Sie sind auf Seite 1von 11

PROFESSIONAL

PROGRAMS

PGP in Ethical Hacking


& Cybersecurity
Online Interactive Course

Price: 81,500/- Duration: 6 Months


WHY STUDY CYBERSECURITY?
The Internet era has witnessed a host of new threats including phishing, ransomware, malware, data
breaches and a disturbing string of cyber-attacks across blue chip corporations and government entities
a like.

Billions of personal records are exposed and leaked each year, affecting an alarming percentage of the
total world population. For corporations, the fallout includes lawsuits, loss of customer trust, and
declining revenues. As wave after wave of high-profile cyber-attacks strike home, organizations around
the world have no choice but to take cybersecurity more seriously than ever.

As threats continue to escalate, the cybersecurity talent shortage has become more and more severe.
For every professional that gets trained, multiple new opportunities open up with leading corporations
around the world, many of which lie unfilled waiting on the right candidate. According to a report by
BurningGlass, cybersecurity job postings have grown 94% since 2013, compared to only 30% for IT
positions overall. In other words, Cybersecurity positions are growing three times faster than IT overall.
This is a bright opportunity for people who are skilled in cybersecurity concepts and technologies.

Pearson’s Post Graduate Program in Ethical Hacking & Cybersecurity is taught by world leading
cybersecurity experts to help professionals gain industry relevant cybersecurity expertise that they
need to make the most of this career opportunity.
ABOUT THE PROGRAM
Pearson’s Post Graduate Program in Ethical Hacking & Cybersecurity is a comprehensive credential designed to bring you
to the cutting edge of cybersecurity across a wide range of applications and tools. It teaches industry relevant concepts
and skills to protect data, information and hardware assets from cyberthreats in the form of ransomware, malware,
phishing and data breaches. It includes two cybersecurity projects which get students hands-on applying concepts in
real-life cyber warfare situations. The program also prepares learners for industry recognized professional
certificates like Certified Ethical Hacker (CEH) and Certified Information Systems Security Professional
(CISSP). These are highly valued in the cybersecurity community and provide an edge to the learners over
others in the job market.

PROGRAM HIGHLIGHTS
Leading Cybersecurity Instructors: Learn from internationally renowned cybersecurity experts

Technology in Action: Concepts are demonstrated with plenty of real-life use cases

Mentorship From Industry Experts: Learn tips and tricks from Industry experts

Learn Anytime, Anywhere: Learn at your pace on any device for minimum disruption to your job and
family life.

Flaunt Your Skills: Receive a certificate from Pearson, the world's leader in professional learning, and
showcase your skills within and outside of your organization.

CISO Hackathons: Top performers in each of two projects get a chance to further refine and showcase their
skills to Chief Information Security Officers (CISO) and receive feedback and critical inputs on their work.
Cyber security demand is
across sectors like

Banking E-commerce Engineering Healthcare Customer-oriented


products and services

Cyber security openings


growth is 3X
that of IT jobs overall

Global shortage of
cyber security professionals
by almost 3 million

Cyber security
job postings grew by 59%
94%
of all cyber security
positions require at
since 2013 least 1 certification
PROGRAM STRUCTURE
The 6-month Pearson Post-Graduate Program in Ethical Hacking & Cybersecurity comprises of:
World-Class Online Content: 118 hours of self-paced high definition video content, designed for accelerated
professional learning.

Weekly Doubt Clearing Sessions: Stay ahead of the curve and avoid falling behind thanks to weekly live
online sessions with Pearson experts. These sessions answer all student queries in an organized and easy
to understand format.

CISO Hackathons: Top performers in each of two projects get a chance to further refine and showcase their
skills to Chief Information Security Officers (CISO) and receive feedback and critical inputs on their work.

Rigorous Assessments: Each of nine modules is followed by a formal assessment to gauge student
progress and set strict completion criteria.

Hands on Projects: Two exciting projects for all-round practical application and understanding of key
concepts
Module Details

Module 1: Module 2:
Hacking Web Applications Enterprise Penetration Testing and
Introduction to Web Application Penetration Testing Continuous Monitoring
Overview of Web Applications for Security Professionals Introduction to Enterprise Penetration
Build Your Own Web Application Lab Testing and Continuous Monitoring
Reconnaissance and Profiling Web Applications External and Internal Reconnaissance
Authentication and Session Management Vulnerabilities Enterprise Social Engineering
Exploiting Injection-Based Vulnerabilities Network and Vulnerability Scanning
Cross-Site Scripting (XSS) and Cross-Site Request Forgery Web App Testing
Vulnerabilities Internal Testing
Exploiting Weak Cryptographic Implementations Privilege Escalation
Attacking Application Programming Interfaces (APIs) Enterprise Secrets, Post Exploitation, and
Client-side Attacks Data Exfiltration
Additional Web Application Security Vulnerabilities and Cloud Services
Attacks Reporting & Continuous Evaluation

