Master Cybersecurity with the Stanford Advanced Computer Security Program A Program by: Delivered and Supported by: Securing your digital future There has never been a better time to build your cybersecurity skills. The threat of cybercrime and the cost of security lapses are getting ever higher. At the same time, businesses big and small are moving all their operations online. All of this has resulted in a massive increase in demand for in-house and consulting cybersecurity experts. The need for a dedicated cybersecurity team is so widespread that nearly 70% of businesses feel the desperate need for cybersecurity skills. This translates to nearly 3.5 million jobs unfilled in this area by 2021. For the skilled cybersecurity professional, this is an immense opportunity to make a really big impact in an organization. So what constitutes a skilled cybersecurity professional? Each asset of the company is not made the same. Some are more important and critical than others, and if disrupted, can bring the entire system to a halt. This is important to note because a company cannot plough all their resources into monitoring and fortifying every single one of their assets. The cybersecurity team’s responsibility is to identify these critical components and devise a strategy to secure them and thwart any interruption to the services of the company. A competent cybersecurity expert is proactive, rather than being just reactive to security attacks when they happen. They set up detection systems that alert them before an attack is about to happen by constantly monitoring for any suspicious traffic. They are also able to advise the engineering team to hard-wire security features in their code to build a robust system. In order to impart industry-relevant cybersecurity expertise to professionals facing such challenges, the Stanford Center for Professional Development is offering the Advanced Computer Security Program. It is taught by experts from one of the world's best computer science schools, and offers comprehensive cybersecurity skills. Program Benefits Get the Stanford Center for Professional Development advantage Build cutting-edge cybersecurity skills with a pioneering computer science school Get a certificate from Stanford Center for Professional Development Showcase your skills with a certificate from the Stanford Center for Professional Development Internationally renowned faculty Learn from pioneers in the field of cybersecurity, both in research and industry Mentorship from industry experts Learn the tricks of the trade from seasoned cybersecurity practitioners Gain practical cybersecurity experience Work on hands-on projects that develop your ability to solve real-world problems Learn with minimal disruption to your job Completely online learning experience that’s both convenient and immersive Program Structure This 6-month structured program will help you gain advanced skills needed to protect networks, secure electronic assets, prevent attacks, ensure the privacy of your customers, and build secure infrastructures. World class learning material Online content distilled from latest research and best practices by leading cybersecurity professionals and Stanford faculty. Gain real-world insights Get access to exclusive insights from senior industry practitioners from leading organizations such as Google, LinkedIn and Data Theorem. Peer-to-Peer Learning Learn from highly accomplished peers. Participate in discussions, engage in community problem-solving and build your network. Hands-on projects Gain industry-relevant skills through hands-on projects. Apply what you’ve learnt to real-world problems and build your professional portfolio. Curriculum Mobile Security Exploiting and Protecting Web Applications • Mobile application security measures • Models to develop and secure Android applications • Security detection and measures in iOS • Trends in mobile device management (MDM) • Overview of Web Technologies (HTTP, cookies, JavaScript, caching, session management) • Browser Security Model (document object model, same-origin-policy and violations of it), and SSL • Coverage of HTML5 vulnerabilities due to frame communication, localstorage, cross-origin resource sharing, and other HTML5 features • SQL Injection (and other forms of command injection including LDAP and XPath Injection) • Cross-Site Scripting (XSS), Cross-Site Request Forgery (XSRF), and Cross-Site Script Inclusion (XSSI), Clickjacking • Prevention techniques including input validation, output escaping, signatures, message authentication codes, and frame busting EXCLUSIVE INTERVIEWS • Himanshu Dwivedi, Chief Executive OfficeData Theorem • Mukul Khullar, Staff Information Security Engineer, LinkedIn. Curriculum Using Cryptography Correctly Emerging Threats and Defences • • • • • • • • • • • • Introduction to Cryptography Using Cryptography Correctly Advanced Topics in Cryptography Symmetric Encryption Public-Key Cryptography User Authentication Network Security • Security Application measures • How to idenitfy operating system holes • The important interplay of privacy and digital rights management • Trends in malware, privacy and security for mobile devices • Ways to prevent network attacks and gaps in security policy Advanced persistent threats and mobile threats Cloud trust assumptions and threat models Machine learning use for detection and defenses Network traffic analysis, web trafficking and defenses SSL/TLS protocol and authentication infrastructure Trusted cloud hardware and advanced cryptographic solutions Writing Secure Code • • • • • • Control Hijacking Attacks and Defenses Attacks Using Virtual Machines Tools for Writing Code Securely Static and Dynamic Analysis