Uploaded by Arun Raj

Stanford Advanced Computer Security Program Brochure

advertisement
Master Cybersecurity with the
Stanford Advanced
Computer
Security Program
A Program by:
Delivered and Supported by:
Securing
your digital
future
There has never been a better time to
build your cybersecurity skills. The
threat of cybercrime and the cost of
security lapses are getting ever higher.
At the same time, businesses big and
small are moving all their operations
online. All of this has resulted in a
massive increase in demand for
in-house and consulting cybersecurity
experts.
The need for a dedicated cybersecurity
team is so widespread that nearly 70%
of businesses feel the desperate need
for cybersecurity skills. This translates
to nearly 3.5 million jobs unfilled in this
area by 2021. For the skilled
cybersecurity professional, this is an
immense opportunity to make a really
big impact in an organization.
So what constitutes a skilled
cybersecurity professional? Each asset
of the company is not made the same.
Some are more important and critical
than others, and if disrupted, can bring
the entire system to a halt. This is
important to note because a company
cannot plough all their resources into
monitoring and fortifying every single
one of their assets. The cybersecurity
team’s responsibility is to identify these
critical components and devise a
strategy to secure them and thwart any
interruption to the services of the
company. A competent cybersecurity
expert is proactive, rather than being
just reactive to security attacks when
they happen. They set up detection
systems that alert them before an
attack is about to happen by constantly
monitoring for any suspicious traffic.
They are also able to advise the
engineering team to hard-wire security
features in their code to build a robust
system. In order to impart
industry-relevant cybersecurity
expertise to professionals facing such
challenges, the Stanford Center for
Professional Development is offering
the Advanced Computer Security
Program. It is taught by experts from
one of the world's best computer
science schools, and offers
comprehensive cybersecurity skills.
Program Benefits
Get the Stanford Center for Professional Development advantage
Build cutting-edge cybersecurity skills with a pioneering computer science school
Get a certificate from Stanford Center for Professional Development
Showcase your skills with a certificate from the Stanford Center for Professional Development
Internationally renowned faculty
Learn from pioneers in the field of cybersecurity, both in research and industry
Mentorship from industry experts
Learn the tricks of the trade from seasoned cybersecurity practitioners
Gain practical cybersecurity experience
Work on hands-on projects that develop your ability to solve real-world problems
Learn with minimal disruption to your job
Completely online learning experience that’s both convenient and immersive
Program
Structure
This 6-month structured
program will help you gain
advanced skills needed to
protect networks, secure
electronic assets, prevent
attacks, ensure the privacy of
your customers, and build
secure infrastructures.
World class learning material
Online content distilled from latest research and
best practices by leading cybersecurity
professionals and Stanford faculty.
Gain real-world insights
Get access to exclusive insights from senior
industry practitioners from leading organizations
such as Google, LinkedIn and Data Theorem.
Peer-to-Peer Learning
Learn from highly accomplished peers. Participate
in discussions, engage in community
problem-solving and build your network.
Hands-on projects
Gain industry-relevant skills through hands-on
projects. Apply what you’ve learnt to real-world
problems and build your professional portfolio.
Curriculum
Mobile Security
Exploiting and Protecting Web Applications
• Mobile application security measures
• Models to develop and secure Android
applications
• Security detection and measures in iOS
• Trends in mobile device management (MDM)
• Overview of Web Technologies (HTTP, cookies,
JavaScript, caching, session management)
• Browser Security Model (document object model,
same-origin-policy and violations of it), and SSL
• Coverage of HTML5 vulnerabilities due to frame
communication, localstorage, cross-origin resource
sharing, and other HTML5 features
• SQL Injection (and other forms of command injection
including LDAP and XPath Injection)
• Cross-Site Scripting (XSS), Cross-Site Request
Forgery (XSRF), and Cross-Site Script Inclusion
(XSSI), Clickjacking
• Prevention techniques including input validation,
output escaping, signatures, message authentication
codes, and frame busting
EXCLUSIVE INTERVIEWS
• Himanshu Dwivedi, Chief Executive OfficeData
Theorem
• Mukul Khullar, Staff Information Security Engineer,
LinkedIn.
Curriculum
Using Cryptography Correctly
Emerging Threats and Defences
•
•
•
•
•
•
•
•
•
•
•
•
Introduction to Cryptography
Using Cryptography Correctly
Advanced Topics in Cryptography
Symmetric Encryption
Public-Key Cryptography
User Authentication
Network Security
• Security Application measures
• How to idenitfy operating system holes
• The important interplay of privacy and
digital rights management
• Trends in malware, privacy and security for
mobile devices
• Ways to prevent network attacks and gaps in
security policy
Advanced persistent threats and mobile threats
Cloud trust assumptions and threat models
Machine learning use for detection and defenses
Network traffic analysis, web trafficking and defenses
SSL/TLS protocol and authentication infrastructure
Trusted cloud hardware and advanced cryptographic
solutions
Writing Secure Code
•
•
•
•
•
•
Control Hijacking Attacks and Defenses
Attacks Using Virtual Machines
Tools for Writing Code Securely
Static and Dynamic Analysis
Language-based Security Models
Isolation Techniques
Projects
Exploit a Web Application
Exploit a Vulnerable Linux virtual machine
Exploiting the web app using various injection
techniques and other vulnerabilities.
