11
PROFESSIONAL PROGRAMS PGP in Ethical Hacking & Cybersecurity Online Interactive Course Duration: 6 Months Price: ` 81,500/- ` 65,500/- (Inclusive of Taxes)

PGP in Ethical Hacking & Cybersecurity · 2020-06-10 · Fundamentals of Ethical Hacking and Penetration Testing Advanced Wireless Hacking and Penetration Testing Mobile Device Security

  • Upload
    others

  • View
    16

  • Download
    1

Embed Size (px)

Citation preview

Page 1: PGP in Ethical Hacking & Cybersecurity · 2020-06-10 · Fundamentals of Ethical Hacking and Penetration Testing Advanced Wireless Hacking and Penetration Testing Mobile Device Security

P R O F E S S I O N A LP R O G R A M S

PGP in Ethical Hacking& Cybersecurity

Online Interactive Course

Duration: 6 MonthsPrice: ` 81,500/- ` 65,500/-(Inclusive of Taxes)

Page 2: PGP in Ethical Hacking & Cybersecurity · 2020-06-10 · Fundamentals of Ethical Hacking and Penetration Testing Advanced Wireless Hacking and Penetration Testing Mobile Device Security

WHY STUDY CYBERSECURITY?The Internet era has witnessed a host of new threats including phishing, ransomware, malware, data breaches and a disturbing string of cyber-attacks across blue chip corporations and government entities a like.

Billions of personal records are exposed and leaked each year, affecting an alarming percentage of the total world population. For corporations, the fallout includes lawsuits, loss of customer trust, anddeclining revenues. As wave after wave of high-profile cyber-attacks strike home, organizations around the world have no choice but to take cybersecurity more seriously than ever.

As threats continue to escalate, the cybersecurity talent shortage has become more and more severe. For every professional that gets trained, multiple new opportunities open up with leading corporations around the world, many of which lie unfilled waiting on the right candidate. According to a report by BurningGlass, cybersecurity job postings have grown 94% since 2013, compared to only 30% for ITpositions overall. In other words, Cybersecurity positions are growing three times faster than IT overall. This is a bright opportunity for people who are skilled in cybersecurity concepts and technologies.

Pearson’s Post Graduate Program in Ethical Hacking & Cybersecurity is taught by world leadingcybersecurity experts to help professionals gain industry relevant cybersecurity expertise that they need to make the most of this career opportunity.

Page 3: PGP in Ethical Hacking & Cybersecurity · 2020-06-10 · Fundamentals of Ethical Hacking and Penetration Testing Advanced Wireless Hacking and Penetration Testing Mobile Device Security

ABOUT THE PROGRAMPearson’s Post Graduate Program in Ethical Hacking & Cybersecurity is a comprehensive credential designed to bring you to the cutting edge of cybersecurity across a wide range of applications and tools. It teaches industry relevant concepts and skills to protect data, information and hardware assets from cyberthreats in the form of ransomware, malware,phishing and data breaches. It includes two cybersecurity projects which get students hands-on applying concepts in real-life cyber warfare situations. The program also prepares learners for industry recognized professional certificates like Certified Ethical Hacker (CEH) and Certified Information Systems Security Professional (CISSP). These are highly valued in the cybersecurity community and provide an edge to the learners over others in the job market.

PROGRAM HIGHLIGHTSLeading Cybersecurity Instructors: Learn from internationally renowned cybersecurity experts

Technology in Action: Concepts are demonstrated with plenty of real-life use cases

Mentorship From Industry Experts: Learn tips and tricks from Industry experts

Learn Anytime, Anywhere: Learn at your pace on any device for minimum disruption to your job and family life.

Flaunt Your Skills: Receive a certificate from Pearson, the world's leader in professional learning, and showcase your skills within and outside of your organization.

CISO Hackathons: Top performers in each of two projects get a chance to further refine and showcase their skills to Chief Information Security Officers (CISO) and receive feedback and critical inputs on their work.

Page 4: PGP in Ethical Hacking & Cybersecurity · 2020-06-10 · Fundamentals of Ethical Hacking and Penetration Testing Advanced Wireless Hacking and Penetration Testing Mobile Device Security

Cyber security demand isacross sectors like

Banking E-commerce Engineering Healthcare Customer-oriented products and services

Cyber securityjob postings grew by

94%since 2013

59%of all cyber securitypositions require atleast 1 certification

Cyber security openings

growth is 3Xthat of IT jobs overall

Global shortage ofcyber security professionalsby almost 3 million

Page 5: PGP in Ethical Hacking & Cybersecurity · 2020-06-10 · Fundamentals of Ethical Hacking and Penetration Testing Advanced Wireless Hacking and Penetration Testing Mobile Device Security

PROGRAM STRUCTUREThe 6-month Pearson Post-Graduate Program in Ethical Hacking & Cybersecurity comprises of: World-Class Online Content: 118 hours of self-paced high definition video content, designed for accelerated professional learning.