Language-based Security Models Isolation Techniques Projects Exploit a Web Application Exploit a Vulnerable Linux virtual machine Exploiting the web app using various injection techniques and other vulnerabilities. Port scanning with Nmap, packet sniffing using Wireshark and exploiting the Linux machine using Metasploit. VULNERABILITIES COVERED • • • • • • • SQL Injection Xpath LDAP XSS XSRF MITM Session Management TOOLS USED • Kali Linux • OWASP BWA(Contains Vulnerable Web application) • Burp Suite(Intercepter) VULNERABILITIES COVERED • • • • Backdoor Code Execution Open Ports Remote Downloader Dos TOOLS USED • • • • • Kali Linux Metasploitable(vulnerable Linux machine) Nmap(port scanning tool) Wireshark(packet sniffing tool) Metasploit(a tool for developing and executing exploit code against a remote target machine) Projects Mechanics of various flaws that occur while writing code VULNERABILITIES COVERED • • • • • Stack Smashing Function Pointers Smashing Integers Format Strings Fuzzing With American Fuzzylop TOOLS USED • Vs code (an ide with an integrated terminal) Stanford Faculty DAN BONEH JOHN C. MITCHELL NEIL DASWANI Dan Boneh is a Professor of Computer Science and Electrical Engineering at Stanford University. He obtained his PhD in Computer Science from Princeton University. In 2002, he co-founded a company called Voltage Security which was acquired by Hewlett Packard in 2015. In 2018, Boneh became co-director of the Center for Blockchain Research at Stanford. John C. Mitchell is the co-director of the Stanford Computer Security Lab and a Professor of Computer Science and Electrical Engineering at Stanford University. He was the Vice Provost for Teaching and Learning at Stanford University, and is a member of the steering committee for Stanford University's Cyber Initiative. Neil Daswani is a co-director of the Stanford Advanced Security Certification Program and an expert in web application security. He is the lead author of the book "Foundations of Security: What Every Programmer Needs To Know." In 2008, he co-founded Dasient, a web security company. Daswani was previously the Chief Information Security Officer at Lifelock, which was later acquired by Symantec. Industry Experts SUBHAJIT DEB NIRMALLYA MUKHERJEE Subhajit is an security leader with 16+ years of experience. Apart from a Six Sigma Green Belt and various other security certifications, he currently has 2 US Patent granted, 2 US Patents filed and 4 Bank of America Trade Secrets submitted towards different areas of Information Security and Risk Management. Subhajit has won several awards in the information and cyber security domain including the Top 100 CISOs. With over two and half decades of cross domain experience in IT and ITES across both services and products, Nirmallya Mukherjee has served as Chief Architect at Dell, Principal Architect at Infosys and Technical Architect at Ciber Inc, an HTC Global Services company. He lends his expertise to various multinationals like Cisco, Walmart Labs, Amadeus, Mercedes Benz, ANZ, Societe Generale etc. through his consulting, development and training engagements. Admission Details WHO IS THIS PROGRAM FOR? This program is suited for professionals working in roles that include: • Information Technology Professionals • Software Developers • Network Security Engineers • Software Engineers • App Developers • System Architects • Systems Analysts ELIGIBILITY • IT knowledge either through academics or work experience SELECTION PROCESS STEP 01 STEP 02 STEP 03 Apply Fill an online application form. Evaluation If applicable, get interviewed by the Admissions Director’s office. Join the Program Upon approval from the Director’s office, you will receive an offer to enrol. Admission Details FEE DETAILS Early Admission: USD 2495 ₹1,74,650 (approx.) Regular fee: USD 3045 (This fee will apply once early admission is completed) Fee includes tuition fee + learning material + mentorship Payment options • Candidates can pay the program fee through netbanking, credit/debit cards, cheque/DD. • Pay the full fee upfront, and avail benefits, or pay in two easy installments. Financial assistance Pay in 12 EMIs at 0% interest rate with ZestMoney About Us The Stanford Center for Professional Development, a part of The Office of the Vice Provost for Teaching and Learning (VPTL), makes it possible for today's best and brightest professionals to enrol in Stanford University courses and programs while they maintain their careers. Their portfolio reflects the exciting research and world-class teaching of Stanford faculty from all of Stanford’s schools. Courses are delivered online and, in some cases, at Stanford, at your work site, or at international locations providing a global community of learners with flexibility and convenience and enabling them to apply their education to their work. Great Learning's mission is to enable career success in the Digital Economy. Its programs always focus on the next frontier of growth in industry, and spans across Analytics, Data Science, Big Data, Machine Learning, Artificial Intelligence, Deep Learning, Cloud Computing, Cybersecurity and more. Great Learning’s emphasis on mentored and peer learning provide a robust support structure to help learners attain mastery of the areas they learn. By combining technology, high-quality content, and industry collaboration, learners gain an immersive learning experience and the ability to apply and demonstrate their competencies. All programs are offered in collaboration with leading global universities and are taken by thousands of professionals every year to secure and grow their careers. +91- 9606027054 cybersecurity@greatlearning.in greatlearning.in Ver. 4_12_2018