<<

Master Cybersecurity with the Stanford Advanced Program

A Program by: Delivered and Supported by: Why cybersecurity?

150% 1 million 22.2L Increase in Cyber security Median salary for demand for cyber professionals cyber security security jobs needed by 2020 architects

Source: Indeed.com Source: NASSCOM Source: Payscale

size of India’s cybersecurity market in 2025 $35 Source:NASSCOM billion salary drawn by Chief information security officers (CISOs) at the top of the cybersecurity pyramid. Source:https://economictimes.indiatimes.com/industry/te ch/cybersecurity-first-responders-in-demand/articleshow `2 /67496994.cms Crore+

SALARY TRENDS FOR CYBERSECURITY PROFESSIONALS 2 2-3 5-8 years exp years exp years exp

`15L `20L `35-40L Per annum Per annum Per annum Why Great Learning?

900 Faculties, Mentors and Moderators

Source: Payscale

12,000+ Successful Learners

6 Million+ Learning Hours Delivered

200+ Hiring Companies Program Benefits

Get the Stanford Center for Professional Development advantage Build cutting-edge cybersecurity skills with a pioneering school Get a certificate from Stanford Center for Professional Development Showcase your skills with a certificate from the Stanford Center for Professional Development

Internationally renowned faculty Learn from pioneers in the field of cybersecurity, both in research and industry

Mentorship from industry experts Learn the tricks of the trade from seasoned cybersecurity practitioners

Gain practical cybersecurity experience Work on hands-on projects that develop your ability to solve real-world problems

Learn with minimal disruption to your job Completely online learning experience that’s both convenient and immersive Certificate

Upon successful completion of the course, participants will receive a certificate from The Stanford Center for Professional Development. Program Structure

World class learning material Online content distilled from latest research and best practices by leading cybersecurity professionals and Stanford faculty.

Gain real-world insights Get access to exclusive insights from senior industry practitioners from leading organizations such as Google, LinkedIn and Data Theorem.

Peer-to-Peer Learning Learn from highly accomplished peers. Participate in discussions, engage in community problem-solving and build your network.

Hands-on projects Gain industry-relevant skills through hands-on projects. Apply what you’ve learnt to real-world problems and build your professional portfolio. Curriculum

Foundations Of Information Security

• Computer Security Design and Principles • Worms and other Malware • Introduction to • Secure Programming Techniques

Exploiting and Protecting Web Applications

• Overview of Web Technologies (HTTP, cookies, JavaScript, caching, session management) • Browser Security Model (document object model, same-origin-policy and violations of it), and SSL • Coverage of HTML5 vulnerabilities due to frame communication, localstorage, cross-origin resource sharing, and other HTML5 features • SQL Injection (and other forms of command injection including LDAP and XPath Injection) • Cross-Site Scripting (XSS), Cross-Site Request Forgery (XSRF) and Cross-Site Script Inclusion (XSSI), Clickjacking • Prevention techniques including input validation, output escaping, signatures, message authentication codes and frame busting Curriculum

Using Cryptography Correctly

• Introduction to Cryptography • Using Cryptography Correctly • Advanced Topics in Cryptography • Symmetric Encryption • Public-Key Cryptography • User Authentication

Network Security

• Security Application measures • How to idenitfy operating system holes • The important interplay of privacy and digital rights management • Trends in malware, privacy and security for mobile devices • Ways to prevent network attacks and gaps in security policy Curriculum

Emerging Threats and Defences

• Advanced persistent threats and mobile threats • Cloud trust assumptions and threat models • Machine learning use for detection and defenses • Network traffic analysis, web trafficking and defenses • SSL/TLS protocol and authentication infrastructure • Trusted cloud hardware and advanced cryptographic solutions

Writing Secure Code

• Control Hijacking Attacks and Defenses • Attacks Using Virtual Machines • Tools for Writing Code Securely • Static and Dynamic Analysis • Language-based Security Models • Isolation Techniques Projects

Exploit a Web Application Exploiting the web app using various injection techniques and other vulnerabilities.

VULNERABILITIES COVERED • SQL Injection • Xpath • LDAP • XSS • XSRF • MITM • Session Management

TOOLS USED • Kali Linux • OWASP BWA(Contains Vulnerable Web application) • Burp Suite(Intercepter) and many others Projects

Exploit a Vulnerable Linux virtual machine Port scanning with Nmap, packet sniffing using Wireshark and exploiting the Linux machine using Metasploit.

VULNERABILITIES COVERED • Backdoor Code Execution • Open Ports • Remote Downloader • Dos

TOOLS USED • Kali Linux • Metasploitable(vulnerable Linux machine) • Nmap(port scanning tool) • Wireshark(packet sniffing tool) • Metasploit(a tool for developing and executing exploit code against a remote target machine) Projects Projects

Mechanics of various flaws that occur while writing code

VULNERABILITIES COVERED • Stack Smashing • Function Pointers • Smashing Integers • Format Strings • Fuzzing With American Fuzzylop

TOOLS USED • Vs code (an ide with an integrated terminal) Stanford Faculty

DAN BONEH Dan Boneh is a Professor of Computer Science and Electrical Engineering at . He obtained his PhD in Computer Science from . In 2002, he co-founded a company called Voltage Security which was acquired by Hewlett Packard in 2015. In 2018, Boneh became co-director of the Center for Research at Stanford.

