Вы находитесь на странице: 1из 14

Master Cybersecurity with the

Stanford Advanced
Computer
Security Program

A Program by: Delivered and Supported by:


Securing for cybersecurity skills. This translates they happen. They set up detection
to nearly 3.5 million jobs unfilled in this systems that alert them before an
area by 2021. For the skilled attack is about to happen by constantly

your digital cybersecurity professional, this is an monitoring for any suspicious traffic.
immense opportunity to make a really They are also able to advise the
big impact in an organization. engineering team to hard-wire security

future
features in their code to build a robust
So what constitutes a skilled system. In order to impart
cybersecurity professional? Each asset industry-relevant cybersecurity
of the company is not made the same. expertise to professionals facing such
Some are more important and critical challenges, the Stanford Center for
There has never been a better time to than others, and if disrupted, can bring Professional Development is offering
build your cybersecurity skills. The the entire system to a halt. This is the Advanced Computer Security
threat of cybercrime and the cost of important to note because a company Program. It is taught by experts from
security lapses are getting ever higher. cannot plough all their resources into one of the world's best computer
At the same time, businesses big and monitoring and fortifying every single science schools, and offers
small are moving all their operations one of their assets. The cybersecurity comprehensive cybersecurity skills.
online. All of this has resulted in a team’s responsibility is to identify these
massive increase in demand for critical components and devise a
in-house and consulting cybersecurity strategy to secure them and thwart any
experts. interruption to the services of the
company. A competent cybersecurity
The need for a dedicated cybersecurity expert is proactive, rather than being
team is so widespread that nearly 70% just reactive to security attacks when
of businesses feel the desperate need
Program Benefits
Get the Stanford Center for Professional Development advantage
Build cutting-edge cybersecurity skills with a pioneering computer science school

Get a certificate from Stanford Center for Professional Development


Showcase your skills with a certificate from the Stanford Center for Professional Development

Internationally renowned faculty


Learn from pioneers in the field of cybersecurity, both in research and industry

Mentorship from industry experts


Learn the tricks of the trade from seasoned cybersecurity practitioners

Gain practical cybersecurity experience


Work on hands-on projects that develop your ability to solve real-world problems

Learn with minimal disruption to your job


Completely online learning experience that’s both convenient and immersive
Program
World class learning material
Online content distilled from latest research and
best practices by leading cybersecurity

Structure
professionals and Stanford faculty.

This 6-month structured


program will help you gain Gain real-world insights
advanced skills needed to Get access to exclusive insights from senior
protect networks, secure industry practitioners from leading organizations
such as Google, LinkedIn and Data Theorem.
electronic assets, prevent
attacks, ensure the privacy of
your customers, and build
secure infrastructures. Peer-to-Peer Learning
Learn from highly accomplished peers. Participate
in discussions, engage in community
problem-solving and build your network.

Hands-on projects
Gain industry-relevant skills through hands-on
projects. Apply what you’ve learnt to real-world
problems and build your professional portfolio.
Curriculum
Mobile Security Exploiting and Protecting Web Applications

• Mobile application security measures • Overview of Web Technologies (HTTP, cookies,


• Models to develop and secure Android JavaScript, caching, session management)
applications • Browser Security Model (document object model,
• Security detection and measures in iOS same-origin-policy and violations of it), and SSL
• Trends in mobile device management (MDM) • Coverage of HTML5 vulnerabilities due to frame
communication, localstorage, cross-origin resource
EXCLUSIVE INTERVIEWS sharing, and other HTML5 features
• Himanshu Dwivedi, Chief Executive OfficeData • SQL Injection (and other forms of command injection
Theorem including LDAP and XPath Injection)
• Mukul Khullar, Staff Information Security Engineer, • Cross-Site Scripting (XSS), Cross-Site Request
LinkedIn. Forgery (XSRF), and Cross-Site Script Inclusion
(XSSI), Clickjacking
• Prevention techniques including input validation,
output escaping, signatures, message authentication
codes, and frame busting
Curriculum
Using Cryptography Correctly Emerging Threats and Defences

• Introduction to Cryptography • Advanced persistent threats and mobile threats


• Using Cryptography Correctly • Cloud trust assumptions and threat models
• Advanced Topics in Cryptography • Machine learning use for detection and defenses
• Symmetric Encryption • Network traffic analysis, web trafficking and defenses
• Public-Key Cryptography • SSL/TLS protocol and authentication infrastructure
• User Authentication • Trusted cloud hardware and advanced cryptographic
solutions