Module 3: Module 4:
Security Penetration Testing
Wireless Networks, IoT & Mobile Device Hacking
Overview of Ethical Hacking and Penetration
Introducing Wireless
Testing
Wireless Client Attacks
Kali Linux
Building Your Lab and Attack Hardware
Passive Reconnaissance
Aircrack-ng
Active Reconnaissance
Cracking WEP
Hacking Web Applications
Hacking WPA
Hacking User Credentials
Performing Wireless Reconnaissance
Hacking Databases
Evil Twins and Rogue Access Points
Hacking Networking Devices
Fundamentals of Wireless Hacking
Buffer Overflows
Powershell Attacks
Evasion and Post Exploitation Techniques
Social Engineering
Maintaining Persistence, Pivoting, and Data
Exfiltration Writing Penetration Testing
Reports
Module 5: Module 6:
The Complete Cybersecurity Bootcamp CompTIA Security+ (SY0 – 501)
Networking and Security Basics Threats, Attacks and Vulnerabilities
Cybersecurity Management, Monitoring, and Analysis Tools and Technologies
Network Security Telemetry Architecture and Design
Digital Forensics and Incident Response (DFIR) Identity and Access Management
Fundamentals of Ethical Hacking and Penetration Testing Risk Management
Advanced Wireless Hacking and Penetration Testing Cryptography and PKI
Mobile Device Security Acing the Exam
Internet of Things (IoT) Security

Module 7: Module 8:
Certified Ethical Hacker Certified Information Systems Security
Security Essentials Professional (CISSP)
System Security Security and Risk Management
Network Security Asset Security
Web Services Security Security Architecture and Engineering
Wireless and Internet Security Communication and Network Security
Identity and Access Management (IAM)
Module 9: Security Assessment and Testing
CISSP Exam Preparation Security Operations
Preparing for the Exam Software Development Security
Challenging Topics and Concepts Becoming a CISSP
CISSP Exam and Beyond
FACULTY DETAILS
Sari Greene
Cybersecurity Excellence Award Winner | Author | Entrepreneur | Educator
Sari Greene is an information security practitioner, author, and entrepreneur. In 2003,
Sari founded one of the first dedicated cybersecurity consultancies - Sage Data Security. She is a
recognized leader in the field of cybersecurity and has amassed thousands of hours working with global organiza-
tions and experts. Sari authored the top selling book Sustainable Information Security and has published many
articles related to cybersecurity. She has been quoted in the New York Times, Wall Street Journal, CNN etc. and
speaks regularly at cybersecurity conferences.
In recent times, she has won the coveted Cybersecurity Excellence Awards in 2018. Currently, she serves on the
Bangor Savings Bank Board of Directors and is chair of the Enterprise Risk Management Committee.

Omar Santos
Principal Engineer
Cisco Product Security Incident Response Team (PSIRT)
Cisco's Security Research and Operations

Omar is a principal engineer of the Cisco Product Security Incident Response Team (PSIRT), where he mentors and
leads engineers and incident managers during the investigation and resolution of cyber security vulnerabilities.
Omar has designed, implemented, and supported numerous secure networks for Fortune 100 and 500 companies
and the U.S. government. He has also created a virtual machine- WebSpoilt for ethical hacking and web penetra-
tion testing.

Omar is the author of more than 20 books and video courses in areas such as CCNA Security, Ethical Hacking and
Security Penetration. He is currently serving as Chair of the OASIS Common Security Advisory Framework (CSAF)
Technical Committee.
Chris McCoy
Technical Leader
Cisco's Advanced Security Initiatives Group (ASIG)

Chris McCoy is a technical leader in Cisco's Advanced Security Initiatives Group (ASIG). He has over 20 years’ experi-
ence in designing, operating, testing and securing enterprise & service provider internetworks. He has a passion
for computer security, finding flaws in mission-critical systems, and designing mitigations to thwart motivated and
resourceful adversaries.

Jon Sternstein
Founder and Principal Consultant
Stern Security

Jon Sternstein is the Founder and Principal Consultant of Stern Security, a security company focused on healthcare
and credit union industries. He has been a lead contributor to securing a large number of organizations through-
out his 13+ years in the security field. During this time, Jon has been a featured Cyber Security Expert on ABC
News, WRAL News, and Business North Carolina Magazine. He holds multiple certifications: Certified Ethical Hacker
(CEH), CISSP, CCNA, GPEN and has won Ethical Hacking Competition awards.

WHO IS IT FOR?
Anyone interested in learning cyber security and preparing for various cybersecurity exams

Any network and security professional who is building their career in ethical hacking and penetration testing.

Program Requirements

Applicants must hold an undergraduate degree (preferably in Software or Electrical Engineering) and a minimum
of 2 years experience in IT, programming and/or networking areas.
PROGRAM VITALS

Time Commitment Program Fee Course start date Debit and Credit cards
accepted
6 Months ` 81,500/- 11th November, 2019
Visit website to pay
4-5 Hours
Per Week Loan Facility Available
3/6/9/12 months EMI options
available 0% interest

ABOUT PEARSON
We are the world's largest education company, with over 35,000 employees in more than 70 countries helping
people of all ages to make measurable progress in their lives. We provide a range of education products and
services to institutions, governments and direct to individual learners that help people everywhere aim higher and
fulfill their true potential.

Our commitment to them requires a holistic approach to education. It begins by using research to understand
what sort of learning works best, it continues by bringing together people and organizations to develop ideas, and
it comes back round by measuring the outcomes of our products. We're dedicated to improving access to better
education. Because more than anything, learning transforms lives, helping individuals to progress, communities to
flourish, and economies to succeed.
THIS IS TO CERTIFY THAT

Divesh Nigam
HAS SUCCESSFULLY COMPLETED THE PROGRAM

3267*5$'8$7(352*5$0Ζ1&<%(56(&85Ζ7<
(7+Ζ&$/+$&.Ζ1*
6HSWHPEHU

6Ζ*1$785(!!
Pearson Professional
Programs

Contact Us
ppp.edge@pearson.com
https://in.pearson.com/ppp

0124 - 4185100
Pearson Professional Programs,
Vatika First Indian Place, Tower C,
Ground Floor (Near M.G. Road
Metro Stationa), Gurugram, India

Das könnte Ihnen auch gefallen