Weekly Doubt Clearing Sessions: Stay ahead of the curve and avoid falling behind thanks to weekly live online sessions with Pearson experts. These sessions answer all student queries in an organized and easy to understand format.

CISO Hackathons: Top performers in each of two projects get a chance to further refine and showcase their skills to Chief Information Security Officers (CISO) and receive feedback and critical inputs on their work.

Rigorous Assessments: Each of nine modules is followed by a formal assessment to gauge student progress and set strict completion criteria.

Hands on Projects: Two exciting projects for all-round practical application and understanding of key concepts

Page 6: PGP in Ethical Hacking & Cybersecurity · 2020-06-10 · Fundamentals of Ethical Hacking and Penetration Testing Advanced Wireless Hacking and Penetration Testing Mobile Device Security

Wireless Networks, IoT & Mobile Device HackingIntroducing WirelessWireless Client AttacksBuilding Your Lab and Attack HardwareAircrack-ngCracking WEPHacking WPAPerforming Wireless ReconnaissanceEvil Twins and Rogue Access Points

Module 3:

Hacking Web ApplicationsIntroduction to Web Application Penetration Testing

Overview of Web Applications for Security Professionals

Build Your Own Web Application Lab

Reconnaissance and Profiling Web Applications

Authentication and Session Management Vulnerabilities

Exploiting Injection-Based Vulnerabilities

Cross-Site Scripting (XSS) and Cross-Site Request Forgery

Vulnerabilities

Exploiting Weak Cryptographic Implementations

Attacking Application Programming Interfaces (APIs)

Client-side Attacks

Additional Web Application Security Vulnerabilities and

Attacks

Module 1:

Enterprise Penetration Testing and Continuous MonitoringIntroduction to Enterprise Penetration

Testing and Continuous Monitoring

External and Internal Reconnaissance

Enterprise Social Engineering

Network and Vulnerability Scanning

Web App Testing

Internal Testing

Privilege Escalation

Enterprise Secrets, Post Exploitation, and

Data Exfiltration

Cloud Services

Reporting & Continuous Evaluation

Module 2:

Security Penetration TestingOverview of Ethical Hacking and PenetrationTestingKali LinuxPassive ReconnaissanceActive ReconnaissanceHacking Web ApplicationsHacking User CredentialsHacking DatabasesHacking Networking DevicesFundamentals of Wireless HackingBuffer OverflowsPowershell AttacksEvasion and Post Exploitation TechniquesSocial EngineeringMaintaining Persistence, Pivoting, and DataExfiltration Writing Penetration Testing Reports

Module 4:

Module Details

Page 7: PGP in Ethical Hacking & Cybersecurity · 2020-06-10 · Fundamentals of Ethical Hacking and Penetration Testing Advanced Wireless Hacking and Penetration Testing Mobile Device Security

Certified Ethical HackerSecurity Essentials

System Security

Network Security

Web Services Security

Wireless and Internet Security

Module 7:

The Complete Cybersecurity BootcampNetworking and Security Basics

Cybersecurity Management, Monitoring, and Analysis

Network Security Telemetry

Digital Forensics and Incident Response (DFIR)

Fundamentals of Ethical Hacking and Penetration Testing

Advanced Wireless Hacking and Penetration Testing

Mobile Device Security

Internet of Things (IoT) Security

Module 5:

CompTIA Security+ (SY0 – 501)Threats, Attacks and VulnerabilitiesTools and TechnologiesArchitecture and DesignIdentity and Access ManagementRisk ManagementCryptography and PKIAcing the Exam

Module 6:

CISSP Exam PreparationPreparing for the ExamChallenging Topics and ConceptsCISSP Exam and Beyond

Module 9:

Certified Information Systems SecurityProfessional (CISSP)Security and Risk ManagementAsset Security Security Architecture and Engineering Communication and Network Security Identity and Access Management (IAM) Security Assessment and Testing Security Operations Software Development Security Becoming a CISSP

Module 8:

Page 8: PGP in Ethical Hacking & Cybersecurity · 2020-06-10 · Fundamentals of Ethical Hacking and Penetration Testing Advanced Wireless Hacking and Penetration Testing Mobile Device Security

FACULTY DETAILS Sari Greene Cybersecurity Excellence Award Winner | Author | Entrepreneur | Educator Sari Greene is an information security practitioner, author, and entrepreneur. In 2003, Sari founded one of the first dedicated cybersecurity consultancies - Sage Data Security. She is a

recognized leader in the field of cybersecurity and has amassed thousands of hours working with global

organizations and experts. Sari authored the top selling book Sustainable Information Security and has published

many articles related to cybersecurity. She has been quoted in the New York Times, Wall Street Journal, CNN etc.

and speaks regularly at cybersecurity conferences.

