0% found this document useful (0 votes)
94 views17 pages

PG Program Cyber Security Course

Uploaded by

tanissoeugenie
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
94 views17 pages

PG Program Cyber Security Course

Uploaded by

tanissoeugenie
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

Post Graduate

Program in
Cybersecurity
Build cybersecurity skills to accelerate your career

Now with CompTIA Security+ Bootcamp | 6 Weeks (Optional)

Live Mentorship Lab Sessions for Certificate of Completion from


16 Weeks
with Experts Hands-on Practice the University of Texas at Austin

A program by In collaboration with


There are only two types
of companies: those that
have been hacked, and
those that will be.
Robert Mueller
FBI Director, 2012
Image credit: Christopher Gregory/The New York Times

Malicious hackers are becoming increasingly adept at exploiting software vulnerabilities,


compelling organizations to build advanced cybersecurity measures or risk losing their
reputation, billions of dollars and valuable data.

Organizations across the world are combating this challenge by upskilling their workforce,
recruiting skilled cybersecurity professionals, and building robust cyber defense capabilities.

OVER 50% 3.5 MILLION JOBS $215 BILLION


organizations are beginning to in cybersecurity to be Projected worldwide
recognize the importance of available by 2025, according end-user spending on
being secure from the start in to the U.S. Bureau of Labor security and risk
any transformation effort. Statistics. management in 2024.

- State of Cybersecurity - Cybersecurity Ventures, 2022 - Gartner


Resilience, 2023

A cybersecurity professional is engaged in a strategic game of ever-changing defensive and offensive


techniques and must know the ins-and-outs of the domain to protect IT infrastructures effectively.

The Postgraduate Program in Cybersecurity equips you with the skills needed to investigate attacks
and build robust cybersecurity systems while giving your resume the University of Texas at Austin
advantage. The program is ideal for cyber defense enthusiasts, enabling them to connect with
thought leaders in the industry and understand the process of securing digital infrastructure.

02
Program
Highlights

The new-age technological wave has come with its own set of threats, leading to a
prominent demand for cybersecurity professionals. This program is crafted by experts
to empower you with a skill set to analyze the threat landscape and build long-term
cybersecurity strategies.

A curriculum by the leading Interactive live


faculty at the McCombs mentorship with
School of Business industry experts

Certificate of completion Lab sessions to


from the University of gain hands-on
Texas at Austin experience

A final 4-week Dedicated program


capstone project support from
(optional) Great Learning

03
Who is this
program for?

The curriculum is designed to cater to various professional needs. Whether you’re an


early career professional looking to build a career in cybersecurity, or a mid-level IT
professional looking to transition into the domain, this program will help you align
your learning to your professional goals.

Graduates and Early Career Professionals Professionals from Technology and IT Fields
Learn the core concepts of cybersecurity The program also gives you an overview of the
and build a solid foundation using best cyber defense practices, enabling you to
in-demand market skills. You will benefit analyze the threat landscape and upskill as a
from this if you are: cybersecurity specialist. You will benefit from
An early career professional looking this if you are:
to transition into a career in An IT infrastructure manager who wants
cybersecurity to upskill with cybersecurity

A fresh graduate wanting to break An experienced professional looking to


into the cybersecurity domain specialize in cybersecurity

Successful completion of the program may qualify you for various roles in
cybersecurity, including:

Cybersecurity Analyst Incident Response Professional

Cyber Threat Intelligence Analyst Cloud Security Analyst

Information Security Specialist SOC Analyst


04
SOC Specialist
Program
Outcomes

Upon completion of the program, you would have developed the skill set needed to:

1. Develop the 4. Demonstrate the


Security Mindset understanding of how to
identify and defend against
modern-day threats such
as Ransomware

2. Perform incident 5. Comprehend the evolving


investigations to identify threat landscape by
the source of the threat, understanding the biggest
assess the risk and respond, cyber attacks to-date
and write clear and
world-class incident reports

3. Familiarize yourself with the 6. Build muscle memory for


Standards and Frameworks responding to cyber attacks
such as: National Institute of by following Incident
Standards and Technology Response playbooks
(NIST), MITRE ATT&CK, Center
for Internet Security (CIS)
Benchmarks

The program also helps in preparing learners for the CompTIA Security+, CompTIA
Cybersecurity Analyst (CySA+), and EC-Council Certified SOC Analyst (CSA) certifications.

