PGP In Ethical Hacking & Cybersecurity

Transcription

PROFESSIONALPROGRAMSPGP in Ethical Hacking& CybersecurityOnline Interactive CoursePrice: 81,500/-Duration: 6 Months

WHY STUDY CYBERSECURITY?The Internet era has witnessed a host of new threats including phishing, ransomware, malware, databreaches and a disturbing string of cyber-attacks across blue chip corporations and government entitiesa like.Billions of personal records are exposed and leaked each year, affecting an alarming percentage of thetotal world population. For corporations, the fallout includes lawsuits, loss of customer trust, anddeclining revenues. As wave after wave of high-profile cyber-attacks strike home, organizations aroundthe world have no choice but to take cybersecurity more seriously than ever.As threats continue to escalate, the cybersecurity talent shortage has become more and more severe.For every professional that gets trained, multiple new opportunities open up with leading corporationsaround the world, many of which lie unfilled waiting on the right candidate. According to a report byBurningGlass, cybersecurity job postings have grown 94% since 2013, compared to only 30% for ITpositions overall. In other words, Cybersecurity positions are growing three times faster than IT overall.This is a bright opportunity for people who are skilled in cybersecurity concepts and technologies.Pearson’s Post Graduate Program in Ethical Hacking & Cybersecurity is taught by world leadingcybersecurity experts to help professionals gain industry relevant cybersecurity expertise that theyneed to make the most of this career opportunity.

ABOUT THE PROGRAMPearson’s Post Graduate Program in Ethical Hacking & Cybersecurity is a comprehensive credential designed to bring youto the cutting edge of cybersecurity across a wide range of applications and tools. It teaches industry relevant conceptsand skills to protect data, information and hardware assets from cyberthreats in the form of ransomware, malware,phishing and data breaches. It includes two cybersecurity projects which get students hands-on applying concepts inreal-life cyber warfare situations. The program also prepares learners for industry recognized professionalcertificates like Certified Ethical Hacker (CEH) and Certified Information Systems Security Professional(CISSP). These are highly valued in the cybersecurity community and provide an edge to the learners overothers in the job market.PROGRAM HIGHLIGHTSLeading Cybersecurity Instructors: Learn from internationally renowned cybersecurity expertsTechnology in Action: Concepts are demonstrated with plenty of real-life use casesMentorship From Industry Experts: Learn tips and tricks from Industry expertsLearn Anytime, Anywhere: Learn at your pace on any device for minimum disruption to your job andfamily life.Flaunt Your Skills: Receive a certificate from Pearson, the world's leader in professional learning, andshowcase your skills within and outside of your organization.CISO Hackathons: Top performers in each of two projects get a chance to further refine and showcase theirskills to Chief Information Security Officers (CISO) and receive feedback and critical inputs on their work.

Cyber security demand isacross sectors -orientedproducts and servicesCyber security openings3Xgrowth isthat of IT jobs overallGlobal shortage ofcyber security professionalsby almost 3 millionCyber securityjob postings grew by94%since 201359%of all cyber securitypositions require atleast 1 certification

PROGRAM STRUCTUREThe 6-month Pearson Post-Graduate Program in Ethical Hacking & Cybersecurity comprises of:World-Class Online Content: 118 hours of self-paced high definition video content, designed for acceleratedprofessional learning.Weekly Doubt Clearing Sessions: Stay ahead of the curve and avoid falling behind thanks to weekly liveonline sessions with Pearson experts. These sessions answer all student queries in an organized and easyto understand format.CISO Hackathons: Top performers in each of two projects get a chance to further refine and showcase theirskills to Chief Information Security Officers (CISO) and receive feedback and critical inputs on their work.Rigorous Assessments: Each of nine modules is followed by a formal assessment to gauge studentprogress and set strict completion criteria.Hands on Projects: Two exciting projects for all-round practical application and understanding of keyconcepts

Module DetailsModule 1:Module 2:Hacking Web ApplicationsEnterprise Penetration Testing andIntroduction to Web Application Penetration TestingContinuous MonitoringOverview of Web Applications for Security ProfessionalsIntroduction to Enterprise PenetrationBuild Your Own Web Application LabTesting and Continuous MonitoringReconnaissance and Profiling Web ApplicationsExternal and Internal ReconnaissanceAuthentication and Session Management VulnerabilitiesEnterprise Social EngineeringExploiting Injection-Based VulnerabilitiesNetwork and Vulnerability ScanningCross-Site Scripting (XSS) and Cross-Site Request ForgeryWeb App TestingVulnerabilitiesInternal TestingExploiting Weak Cryptographic ImplementationsPrivilege EscalationAttacking Application Programming Interfaces (APIs)Enterprise Secrets, Post Exploitation, andClient-side AttacksData ExfiltrationAdditional Web Application Security Vulnerabilities andCloud ServicesAttacksReporting & Continuous EvaluationModule 3:Wireless Networks, IoT & Mobile Device HackingIntroducing WirelessWireless Client AttacksBuilding Your Lab and Attack HardwareAircrack-ngCracking WEPHacking WPAPerforming Wireless ReconnaissanceEvil Twins and Rogue Access PointsModule 4:Security Penetration TestingOverview of Ethical Hacking and PenetrationTestingKali LinuxPassive ReconnaissanceActive ReconnaissanceHacking Web ApplicationsHacking User CredentialsHacking DatabasesHacking Networking DevicesFundamentals of Wireless HackingBuffer OverflowsPowershell AttacksEvasion and Post Exploitation TechniquesSocial EngineeringMaintaining Persistence, Pivoting, and DataExfiltration Writing Penetration TestingReports

