attacks on Data
• Attacks on Cryptography • Attacks on Cloud
• Attacks on Users

TAKEAWAYS
• Understand adversary tactics, techniques and procedures to enhance threat
detection and response strategies.
• Identify and disrupt cyber threats by understanding the different stages of a
cyber attack
• Recognize and defend against highly skilled and motivated attackers with
persistent access
• Mitigate financial risks from ransomware incidents through effective cyber
insurance strategies
• Secure cryptographic systems by identifying and mitigating vulnerabilities and
weaknesses
• Develop comprehensive security strategies to protect critical components against
various attack vectors. 08
MODULE 4 DESIGNING SECURITY CONTROLS | 3 WEEKS

Discover effective methods for recognizing and applying appropriate Cybersecurity


strategies to combat diverse cyber threats.

• TOPICS
• Types of Security Controls • Authentication Implementation
• Endpoint Security Controls- Antivirus, • Deep dive into Security
Endpoint Detection and Response Information and Event
(EDR), Extended Detection and Management (SIEM)
Response (XDR)
• Threat Intelligence
• Identity and Access Management (IDAM)
• Incident Response
• Security Awareness
• Incident Response Playbooks
• Data Security Controls - Data Loss
Prevention (DLP), Cloud Access Security
Broker (CASB), Data Encryption, Data
Masking

TAKEAWAYS
• Differentiate between the types of security controls & their implementation
• Delve deeper into the protection mechanisms for endpoints such as Laptops,
Desktops & Servers
• Identify & classify different types of Data. Configure policies for preventing data
leakage from enterprise networks
• Monitor the signs of ongoing cyber attacks within a network with alerts from
authentication servers
• Learn about continuous security monitoring with advanced threat detection
• Learn to proactively gather actionable intelligence & stay informed about the threat
landscape
• Plan to respond to incidents and understand the incident response lifecycle

MODULE 5 GOVERNANCE, RISK AND COMPLIANCE | 2 WEEKS

Gain understanding of various standards, regulations and frameworks to help build a


strong organizational security posture.

• TOPICS
• Regulations, Standards, and Legislations • Digital Operational Resilience Act
• ISO 27001:2022 (DORA) - Regulation (EU)

• General Data Protection Regulation • Understanding Audit Process


(GDPR) • Conducting an Internal Audit
• Digital Data Protection Act (DPDP) - • Certification Audits
India
• Third-party risk management
• Payment Card Industry Data Security
Standard (PCI DSS)

09
TAKEAWAYS
• Comprehend the compliance requirements in relation to the security standards
such as ISO 27001:2022
• Develop technical expertise in documenting the requirements for data protection
standards & laws such as GDPR, and DPDP
• Recognize the need for security, specific to Financial sector, by studying the
intricacies of DORA
• Practice the preparation of internal audits and how to conduct them yourself
confidently
• Recognize and treat the risks associated with supply chain management

MODULE 6 CLOUD SECURITY | 2 WEEKS

Delve deeper into the security features of Microsoft Azure and understand the
methodology behind securing data on cloud.

• TOPICS
• Cloud Security in Different Platforms • Securing Data on Cloud
• Cloud Platform and Infrastructure • Incident Detection and Response
Security in Cloud

TAKEAWAYS
• Implement robust security measures tailored to Microsoft Azure for enhanced
protection
• Safeguard cloud infrastructure against cyber threats and vulnerabilities through
effective security controls.
• Ensure the confidentiality, integrity, and availability of data stored on cloud
platforms through encryption, access controls, and data loss prevention
measures.
• Detect and respond to security incidents in cloud environments promptly to
minimize impact and protect sensitive assets

MODULE 7 PENETRATION TESTING | 4 WEEKS

Equip yourself with a solid grasp of penetration testing methodologies and gain
hands-on experience through interactive video and workbooks, ensuring industry
readiness.