05
CompTIA Security+
Bootcamp (Optional)
Take a step ahead into your Cybersecurity Career

About CompTIA Security+

CompTIA Security+ is a widely accepted entry-level vendor-neutral Cybersecurity


certification that validates your competency in the field of security. CompTIA Security+
is compliant with ISO 17024 standards and approved by the US DoD to meet directive
8140/8570.01-M requirements.

What Does This Bootcamp Contain?

Live Mentor Sessions with Dedicated Question


Industry Experts Bank & 2 Mock Exams

5-6 Hours of Learning Free Exam Voucher


Per Week worth USD 392

Mind Maps &


Exam-Taking Strategies

Certificate of Completion
From Great Learning

06
Curriculum

The program is designed with 4 milestones. Starting strong with the foundations of
cybersecurity, you then deep dive into the different types of cyber attacks. As you
understand the attacks, you will learn to design the security controls needed to build
a resilient system. Finally, if an attack happens, you practice responding to these
incidents by referring to Incident Response Playbooks given to you as part of the
program. In this last section you will also learn how to investigate these attacks.

MODULE 1:
FOUNDATIONS OF INFORMATION SECURITY | 4 WEEKS
Learn the fundamentals of Risk Management, Cryptography,
Network Security, and Cloud Security

MODULE 2:
UNDERSTANDING CYBER ATTACKS | 4 WEEKS
Learn about the latest advances in cybersecurity and how
such attacks are managed at organizational levels

MODULE 3:
DESIGNING SECURITY CONTROLS | 4 WEEKS
Learn how to identify and implement the right cybersecurity
control for various cyber attacks

MODULE 4:
SECURITY OPERATIONS & INCIDENT MANAGEMENT | 4 WEEKS
Learn to use Incident Response Playbook to defend against an ongoing
cyber attack, and protect critical digital resources in this situation

MODULE 5:
PENETRATION TESTING/ETHICAL HACKING | SELF-PACED
Equip yourself with a solid grasp of penetration testing methodologies and gain hands-on
experience through interactive video and workbooks, ensuring industry readiness

MODULE 6:
CAPSTONE PROJECT (OPTIONAL) | 4 WEEKS
Demonstrate your learnings throughout the program with
07
a comprehensive capstone project
MODULE 1: FOUNDATIONS OF INFORMATION SECURITY

TOPICS

CIA Triad OSI and TCP/IP Model


Cybersecurity Risk Management Wireshark
Need for Security Zero Trust
IAAA – Identity Authentication Securing the Cloud
Authorization Auditing Security Compliance & Frameworks
Cryptography Application Security (Nessus,
Enterprise Applications Metasploit)
Network Security

KEY TAKEAWAYS

Understand the ‘why’ behind cybersecurity

Learn the principles of Risk Management

Gain an understanding of how enterprise applications work

Understand the concepts behind network design & network security

Understand how cryptography works & what it protects

Get a flavor of perimeter-less security, also called as Zero Trust Network Architecture

Demonstrate your understanding by completing labs that simulate real-life scenarios

MODULE 2: UNDERSTANDING CYBER ATTACKS

TOPICS

MITRE ATT&CK Framework Indicators of Compromise


Threat Tactics Tactics Techniques and Procedures
Malware Case Study: Not Petya Solarwinds,
Attack Kill Chain Colonial Pipeline, Olympic games
Attack Vectors Attack Groups - Unit 8200, Nobelium,
Deep Dive Into the Dark Web APT 29
Physical Attacks

KEY TAKEAWAYS

Understand the different types of cyber attacks and the risks they pose

Familiarize yourself with the types of threats and the threat actors

Delve deeper into the Tactics, Techniques and Procedures used by the adversaries
with insights

Understand the structure of an attack- Kill chain methodology

Apply the concepts of cyber attacks and threat to discern the Solarwinds
and Colonial Pipeline attacks
08
MODULE 3: DESIGNING SECURITY CONTROLS

TOPICS

Firewalls Patching
Web Application Firewalls System Audit
IDS/IPS Maintenance, Monitoring, and
Antivirus & EDR Analysis of Audit Logs
Email Protection SIEM (Security Information and
Data Loss Prevention Event Management)
Vulnerability Management Incident Investigation
Zero-Day Vulnerability Threat Intelligence