Module 5:Module 6:The Complete Cybersecurity BootcampCompTIA Security (SY0 – 501)Networking and Security BasicsThreats, Attacks and VulnerabilitiesCybersecurity Management, Monitoring, and AnalysisTools and TechnologiesNetwork Security TelemetryArchitecture and DesignDigital Forensics and Incident Response (DFIR)Identity and Access ManagementFundamentals of Ethical Hacking and Penetration TestingRisk ManagementAdvanced Wireless Hacking and Penetration TestingCryptography and PKIMobile Device SecurityAcing the ExamInternet of Things (IoT) SecurityModule 7:Module 8:Certified Ethical HackerCertified Information Systems SecuritySecurity EssentialsProfessional (CISSP)System SecuritySecurity and Risk ManagementNetwork SecurityAsset SecurityWeb Services SecuritySecurity Architecture and EngineeringWireless and Internet SecurityCommunication and Network SecurityModule 9:Identity and Access Management (IAM)Security Assessment and TestingCISSP Exam PreparationSecurity OperationsPreparing for the ExamSoftware Development SecurityChallenging Topics and ConceptsBecoming a CISSPCISSP Exam and Beyond

FACULTY DETAILSSari GreeneCybersecurity Excellence Award Winner Author Entrepreneur EducatorSari Greene is an information security practitioner, author, and entrepreneur. In 2003,Sari founded one of the first dedicated cybersecurity consultancies - Sage Data Security. She is arecognized leader in the field of cybersecurity and has amassed thousands of hours working with global organizations and experts. Sari authored the top selling book Sustainable Information Security and has published manyarticles related to cybersecurity. She has been quoted in the New York Times, Wall Street Journal, CNN etc. andspeaks regularly at cybersecurity conferences.In recent times, she has won the coveted Cybersecurity Excellence Awards in 2018. Currently, she serves on theBangor Savings Bank Board of Directors and is chair of the Enterprise Risk Management Committee.Omar SantosPrincipal EngineerCisco Product Security Incident Response Team (PSIRT)Cisco's Security Research and OperationsOmar is a principal engineer of the Cisco Product Security Incident Response Team (PSIRT), where he mentors andleads engineers and incident managers during the investigation and resolution of cyber security vulnerabilities.Omar has designed, implemented, and supported numerous secure networks for Fortune 100 and 500 companiesand the U.S. government. He has also created a virtual machine- WebSpoilt for ethical hacking and web penetration testing.Omar is the author of more than 20 books and video courses in areas such as CCNA Security, Ethical Hacking andSecurity Penetration. He is currently serving as Chair of the OASIS Common Security Advisory Framework (CSAF)Technical Committee.

Chris McCoyTechnical LeaderCisco's Advanced Security Initiatives Group (ASIG)Chris McCoy is a technical leader in Cisco's Advanced Security Initiatives Group (ASIG). He has over 20 years’ experience in designing, operating, testing and securing enterprise & service provider internetworks. He has a passionfor computer security, finding flaws in mission-critical systems, and designing mitigations to thwart motivated andresourceful adversaries.Jon SternsteinFounder and Principal ConsultantStern SecurityJon Sternstein is the Founder and Principal Consultant of Stern Security, a security company focused on healthcareand credit union industries. He has been a lead contributor to securing a large number of organizations throughout his 13 years in the security field. During this time, Jon has been a featured Cyber Security Expert on ABCNews, WRAL News, and Business North Carolina Magazine. He holds multiple certifications: Certified Ethical Hacker(CEH), CISSP, CCNA, GPEN and has won Ethical Hacking Competition awards.WHO IS IT FOR?Anyone interested in learning cyber security and preparing for various cybersecurity examsAny network and security professional who is building their career in ethical hacking and penetration testing.Program RequirementsApplicants must hold an undergraduate degree (preferably in Software or Electrical Engineering) and a minimumof 2 years experience in IT, programming and/or networking areas.

PROGRAM VITALSTime CommitmentProgram FeeCourse start date6 Months 81,500/-11th November, 20194-5 HoursPer WeekDebit and Credit cardsacceptedVisit website to payLoan Facility Available3/6/9/12 months EMI optionsavailable 0% interestABOUT PEARSONWe are the world's largest education company, with over 35,000 employees in more than 70 countries helpingpeople of all ages to make measurable progress in their lives. We provide a range of education products andservices to institutions, governments and direct to individual learners that help people everywhere aim higher andfulfill their true potential.Our commitment to them requires a holistic approach to education. It begins by using research to understandwhat sort of learning works best, it continues by bringing together people and organizations to develop ideas, andit comes back round by measuring the outcomes of our products. We're dedicated to improving access to bettereducation. Because more than anything, learning transforms lives, helping individuals to progress, communities toflourish, and economies to succeed.

THIS IS TO CERTIFY THATDivesh NigamHAS SUCCESSFULLY COMPLETED THE PROGRAM3267 *5 '8 7( 352*5 0 Ζ1 & %(56(&85Ζ7 (7 Ζ& / &.Ζ1*6HSWHPEHU 6Ζ*1 785(!! Pearson ProfessionalProgramsContact 24 - 4185100Pearson Professional Programs,Vatika First Indian Place, Tower C,Ground Floor (Near M.G. RoadMetro Stationa), Gurugram, India

and the U.S. government. He has also created a virtual machine- WebSpoilt for ethical hacking and web penetra-tion testing. Omar is the author of more than 20 books and video courses in areas such as CCNA Security, Ethical Hacking and Security Penetration. He is currently serving as Chair of the OASIS Common Security Advisory Framework (CSAF)