• TOPICS
• Introduction to Penetration Testing • OWASP Top 10 & Application
• Techniques of Penetration Testing Security

• Infrastructure Penetration Testing • Web Application Penetration


Testing

10
TAKEAWAYS
• Practice the fundamental skills of penetration testing
• Differentiate between different methods used while performing the penetration tests
• Scanning the internal infrastructure and exploiting vulnerabilities to secure the
network
• Have an understanding of application security vulnerabilities such as OWASP Top 10
• Understand how pentesting of a web application differs from Infrastructure
penetration testing

OPTIONAL CAPSTONE PROJECT | 2 WEEKS

Demonstrate your learnings throughout the program with a comprehensive Capstone project.

TAKEAWAYS
• Setting up security operations & monitoring using SIEM
• Planning security operations & monitoring using risk control mapping
• Research and prepare your analysis whether ChatGPT or Gemini should be allowed
by an organization

ADDITIONAL SELF-PACED COMPTIA SECURITY+

Prepare for the CompTIA Security+ certification exam.

• TOPICS
• General Security Concepts • Security Operations
• Threats, Vulnerabilities, and Mitigations • Security Program Management
• Security Architecture

TAKEAWAYS
• Prepare for the Security+ exam by learning about the key concepts
• Get complete coverage of the domains measured in the Security+ examination
• Recap the concepts learned in the mandatory modules with a specific focus on the
Security+ certification exam
• Utilize the question bank to practice exam taking strategies

ADDITIONAL SELF-PACED PYTHON FOR CYBERSECURITY PROFESSIONALS

Learn to use Python for Cybersecurity.

• TOPICS
• Introduction to Python • Cracking passwords with Python
• Network analysis with Python • Encryption with Python

TAKEAWAYS
• Learn to use python to perform and automate tasks.
• Understand the usage of python programming for network analysis, password 11
cracking and encryption.
CompTIA Security+
Bootcamp (Optional)

MODULE 1:
ATTACKS, THREATS AND VULNERABILITIES

MODULE 2:
ARCHITECTURE AND DESIGN

MODULE 3:
IMPLEMENTATION

MODULE 4:
OPERATIONS AND INCIDENT RESPONSE

MODULE 5:
GOVERNANCE RISK AND COMPLIANCE

Certificate of
Completion

Postgraduate Program in
Cybersecurity

All certificate images are for illustrative purposes only. The actual
certificate may be subject to change at the discretion of the university. 12
Program Faculty
and Industry
Mentors
Program Faculty

Dr. Kumar Muthuraman Abdul Mateen


Faculty Director, Center for Information Security
Research and Analytics Analyst
McCombs School of Business,
University of Texas at Austin

Aniket Amdekar
General Manager - Cyber
Defence Education, Great
Learning, E-Commerce
Cyber Security Specialist

Industry Mentors

Vikas Singh Yadav Matthew Lindwall Farhad Sajid


Chief Information Senior Cybersecurity Tech Lead
Security Officer Risk Analyst | GCIH |
GCFA

Ravindra Joshi Peter Christy Mayan Mohan


Partner Build Tech Lead Team Lead
Consultant (Security)

Thomas Mulroy
Cybersecurity
Program Manager
and Engineer in
Automotive
Industry

*This is an indicative list and subject to change based on the faculty’s and mentor’s availability 13
Testimonials

“I came across the Post Graduate Program in Cybersecurity on Great Learning’s


LinkedIn page in May, 2022 and it's been an interesting learning journey so far. The
payment option was friendly and flexible. The recorded, live sessions and the hands-on
lab projects have been engaging and impactful in becoming a well-seasoned
Cybersecurity expert.”

Abiola Olufunke Famoroti


CEO,
Abbatoir Services

“I highly recommend taking the Post Graduate Program in Cybersecurity. As a legal


professional, I realized that the world was soon moving towards the “Internet of Things”
direction, with digital platforms leading the way. As a 21st century lawyer, enrolling for a
Cybersecurity program was the best option for me. This program is by far, the most
useful in the cyber world. It has noticeably improved my understanding of how cyber
criminals plan and execute their malicious activities.

This program is a must-have for every professional. The recent election in Kenya and the
technical and detailed evidence gathered is enough proof that all professionals - lawyers,
judges, accountants and politicians - need to understand the basics of Cybersecurity. As
world dynamics change with the influence of IoT, we need to keep up with this change.