KEY TAKEAWAYS

Understand the controls that help in detecting security threats

Develop a deeper understanding of SIEM and its purpose

Familiarize yourself with the reviewing, interpreting, and understanding of


computer-generated logs

Learn how cyber threat intelligence helps in assessing security threats

Gain knowledge on network firewalls and web application firewalls

Familiarize yourself with antivirus and its applications

Understand and practice shell scripting

MODULE 4: SECURITY OPERATIONS & INCIDENT MANAGEMENT

TOPICS

Incident Response and Playbooks SLAs KRIs, KPI


NIST Framework Maintenance, Monitoring, and Analysis of
The Golden Hour Audit Logs
Log and Email Analysis Recovery from an Incident
Writing Incident Reports Forensics
Security Operations Centre –
A Deep dive

KEY TAKEAWAYS

Learn how to read, write and examine incident reports

Learn about the Incident Response Lifecycle of NIST

Familiarize yourself with the concept of the golden hour

Understand how to examine incident data in order secure from cyber threats
using forensics

Gain knowledge on the tasks performed at a Security Operations Center (SOC)


09
Learn to form a recovery strategy from a cyber attack
MODULE 5: PENETRATION TESTING/ETHICAL HACKING SELF-PACED

TOPICS

Introduction to Penetration Testing Techniques of Penetration Testing

OWASP Web Application Penetration Testing

Infra Penetration Testing Penetration Testing Case Study (Video Workbooks)

KEY TAKEAWAYS

Learn about penetration testing and ethical hacking methodologies

Learn about penetration testing exercises and the attack life cycle

Understand OWASP's top 10 vulnerabilities

Deep-dive into various penetration testing techniques

Learn to set up your own lab environment for practicing use cases

MODULE 6: CAPSTONE PROJECT (OPTIONAL)

Choice of the Capstone project is tailored for practitioners and decision makers.

KEY TAKEAWAYS

The Capstone project challenges you to demonstrate your skill & knowledge

You will use a combination of hands-on skills and security research capability

PRE-WORK (OPTIONAL)
For professionals seeking a full-time career in cybersecurity, but working in a non-IT domain,
we have a special course to learn the fundamentals required to build cybersecurity solutions.
With a strong foundation, your learning journey in cybersecurity will be more streamlined.

SELF-PACED MODULE: DEMYSTIFYING ChatGPT AND APPLICATIONS

Gain an understanding of what ChatGPT is and how it works, as well as delve into the
implications of ChatGPT for work, business, and education. Additionally, learn about
prompt engineering and how it can be used to fine-tune outputs for specific use cases.

10
CompTIA Security+
Bootcamp (Optional)

MODULE 1:
ATTACKS, THREATS, AND VULNERABILITIES

MODULE 2:
ARCHITECTURE AND DESIGN

MODULE 3:
IMPLEMENTATION

MODULE 4:
OPERATIONS AND INCIDENT RESPONSE

MODULE 5:
GOVERNANCE RISK & COMPLIANCE

Certificate of
Completion

Postgraduate Program in
Cybersecurity

All certificate images are for illustrative purposes only. The actual
certificate may be subject to change at the discretion of the university. 11
Program Faculty
and Industry
Mentors

Program Faculty

Dr. Kumar Muthuraman Farhad Sajid


Faculty Director, Center for Certified Security
Research and Analytics Specialist (ECSS),
McCombs School of Business, IBM Advanced Data
University of Texas at Austin Science Specialist

Aniket Amdekar Anurag Goyal


General Manager - Cyber Cybersecurity
Defence Education, Great Researcher,
Learning, E-Commerce Ernst & Young
Cyber Security Specialist

Industry Mentors

Varun Pathak Mayan Mohan


Freelance Cybersecurity Team Lead - Managed
Trainer Threat Response,
Sophos

Matthew Lindwall Vikas Yadav


Senior Cybersecurity Chief Information
Risk Analyst, Security Officer,
QuikTrip Nykaa

*This is an indicative list and subject to change based on the faculty’s and mentor’s availability 12
Testimonials

“I came across the Post Graduate Program in Cybersecurity on the Great Learning
LinkedIn page in May, 2022 and it's been an interesting learning journey so far. The
payment option was friendly and flexible. The recorded, live sessions and the hands-on
lab projects have been engaging and impactful in becoming a well-seasoned
cybersecurity expert.”

Abiola Olufunke Famoroti


CEO,
Abbatoir Services

“I highly recommend taking the Post Graduate Program in Cybersecurity. As a legal


professional, I realized that the world was soon moving towards the “Internet of Things”
direction, with digital platforms leading the way. As a 21st century lawyer, enrolling for a
cybersecurity program was the best option for me. This program is by far, the most
useful in the cyber world. It has noticeably improved my understanding of how cyber
criminals plan and execute their malicious activities.