In recent times, she has won the coveted Cybersecurity Excellence Awards in 2018. Currently, she serves on the

Bangor Savings Bank Board of Directors and is chair of the Enterprise Risk Management Committee.

Omar Santos Principal Engineer Cisco Product Security Incident Response Team (PSIRT)

Cisco's Security Research and Operations

Omar is a principal engineer of the Cisco Product Security Incident Response Team (PSIRT), where he mentors and

leads engineers and incident managers during the investigation and resolution of cyber security vulnerabilities.

Omar has designed, implemented, and supported numerous secure networks for Fortune 100 and 500 companies

and the U.S. government. He has also created a virtual machine- WebSpoilt for ethical hacking and web

penetration testing.

Page 9: PGP in Ethical Hacking & Cybersecurity · 2020-06-10 · Fundamentals of Ethical Hacking and Penetration Testing Advanced Wireless Hacking and Penetration Testing Mobile Device Security

FACULTY DETAILS Sari Greene Cybersecurity Excellence Award Winner | Author | Entrepreneur | Educator Sari Greene is an information security practitioner, author, and entrepreneur. In 2003, Sari founded one of the first dedicated cybersecurity consultancies - Sage Data Security. She is a

recognized leader in the field of cybersecurity and has amassed thousands of hours working with global

organizations and experts. Sari authored the top selling book Sustainable Information Security and has published

many articles related to cybersecurity. She has been quoted in the New York Times, Wall Street Journal, CNN etc.

and speaks regularly at cybersecurity conferences.

In recent times, she has won the coveted Cybersecurity Excellence Awards in 2018. Currently, she serves on the

Bangor Savings Bank Board of Directors and is chair of the Enterprise Risk Management Committee.

Omar Santos Principal Engineer Cisco Product Security Incident Response Team (PSIRT)

Cisco's Security Research and Operations

Omar is a principal engineer of the Cisco Product Security Incident Response Team (PSIRT), where he mentors and

leads engineers and incident managers during the investigation and resolution of cyber security vulnerabilities.

Omar has designed, implemented, and supported numerous secure networks for Fortune 100 and 500 companies

and the U.S. government. He has also created a virtual machine- WebSpoilt for ethical hacking and web

penetration testing.

Chris McCoy Technical Leader Cisco's Advanced Security Initiatives Group (ASIG)

Chris McCoy is a technical leader in Cisco's Advanced Security Initiatives Group (ASIG). He has over 20 years’

experience in designing, operating, testing and securing enterprise & service provider internetworks. He has a

passion for computer security, finding flaws in mission-critical systems, and designing mitigations to thwart

motivated and resourceful adversaries.

Jon Sternstein Founder and Principal Consultant Stern Security

Jon Sternstein is the Founder and Principal Consultant of Stern Security, a security company focused on healthcare

and credit union industries. He has been a lead contributor to securing a large number of organizations

throughout his 13+ years in the security field. During this time, Jon has been a featured Cyber Security Expert on

ABC News, WRAL News, and Business North Carolina Magazine. He holds multiple certifications: Certified Ethical

Hacker (CEH), CISSP, CCNA, GPEN and has won Ethical Hacking Competition awards.

WHO IS IT FOR?Anyone interested in learning cyber security and preparing for various cybersecurity exams

Any network and security professional who is building their career in ethical hacking and penetration testing.

Program Requirements

Applicants must hold an undergraduate degree (preferably in Software or Electrical Engineering) and a minimum

of 2 years experience in IT, programming and/or networking areas.

Page 10: PGP in Ethical Hacking & Cybersecurity · 2020-06-10 · Fundamentals of Ethical Hacking and Penetration Testing Advanced Wireless Hacking and Penetration Testing Mobile Device Security

ABOUT PEARSONWe are the world’s learning company with more than 24,000 employees operating in 70 countries. We combine

world-class educational content and assessment, powered by services and technology, to enable more effective

teaching and personalized learning at scale. We believe that wherever learning flourishes so do people.

PROGRAM VITALS

4-5 HoursPer Week

Time Commitment

6 Months

Program Fee

` 81,500/-` 65,500/-(Inclusive of Taxes)

Course start date

11th November, 2019

Loan Facility Available

Debit and Credit cards accepted

3/6/9/12 months EMI optionsavailable 0% interest

Visit website to pay

Page 11: PGP in Ethical Hacking & Cybersecurity · 2020-06-10 · Fundamentals of Ethical Hacking and Penetration Testing Advanced Wireless Hacking and Penetration Testing Mobile Device Security

Contact [email protected]://in.pearson.com/ppp

0124 - 4185100

Pearson Professional Programs,Vatika First Indian Place, Tower C,Ground Floor (Near M.G. RoadMetro Stationa), Gurugram, India

THIS IS TO CERTIFY THAT

Pearson Professional Programs

HAS SUCCESSFULLY COMPLETED THE PROGRAM

Divesh Nigam