This program gives people a thorough understanding of the tools. Unlike a lot of other
programs, which only focus on memorizing facts and concepts, this one teaches you
cyber skills that you can apply in any area of work. I would recommend this program to
anyone who wants to learn more about Cybersecurity.”

Modicai Donga
Chief Operations Manager/Lawyer,
SV Mdladla and Associates

14
Testimonials

“I got to know about the PG Program in Cybersecurity by UT Austin and Great Learning
from my family. This program was practical and extremely hands-on with challenging
technical labs that enabled me to dive deep into the world of Cybersecurity.
I strongly believe that the program content was designed in a way to understand
complex Cybersecurity concepts. The faculty were very professional in driving the
program and it helped me complete my projects on time. The admin team was great in
addressing all student issues promptly. I am very thankful to the Great Learning team for
this wonderful learning experience.”

Asha Chakkravarthy
Desktop Support Analyst,
Ovation Workplace Services

“With increasing awareness and concern over growing cyber threats facing different
organizations, governments and individuals, many organizations and colleges have
created new programs in Cybersecurity. Nothing compares to Great Learning and
University of Texas with their exceptional curriculum content. The high calibre of
industry experts and tutors and their knowledge of the subject matter is unparalleled.
While a lot of other programs in the market are at an infancy stage, I had no doubt that
Great Learning’s program would be thoughtfully designed with inputs from field
practitioners, national and international stakeholders and industry thought leaders with
the main aim of training Cybersecurity professionals of tomorrow with theoretical as
well as practical skills.

If there was ever a time to enter the Cybersecurity field, it is now. With cyber threats
and attacks increasing in both frequency and sophistication, the demand for
Cybersecurity professionals is far more than the supply. This means that for qualified
Cybersecurity specialists, job security is practically guaranteed. Thank you Great
Learning for your constant support in this journey!”

Obakilwe George Sekoane


Change Manager,
Umgeni Water

15
Admission Process
Program Eligibility

Applicants to the program can include:


Graduates without experience in the IT domain
Working professionals from any industry
IT professionals with 2 years of experience

We offer a pre-work course for fresh graduates and non-IT candidates to learn the
fundamentals required for the program.

The admissions are conducted on a rolling basis and the admission process is closed
once the requisite number of candidates has been enrolled into the program.

Selection Process

APPLY SCREENING PROCESS JOIN PROGRAM


Apply by filling Attend an application An offer letter will be
a simple online screening call rolled out to selected
application form candidates

Post Graduate Program in Cybersecurity


Price: USD 2950

Post Graduate Program + CompTIA Security+Bootcamp


Price: USD 2950 + 1800 = 4750 USD 4150

For more information on flexible payment options, please reach out to your program advisor.

16
Disclaimer: Great Learning delivers the CompTIA Security+ Bootcamp. The University of Texas at Austin is
not involved in the program's design or delivery.
Program
Partners

The University of Texas at Austin’s McCombs School of Business (ranked #6 according to


QS Global rankings) is a premier business school at a world class public research
university. It cultivates principled leaders and develops ideas through high-quality
instructions, experiential learning, and the pursuit of relevant, groundbreaking research.

Great Learning is a leading global ed-tech company for professional and higher
education. It offers comprehensive, industry-relevant programs across various
cutting-edge Technology, Data, and Business domains. Great Learning's programs are
developed in collaboration with the world's foremost academic institutions. They are
constantly reimagined and revamped to address the dynamic needs of the industry.
Great Learning is the only ed-tech company to provide these programs in a blended
mode, classroom mode, and purely online mode, relying on its vast network of expert
mentors and highly qualified faculty to deliver an unmatched learning experience for
learners in India and the world over. Great Learning is on a mission to enable
transformative learning and career success in the digital economy for professionals and
students across the globe and till date, we have impacted over 10 million learners from
over 170 countries.

17
Ready to become a
Cybersecurity expert?
APPLY NOW

Contact Great Learning for more information about the program:

+1 512 212 4186


cs.utaustin@mygreatlearning.com
mygreatlearning.com/pg-program-cyber-security-course

You might also like