This program is a must-have for every professional. The recent election in Kenya and the
technical and detailed evidence gathered is enough proof that all professionals - lawyers,
judges, accountants and politicians - need to understand the basics of cybersecurity. As
world dynamics change with the influence of IoT, we need to keep up with this change.

This program gives people a thorough understanding of the tools. Unlike a lot of other
programs, which only focus on memorizing facts and concepts, this one teaches you
cyber skills that you can apply in any area of work. I would recommend this program to
anyone who wants to learn more about cybersecurity.”

Modicai Donga
Chief Operations Manager/Lawyer,
SV Mdladla and Associates

13
Testimonials

“I got to know about the PG Program in Cybersecurity by UT Austin and Great Learning
from my family. This program was practical and extremely hands-on with challenging
technical labs that enabled me to dive deep into the world of cybersecurity.
I strongly believe that the program content was designed in a way to understand
complex cybersecurity concepts. The faculty were very professional in driving the
program and it helped me complete my projects on time. The admin team was great in
addressing all student issues promptly. I am very thankful to the Great Learning team for
this wonderful learning experience.”

Asha Chakkravarthy
Desktop Support Analyst,
Ovation Workplace Services

“With increasing awareness and concern over growing cyber threats facing different
organizations, governments and individuals, many organizations and colleges have
created new programs in cybersecurity. Nothing compares to Great Learning and
University of Texas with their exceptional curriculum content. The high calibre of
industry experts and tutors and their knowledge of the subject matter is unparalleled.
While a lot of other programs in the market are at an infancy stage, I had no doubt that
Great Learning’s program would be thoughtfully designed with inputs from field
practitioners, national and international stakeholders and industry thought leaders with
the main aim of training cybersecurity professionals of tomorrow with theoretical as well
as practical skills.

If there was ever a time to enter the cybersecurity field, it is now. With cyber threats and
attacks increasing in both frequency and sophistication, the demand for cybersecurity
professionals is far more than the supply. This means that for qualified cybersecurity
specialists, job security is practically guaranteed. Thank you Great Learning for your
constant support in this journey!”

Obakilwe George Sekoane


Change Manager,
Umgeni Water

14
Admission
Process
Program Eligibility

Applicants to the program can include:


Graduates without experience in the IT domain
Working professionals from any industry
IT professionals with 2 years of experience

We offer a pre-work course for fresh graduates and non-IT candidates to learn the
fundamentals required for the program.

The admissions are conducted on a rolling basis and the admission process is closed
once the requisite number of candidates has been enrolled into the program.

Selection Process

APPLY SCREENING PROCESS JOIN PROGRAM


Apply by filling Attend an application An offer letter will be
a simple online screening call rolled out to selected
application form candidates

Post Graduate Program in Cybersecurity


Post Graduate Program in Cybersecurity
+ CompTIA Security+ Bootcamp
Price: USD 2800
Price: USD 2800+1800 = 4600 USD 4000
Cohort Start Date: March 16, 2024
*Exclusive Value-Added Bundle

15
For more information on flexible payment options, please reach out to your program advisor.
Program
Partners

The University of Texas at Austin’s McCombs School of Business (ranked #6 according to


QS Global rankings) is a premier business school at a world class public research
university. It cultivates principled leaders and develops ideas through high-quality
instructions, experiential learning, and the pursuit of relevant, groundbreaking research.

Great Learning is a leading global ed-tech company for professional and higher
education. It offers comprehensive, industry-relevant programs across various
cutting-edge Technology, Data, and Business domains. Great Learning's programs are
developed in collaboration with the world's foremost academic institutions. They are
constantly reimagined and revamped to address the dynamic needs of the industry.
Great Learning is the only ed-tech company to provide these programs in a blended
mode, classroom mode, and purely online mode, relying on its vast network of expert
mentors and highly qualified faculty to deliver an unmatched learning experience for
learners in India and the world over. Great Learning is on a mission to enable
transformative learning and career success in the digital economy for professionals and
students across the globe and till date, we have impacted over 9.2 million learners from
over 170 countries.

16
Ready to become a
cybersecurity expert?
APPLY NOW

Contact Great Learning for more information about the program:

+1 512 212 4186


[email protected]
mygreatlearning.com/pg-program-cyber-security-course

You might also like