Stanford Advanced Computer Security Program
Total Page:16
File Type:pdf, Size:1020Kb
Master Cybersecurity with the Stanford Advanced Computer Security Program A Program by: Delivered and Supported by: Why cybersecurity? 150% 1 million 22.2L Increase in Cyber security Median salary for demand for cyber professionals cyber security security jobs needed by 2020 architects Source: Indeed.com Source: NASSCOM Source: Payscale size of India’s cybersecurity market in 2025 $35 Source:NASSCOM billion salary drawn by Chief information security officers (CISOs) at the top of the cybersecurity pyramid. Source:https://economictimes.indiatimes.com/industry/te ch/cybersecurity-first-responders-in-demand/articleshow `2 /67496994.cms Crore+ SALARY TRENDS FOR CYBERSECURITY PROFESSIONALS 2 2-3 5-8 years exp years exp years exp `15L `20L `35-40L Per annum Per annum Per annum Why Great Learning? 900 Faculties, Mentors and Moderators Source: Payscale 12,000+ Successful Learners 6 Million+ Learning Hours Delivered 200+ Hiring Companies Program Benefits Get the Stanford Center for Professional Development advantage Build cutting-edge cybersecurity skills with a pioneering computer science school Get a certificate from Stanford Center for Professional Development Showcase your skills with a certificate from the Stanford Center for Professional Development Internationally renowned faculty Learn from pioneers in the field of cybersecurity, both in research and industry Mentorship from industry experts Learn the tricks of the trade from seasoned cybersecurity practitioners Gain practical cybersecurity experience Work on hands-on projects that develop your ability to solve real-world problems Learn with minimal disruption to your job Completely online learning experience that’s both convenient and immersive Certificate Upon successful completion of the course, participants will receive a certificate from The Stanford Center for Professional Development. Program Structure World class learning material Online content distilled from latest research and best practices by leading cybersecurity professionals and Stanford faculty. Gain real-world insights Get access to exclusive insights from senior industry practitioners from leading organizations such as Google, LinkedIn and Data Theorem. Peer-to-Peer Learning Learn from highly accomplished peers. Participate in discussions, engage in community problem-solving and build your network. Hands-on projects Gain industry-relevant skills through hands-on projects. Apply what you’ve learnt to real-world problems and build your professional portfolio. Curriculum Foundations Of Information Security • Computer Security Design and Principles • Worms and other Malware • Introduction to Cryptography • Secure Programming Techniques Exploiting and Protecting Web Applications • Overview of Web Technologies (HTTP, cookies, JavaScript, caching, session management) • Browser Security Model (document object model, same-origin-policy and violations of it), and SSL • Coverage of HTML5 vulnerabilities due to frame communication, localstorage, cross-origin resource sharing, and other HTML5 features • SQL Injection (and other forms of command injection including LDAP and XPath Injection) • Cross-Site Scripting (XSS), Cross-Site Request Forgery (XSRF) and Cross-Site Script Inclusion (XSSI), Clickjacking • Prevention techniques including input validation, output escaping, signatures, message authentication codes and frame busting Curriculum Using Cryptography Correctly • Introduction to Cryptography • Using Cryptography Correctly • Advanced Topics in Cryptography • Symmetric Encryption • Public-Key Cryptography • User Authentication Network Security • Security Application measures • How to idenitfy operating system holes • The important interplay of privacy and digital rights management • Trends in malware, privacy and security for mobile devices • Ways to prevent network attacks and gaps in security policy Curriculum Emerging Threats and Defences • Advanced persistent threats and mobile threats • Cloud trust assumptions and threat models • Machine learning use for detection and defenses • Network traffic analysis, web trafficking and defenses • SSL/TLS protocol and authentication infrastructure • Trusted cloud hardware and advanced cryptographic solutions Writing Secure Code • Control Hijacking Attacks and Defenses • Attacks Using Virtual Machines • Tools for Writing Code Securely • Static and Dynamic Analysis • Language-based Security Models • Isolation Techniques Projects Exploit a Web Application Exploiting the web app using various injection techniques and other vulnerabilities. VULNERABILITIES COVERED • SQL Injection • Xpath • LDAP • XSS • XSRF • MITM • Session Management TOOLS USED • Kali Linux • OWASP BWA(Contains Vulnerable Web application) • Burp