0% found this document useful (0 votes)
45 views

Post Graduate Program in Cyber Security PGP Cs

Uploaded by

gs2s42419
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views

Post Graduate Program in Cyber Security PGP Cs

Uploaded by

gs2s42419
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Post Graduate Program in

Cyber Security (PGP-CS)


6 Months | Online Interactive Learning | Capstone Project on Cyber Range Assessment
A career-focused program designed to equip you with cybersecurity skills and become an
expert in the cyberworld!

POST GRADUATE PROGRAM IN CYBER SECURITY Contact Us: [email protected]


Industry Insights

The world needs more experts with


computer security degrees

According to IBM – 3 Million cybersecurity


professionals are required in the country but
the supply is not even 100,000 now.
Source Forbes
Cisco reported that currently more than
1,000,000 available Cyber Security jobs in
the U.S. alone and 6,000,000 globally.

The cybersecurity market is expected to


grow from $75 billion in 2015 to $170 billion
by 2020 according to Forbes Source Article I Business Standard

Cybercrime is the greatest threat to every


company in the world.

76% of Indian Businesses hit by Cyber


Attack according to Sophos EDR Survey Source The Economic Times

Nearly 75% of security professionals say


they do not have enough staff to defend
their organizations against current threats,
according to a survey from the Black Hat
USA computer conference.

82% of organizations expect a cyber attack,


yet 35% are unable to fill open security jobs.

Source PRNewswire

POST GRADUATE PROGRAM IN CYBER SECURITY 1


Key Program Highlights
Amity Future Academy’s Post Graduate Program in Cyber Security
(PGP - CS) is designed to:

Develop a thorough understanding of the core concepts,


terminologies, tactics used in cyberworld.

Master Enterprise level security strategies, governance


structures, and associated technology components.
Discover, Analyze, and Deal with threats to an organization.

Learn tools, technologies and softwares needed to become


top cybersecurity professional.

Unique Program Features

Gain in-depth subject knowledge and expert insights from industry-driven


comprehensive curriculum

24/7 access to study material & video lectures

Faculties having total 80+ years of Experience

Live interactions with Cybersecurity experts and Corporate leaders

Access to 20 preparatory sessions prior the launch of the course

Capstone Project

Post successful completion of the program achieved:

PG Certificate in Cybersecurity from Amity Future Academy

POST GRADUATE PROGRAM IN CYBER SECURITY 2


Program Curriculum
PG Program in Cyber Security (6 months)
No. Module Name Session Name Weeks
1 Cyber Security Building Blocks Introduction to Cyber Security 3 weeks
Understanding Cyberspace
Defining Cybersecurity
Importance of Cyber Security and Case studies
Threats and Vulnerabilities
Types of Hackers
Malicious Codes - Virus, Trojans, Worms, Spywares, and Advanced
Persistent Threats (APT)
Cyber Security Breaches - Phishing, Vishing, Identity Theft, Cyberstalking,
Water-Hole, and Whaling Attacks.
Penetration Testing and Methodologies
Frameworks and Standards for Cyber Security - Introduction to ISO 27001
and NIST800
Cybersecurity practices - Governance, Operations, and Assurance
Introduction to Cyber Security Risk Management, Roles and
Responsibilities.

2 IT Infrastructure Technologies Physical and Software elements of computer systems 3 weeks


System Administration
Windows – Servers, Active Directory
Authentication and Authorization
Introduction to Networks and Type of Networks
Understanding the OSI Layers
Networking Protocols – TCP / IP
Understanding IP addresses and Subnet Classes
Networking Infrastructure – Hubs, Switches, and Routers, Firewalls,
Intrusion Prevention Systems and Proxies
Routing and Switching in Networks
Software Defined Networking
Cloud Computing and Datacenter Virtualization
Auditing IT Infrastructure

POST GRADUATE PROGRAM IN CYBER SECURITY 3


3 Cloud Security Cloud Computing 4 weeks
Cloud Security - Concerns & Need
Cloud Security - Threats & Modules
Cloud Data Security Issues And Privacy Concerns
Cloud Security Solution Methods
Cloud Security Global Standards
Cloud Security Reference Architecture
Cloud Firewall Design
Cloud Malware Propagation
Cloud Native App Security
Cloud Data Privacy Policies
Multi Cloud Security Techniques
Cloud based Identity Systems
Cloud based Container security
Emerging Threats
Emerging Security Tools - Scout Suite, Prowler, Pacbot, etc
Enterprise Cloud Security Tools - Azure Sentinel, AWS Cloud Watch,
Netflix Diffy