JOHN C. MITCHELL John C. Mitchell is the co-director of the Stanford Computer Security Lab and a Professor of Computer Science and Electrical Engineering at Stanford University. He was the Vice Provost for Teaching and Learning at Stanford University, and is a member of the steering committee for Stanford University's Cyber Initiative.

NEIL DASWANI Neil Daswani is the co-director of Stanford Advanced Security Certification Program and an expert in web application security. He is the lead author of the book "Foundations of Security: What Every Programmer Needs To Know." In 2008, he co-founded Dasient, a web security company. Daswani was previously the Chief Information Security Officer at Lifelock, which was later acquired by Industry Experts

SUBHAJIT DEB Subhajit is an security leader with 16+ years of experience. Apart from a Six Sigma Green Belt and various other security certifications, he currently has 2 US Patent granted, 2 US Patents filed and 4 Bank of America Trade Secrets submitted towards different areas of Information Security and Risk Management. Subhajit has won several awards in the information and cyber security domain including the Top 100 CISOs.

NIRMALLYA MUKHERJEE With over two and half decades of cross domain experience in IT and ITES across both services and products, Nirmallya Mukherjee has served as Chief Architect at Dell, Principal Architect at Infosys and Technical Architect at Ciber Inc, an HTC Global Services company. He lends his expertise to various multinationals like Cisco, Walmart Labs, Amadeus, Mercedes Benz, ANZ, Societe Generale etc. through his consulting, development and training engagements. Testimonials

I am having almost 14 years of Experience in Software Development, mainly web application development and am currently working as a Technical Project Manager. I was always attracted to cybersecurity. When great learning offered the certification from Stanford, I decided to have it and get my career a makeover for the KOUSHIK MITRA future. Technical Project Manager I liked the course very well. It is very crisp and extensive in a shorter period of time. I rate the experience very high, almost 4.5.

The experience in the course has been phenomenal, and all my expectations have been met. The content from Stanford is a great starting point, and also includes inputs from industry-leading experts working at companies such as Google, etc. At the same time, the mentorship sessions allow a more interactive experience and help explain the critical ANKINEEDU concepts better. MAGANTI Managing Director If I had to convert this to a rating, I would unhesitatingly rate the program and the support team 5 on 5. Testimonials

Each Module covers important topics under Cyber Security and the hands on projects help augment the learning. The practical lab sessions were quite useful and interesting. The sessions conducted by the Industry Experts were excellent. They explain each and every concept with real world examples. SRI KARTHIK SRINIVASAN Cyber Security Analyst

I am a working professional and it was hard to get time off from work and go to classes, so an online course from a reputable institution such as Stanford was the best way forward. Also, I found it value for money compared to the other courses in the market.

I liked the practical real life examples which I DUDLEY could play around with in my virtual sessions. THOMPSON Also, it was easy to get in touch with the support Technical analyst and teaching staff. Gauthami, the program manager, was very helpful in resolving issues I had faced and was quite supportive.” Admission Details

WHO IS THIS PROGRAM FOR?

This program is suited for professionals working in roles that include:

• Information Technology Professionals • Software Developers • Network Security Engineers • Software Engineers • App Developers • System Architects • Systems Analysts • VAPT/Pentesters

ELIGIBILITY • Bachelor’s Degree • At least 3 years of professional experience recommended • Familiarity with programming, computer systems • Comfort with the IT and Technology Industry You can pursue this program even if you do not meet all the above requirements, provided you budget the extra time and effort.

SELECTION PROCESS

STEP 01 Apply Fill an online application form.

Get reviewed STEP 02 Go through a screening call with the Admission Director’s office Join the Cyber Security Course STEP 03 Your profile will be shared with the Program Director for final selection Admission Details

FEE DETAILS

Program Fee: USD 2495 ₹1,74,650 (approx.) Fee includes tuition fee + learning material + mentorship

Payment options • Candidates can pay the program fee through netbanking, credit/debit cards, cheque/DD. • Pay the full fee upfront, and avail benefits, or pay in two easy installments.

Financial assistance Pay in 12 EMIs at 0% interest rate with ZestMoney

About Us

The Stanford Center for Professional Development, a part of The Office of the Vice Provost for Teaching and Learning (VPTL), makes it possible for today's best and brightest professionals to enrol in Stanford University courses and programs while they maintain their careers. Their portfolio reflects the exciting research and world-class teaching of Stanford faculty from all of Stanford’s schools. Courses are delivered online and, in some cases, at Stanford, at your work site, or at international locations - providing a global community of learners with flexibility and convenience and enabling them to apply their education to their work.

Great Learning's mission is to enable career success in the Digital Economy. Its programs always focus on the next frontier of growth in industry, and spans across Analytics, Data Science, Big Data, Machine Learning, Artificial Intelligence, Deep Learning, Cloud Computing, Cybersecurity and more. Great Learning’s emphasis on mentored and peer learning provide a robust support structure to help learners attain mastery of the areas they learn. By combining technology, high-quality content, and industry collaboration, learners gain an immersive learning experience and the ability to apply and demonstrate their competencies. All programs are offered in collaboration with leading global universities and are taken by thousands of professionals every year to secure and grow their careers. Contact Us

+91 - 96060 27054

[email protected]

https://www.greatlearning.in/