Suite(Intercepter) and many others Projects Exploit a Vulnerable Linux virtual machine Port scanning with Nmap, packet sniffing using Wireshark and exploiting the Linux machine using Metasploit. VULNERABILITIES COVERED • Backdoor Code Execution • Open Ports • Remote Downloader • Dos TOOLS USED • Kali Linux • Metasploitable(vulnerable Linux machine) • Nmap(port scanning tool) • Wireshark(packet sniffing tool) • Metasploit(a tool for developing and executing exploit code against a remote target machine) Projects Projects Mechanics of various flaws that occur while writing code VULNERABILITIES COVERED • Stack Smashing • Function Pointers • Smashing Integers • Format Strings • Fuzzing With American Fuzzylop TOOLS USED • Vs code (an ide with an integrated terminal) Stanford Faculty DAN BONEH Dan Boneh is a Professor of Computer Science and Electrical Engineering at Stanford University. He obtained his PhD in Computer Science from Princeton University. In 2002, he co-founded a company called Voltage Security which was acquired by Hewlett Packard in 2015. In 2018, Boneh became co-director of the Center for Blockchain Research at Stanford. JOHN C. MITCHELL John C. Mitchell is the co-director of the Stanford Computer Security Lab and a Professor of Computer Science and Electrical Engineering at Stanford University. He was the Vice Provost for Teaching and Learning at Stanford University, and is a member of the steering committee for Stanford University's Cyber Initiative. NEIL DASWANI Neil Daswani is the co-director of Stanford Advanced Security Certification Program and an expert in web application security. He is the lead author of the book "Foundations of Security: What Every Programmer Needs To Know." In 2008, he co-founded Dasient, a web security company. Daswani was previously the Chief Information Security Officer at Lifelock, which was later acquired by Industry Experts SUBHAJIT DEB Subhajit is an security leader with 16+ years of experience. Apart from a Six Sigma Green Belt and various other security certifications, he currently has 2 US Patent granted, 2 US Patents filed and 4 Bank of America Trade Secrets submitted towards different areas of Information Security and Risk Management. Subhajit has won several awards in the information and cyber security domain including the Top 100 CISOs. NIRMALLYA MUKHERJEE With over two and half decades of cross domain experience in IT and ITES across both services and products, Nirmallya Mukherjee has served as Chief Architect at Dell, Principal Architect at Infosys and Technical Architect at Ciber Inc, an HTC Global Services company. He lends his expertise to various multinationals like Cisco, Walmart Labs, Amadeus, Mercedes Benz, ANZ, Societe Generale etc. through his consulting, development and training engagements. Testimonials I am having almost 14 years of Experience in Software Development, mainly web application development and am currently working as a Technical Project Manager. I was always attracted to cybersecurity. When great learning offered the certification from Stanford, I decided to have it and get my career a makeover for the KOUSHIK MITRA future. Technical Project Manager I liked the course very well. It is very crisp and extensive in a shorter period of time. I rate the experience very high, almost 4.5. The experience in the course has been phenomenal, and all my expectations have been met. The content from Stanford is a great starting point, and also includes inputs from industry-leading experts working at companies such as Google, etc. At the same time, the mentorship sessions allow a more interactive experience and help explain the critical ANKINEEDU concepts better. MAGANTI Managing Director If I had to convert this to a rating, I would unhesitatingly rate the program and the support team 5 on 5. Testimonials Each Module covers important topics under Cyber Security and the hands on projects help augment the learning. The practical lab sessions were quite useful and interesting. The sessions conducted by the Industry Experts were excellent. They explain each and every concept with real world examples. SRI KARTHIK SRINIVASAN Cyber Security Analyst I am a working professional and it was hard to get time off from work and go to classes, so an online course from a reputable institution such as Stanford was the best way forward. Also, I found it value for money compared to the other courses in the market. I liked the practical real life examples which I DUDLEY could play around with in my virtual sessions. THOMPSON Also, it was easy to get in touch with the support Technical analyst and teaching staff. Gauthami, the program manager, was very helpful in resolving issues I had faced and was quite supportive.” Admission Details WHO IS THIS PROGRAM FOR? This program is suited for professionals working in roles that