Network Security
Writing Secure Code
• Security Application measures
• How to idenitfy operating system holes • Control Hijacking Attacks and Defenses
• The important interplay of privacy and • Attacks Using Virtual Machines
digital rights management • Tools for Writing Code Securely
• Trends in malware, privacy and security for • Static and Dynamic Analysis
mobile devices • Language-based Security Models
• Ways to prevent network attacks and gaps in • Isolation Techniques
security policy
Projects
Exploit a Web Application Exploit a Vulnerable Linux virtual machine
Exploiting the web app using various injection Port scanning with Nmap, packet sniffing using
techniques and other vulnerabilities. Wireshark and exploiting the Linux machine
using Metasploit.
VULNERABILITIES COVERED
• SQL Injection
VULNERABILITIES COVERED
• Xpath
• Backdoor Code Execution
• LDAP
• Open Ports
• XSS
• Remote Downloader
• XSRF
• Dos
• MITM
• Session Management
TOOLS USED
TOOLS USED • Kali Linux
• Kali Linux • Metasploitable(vulnerable Linux machine)
• OWASP BWA(Contains Vulnerable • Nmap(port scanning tool)
Web application) • Wireshark(packet sniffing tool)
• Burp Suite(Intercepter) • Metasploit(a tool for developing and executing
exploit code against a remote target machine)
Projects
Mechanics of various flaws that occur while writing code

VULNERABILITIES COVERED
• Stack Smashing
• Function Pointers
• Smashing Integers
• Format Strings
• Fuzzing With American Fuzzylop

TOOLS USED
• Vs code (an ide with an integrated terminal)
Program Faculty

DAN BONEH JOHN C. MITCHELL NEIL DASWANI


Dan Boneh is a Professor of Computer John C. Mitchell is the co-director of the Neil Daswani is a co-director of the
Science and Electrical Engineering at Stanford Computer Security Lab and a Stanford Advanced Security
Stanford University. He obtained his PhD Professor of Computer Science and Certification Program and an expert in
in Computer Science from Princeton Electrical Engineering at Stanford web application security. He is the lead
University. In 2002, he co-founded a University. He was the Vice Provost for author of the book "Foundations of
company called Voltage Security which Teaching and Learning at Stanford Security: What Every Programmer
was acquired by Hewlett Packard in University, and is a member of the Needs To Know." In 2008, he
2015. In 2018, Boneh became steering committee for Stanford co-founded Dasient, a web security
co-director of the Center for Blockchain University's Cyber Initiative. company. Daswani was previously the
Research at Stanford. Chief Information Security Officer at
Lifelock, which was later acquired by
Symantec.
Industry Experts

SUBHAJIT DEB NIRMALLYA MUKHERJEE


Subhajit is an security leader with 16+ years of experience. With over two and half decades of cross domain experience
Apart from a Six Sigma Green Belt and various other in IT and ITES across both services and products, Nirmallya
security certifications, he currently has 2 US Patent granted, Mukherjee has served as Chief Architect at Dell, Principal
2 US Patents filed and 4 Bank of America Trade Secrets Architect at Infosys and Technical Architect at Ciber Inc, an
submitted towards different areas of Information Security and HTC Global Services company. He lends his expertise to
Risk Management. Subhajit has won several awards in the various multinationals like Cisco, Walmart Labs, Amadeus,
information and cyber security domain including the Top 100 Mercedes Benz, ANZ, Societe Generale etc. through his
CISOs. consulting, development and training engagements.
Admission Details
WHO IS THIS PROGRAM FOR? SELECTION PROCESS
This program is suited for professionals working in roles
that include:
• Information Technology Professionals STEP 01
Apply
• Software Developers Fill an online application form.
• Network Security Engineers
• Software Engineers
• App Developers Evaluation
• System Architects STEP 02 If applicable, get interviewed by the
• Systems Analysts Admissions Director’s office.

ELIGIBILITY
Join the Program
• Bachelor's degree in engineering STEP 03
• Atleast 3 years of professional experience in Upon approval from the Director’s office,
Computer Science or IT you will receive an offer to enrol.
Admission Details
FEE DETAILS

Early Admission: USD 2495 Financial assistance


₹1,74,650 (approx.) Pay in 12 EMIs at 0% interest rate
Regular fee: USD 3045 with ZestMoney
(This fee will apply once early admission is completed)
Fee includes tuition fee + learning material +
mentorship

Payment options
• Candidates can pay the program fee
through netbanking, credit/debit cards,
cheque/DD.
• Pay the full fee upfront, and avail benefits, or pay
in two easy installments.
About Us

The Stanford Center for Professional Development, a part of The Office of the Vice Provost for Teaching and Learning (VPTL),
makes it possible for today's best and brightest professionals to enrol in Stanford University courses and programs while they
maintain their careers. Their portfolio reflects the exciting research and world-class teaching of Stanford faculty from all of Stan-
ford’s schools. Courses are delivered online and, in some cases, at Stanford, at your work site, or at international locations -
providing a global community of learners with flexibility and convenience and enabling them to apply their education to their
work.

Great Learning's mission is to enable career success in the Digital Economy. Its programs always focus on the next frontier of
growth in industry, and spans across Analytics, Data Science, Big Data, Machine Learning, Artificial Intelligence, Deep
Learning, Cloud Computing, Cybersecurity and more. Great Learning’s emphasis on mentored and peer learning provide a
robust support structure to help learners attain mastery of the areas they learn. By combining technology, high-quality content,
and industry collaboration, learners gain an immersive learning experience and the ability to apply and demonstrate their
competencies. All programs are offered in collaboration with leading global universities and are taken by thousands of
professionals every year to secure and grow their careers.
+91- 9606027054

cybersecurity@greatlearning.in

greatlearning.in

Ver. 4_12_2018