4 Enterprise Security Enterprise Security 4 weeks


Introduction Sherwood Applied Business Security Architecture (SABSA)
The Confidentiality, Integrity and Availability (CIA) Triage
Governance – Security Organization and Policies
Physical Security
Access controls, Authentication and Authorization
Principles of Least Privilege
Implementing of Defense in DeptH
Network Access Controls (Includes DMZ and Perimeter Security)
Endpoint Security
Patch Management
Security Baselining and Hardening
Vulnerability and Compliance Management
Cryptographic controls
Data Leak Prevention

POST GRADUATE PROGRAM IN CYBER SECURITY 4


5 Offensive Security and Reconnaissance – Information harvesting and intelligence 4 weeks
Cyber kill chain Weaponization tactics
Art of Scanning
Enumerating services
Exploiting – payload delivery and exploit
Gaining Foothold – installation, and persistence
Remote C&C – Command and Control
Covering tracks and forensic evidence

6 Application & Mobile Security Application Security 4 weeks


Web Application Security
The basic working of Web and Browser
Burpsuite 101
Common Application Level Attacks
OWASP Top 10
Tools of Trade
Android Penetration Testing
Introduction to Android
Setting up Lab
OWASP top 10 for Mobiles
Hands-on Labs

7 1-2 Projects Capstone Project - Cyber Range Assessment 2 weeks


24 weeks

POST GRADUATE PROGRAM IN CYBER SECURITY 5


Cyber Range Assessment

Get an opportunity to apply the tools and techniques learnt in the


program against real time environment conducting penetration testing,
vulnerabilities and risk mitigation strategies

Reasons to Add Cyber Range Assessment in the Program

Simulate on the job experience

Applying knowledge in a simulated network


environment

Develop cyber skills

Work in a team to attack and defend each other.

Have access to continuous guidance from a


Project Mentor to execute the project.

POST GRADUATE PROGRAM IN CYBER SECURITY 6


How You Will Learn
Post Graduate Program in Cyber Security (PGP-CS) provides immersive,
simulation-based and media-rich learning experiences through:

High-quality Recorded video lectures with illustrative


presentations

e-learning activities

Remedial & tutor classes to brush-up concepts

Instructor-led practice sessions to learn popular platforms &


Tools

Key Program Takeaways

By the end of the PGP-CS, you will be able to:


Understand terminologies and tactics commonly heard in the cyber world.
Understand various components of IT systems and networks and how do
they interoperate to form the cyberspace
Master Enterprise level security strategies, governance structures, and
associated technology components. Discover, Analyze, and Deal with
threats to an organization.
Understand different stages of an exploit to adopt adequate detective and
preventive cyber security controls.
Recognize common threat behaviors and attack vectors, hunt threat across
the enterprise network.

POST GRADUATE PROGRAM IN CYBER SECURITY 7


What Certification You Will Receive

On successful completion of the program, earn a Certificate of Post


Graduate Program in Cyber Security (PGP-CS) from Amity Future
Academy.

Add the certificates to your CV and improve your job/business prospects.

POST GRADUATE PROGRAM IN CYBER SECURITY 8


How will your future look like?

Career Paths
The Common Cybersecurity Pathway
Common Cybersecurity Core Cybersecurity Roles
Feeder Roles

Feeder Role Entry-Level Mid-Level Advanced-Level

Networking Cybersecurity Specialist / Cybersecurity Analyst Cybersecurity Manager


Software Development Technician /Administrator
Cybersecurity Consultant
Systems Engineering Cyber Crime Analyst / Cybersecurity Engineer
Penetration & Vulnerability
Investigator
Financial and Risk Analysis Tester Cybersecurity Architect
Security Intelligence Incident Analyst /
Responder

IT Auditor

But this is not the defined career path you need to


follow in the cyber world
Some people enter the security field straight out of college with an IT or a
security degree, while others transition from other feeder roles.

No matter where you start, all cybersecurity careers begin with general IT
exposure and learnings. You need to understand how the technology works
before you can learn how to secure and protect it.

PGP - CS at Amity Future Academy gives you the real world learning
experience with our rigorous curriculum, case studies and a capstone
project to help you step forward your learning curve at the workspace.

POST GRADUATE PROGRAM IN CYBER SECURITY 9


POST GRADUATE PROGRAM IN CYBER
SECURITY (PGP-CS)
Learn In-Demand skills right from Industry Stalwarts
and get certified from Amity Future Academy.
Future-proof your career and stay indispensable.

EMAIL US
For general queries: [email protected]
For course inquiries: [email protected]

POST GRADUATE PROGRAM IN CYBER SECURITY Contact Us: [email protected]

You might also like