Port scanning with Nmap, packet sniffing using
Wireshark and exploiting the Linux machine
using Metasploit.
VULNERABILITIES COVERED
•
•
•
•
•
•
•
SQL Injection
Xpath
LDAP
XSS
XSRF
MITM
Session Management
TOOLS USED
• Kali Linux
• OWASP BWA(Contains Vulnerable
Web application)
• Burp Suite(Intercepter)
VULNERABILITIES COVERED
•
•
•
•
Backdoor Code Execution
Open Ports
Remote Downloader
Dos
TOOLS USED
•
•
•
•
•
Kali Linux
Metasploitable(vulnerable Linux machine)
Nmap(port scanning tool)
Wireshark(packet sniffing tool)
Metasploit(a tool for developing and executing
exploit code against a remote target machine)
Projects
Mechanics of various flaws that occur while writing code
VULNERABILITIES COVERED
•
•
•
•
•
Stack Smashing
Function Pointers
Smashing Integers
Format Strings
Fuzzing With American Fuzzylop
TOOLS USED
• Vs code (an ide with an integrated terminal)
Stanford Faculty
DAN BONEH
JOHN C. MITCHELL
NEIL DASWANI
Dan Boneh is a Professor of Computer
Science and Electrical Engineering at
Stanford University. He obtained his PhD
in Computer Science from Princeton
University. In 2002, he co-founded a
company called Voltage Security which
was acquired by Hewlett Packard in
2015. In 2018, Boneh became
co-director of the Center for Blockchain
Research at Stanford.
John C. Mitchell is the co-director of the
Stanford Computer Security Lab and a
Professor of Computer Science and
Electrical Engineering at Stanford
University. He was the Vice Provost for
Teaching and Learning at Stanford
University, and is a member of the
steering committee for Stanford
University's Cyber Initiative.
Neil Daswani is a co-director of the
Stanford Advanced Security
Certification Program and an expert in
web application security. He is the lead
author of the book "Foundations of
Security: What Every Programmer
Needs To Know." In 2008, he
co-founded Dasient, a web security
company. Daswani was previously the
Chief Information Security Officer at
Lifelock, which was later acquired by
Symantec.
Industry Experts
SUBHAJIT DEB
NIRMALLYA MUKHERJEE
Subhajit is an security leader with 16+ years of experience.
Apart from a Six Sigma Green Belt and various other
security certifications, he currently has 2 US Patent granted,
2 US Patents filed and 4 Bank of America Trade Secrets
submitted towards different areas of Information Security and
Risk Management. Subhajit has won several awards in the
information and cyber security domain including the Top 100
CISOs.
With over two and half decades of cross domain experience
in IT and ITES across both services and products, Nirmallya
Mukherjee has served as Chief Architect at Dell, Principal
Architect at Infosys and Technical Architect at Ciber Inc, an
HTC Global Services company. He lends his expertise to
various multinationals like Cisco, Walmart Labs, Amadeus,
Mercedes Benz, ANZ, Societe Generale etc. through his
consulting, development and training engagements.
Admission Details
WHO IS THIS PROGRAM FOR?
This program is suited for professionals working in roles
that include:
• Information Technology Professionals
• Software Developers
• Network Security Engineers
• Software Engineers
• App Developers
• System Architects
• Systems Analysts
ELIGIBILITY
• IT knowledge either through academics or work
experience
SELECTION PROCESS
STEP 01
STEP 02
STEP 03
Apply
Fill an online application form.
Evaluation
If applicable, get interviewed by the
Admissions Director’s office.
Join the Program
Upon approval from the Director’s office,
you will receive an offer to enrol.
Admission Details
FEE DETAILS
Early Admission: USD 2495
₹1,74,650 (approx.)
Regular fee: USD 3045
(This fee will apply once early admission is completed)
Fee includes tuition fee + learning material +
mentorship
Payment options
• Candidates can pay the program fee
through netbanking, credit/debit cards,
cheque/DD.
• Pay the full fee upfront, and avail benefits, or pay
in two easy installments.
Financial assistance
Pay in 12 EMIs at 0% interest rate
with ZestMoney
About Us
The Stanford Center for Professional Development, a part of The Office of the Vice Provost for Teaching and Learning (VPTL),
makes it possible for today's best and brightest professionals to enrol in Stanford University courses and programs while they
maintain their careers. Their portfolio reflects the exciting research and world-class teaching of Stanford faculty from all of Stanford’s schools. Courses are delivered online and, in some cases, at Stanford, at your work site, or at international locations providing a global community of learners with flexibility and convenience and enabling them to apply their education to their
work.
Great Learning's mission is to enable career success in the Digital Economy. Its programs always focus on the next frontier of
growth in industry, and spans across Analytics, Data Science, Big Data, Machine Learning, Artificial Intelligence, Deep
Learning, Cloud Computing, Cybersecurity and more. Great Learning’s emphasis on mentored and peer learning provide a
robust support structure to help learners attain mastery of the areas they learn. By combining technology, high-quality content,
and industry collaboration, learners gain an immersive learning experience and the ability to apply and demonstrate their
competencies. All programs are offered in collaboration with leading global universities and are taken by thousands of
professionals every year to secure and grow their careers.
+91- 9606027054
cybersecurity@greatlearning.in
greatlearning.in
Ver. 4_12_2018
Download