Post Graduate Program in Cyber Security and Defense
- Offered byEdology
Post Graduate Program in Cyber Security and Defense at Edology Overview
Duration | 11 months |
Total fee | ₹1.50 Lakh |
Mode of learning | Online |
Official Website | Go to Website |
Credential | Certificate |
Post Graduate Program in Cyber Security and Defense at Edology Highlights
- Earn a certificate after completion of course from Rangeforce
- Fee can be paid in installments
- 100% Placement Assistance
- 24/7 Lab and Content access
- Live Q&A with doubt sessions; 2 hours per week
Post Graduate Program in Cyber Security and Defense at Edology Course details
Computer Science Graduate or equivalent from any recognized University globally
Working IT professionals with 3- 5 years of experience and hands on exposure to Windows & Linux Servers, Networking and IT Support
Security operation
Detection/investigations
Threat hunting and intelligence
Scanning
Alert evaluation and validation
Incident handling
Security tools usage
Common attack TTPs
Enumeration
Reconnaissance
Malware analysis
OSINT
Edology’s PGP in Cyber Security and Defense prepares the learners to hone their programming skills and participate in industry-standard cybersecurity training
You will learn to use new technologies, detect new threats, and prevent massive data breaches
Post Graduate Program in Cyber Security and Defense at Edology Curriculum
SOC Basic
SOC Introduction, Linux Syslog, Event Logs: PowerShell Queries & Filters
Threat Landscape, Splunk Basics, Splunk Fields & Transforms
Malware Analysis Intro, Yara Overview, Email Header Analysis
Email URL Analysis, Wireshark Basics, Email Challenge
Intro to RegEx, Recorded Future, Splunk: Visualizations
VARA Rule Generaton, VARA Rule Management, Splunk: Alerts
Suricata Basics, VARA Rule Writing, Threat Intel Challenge
IDS Rules, Suricata Rule Management, Procmon
Malware Analysis: VirusTotal, Privilege Escalation Intro, Remote Code Execution Intro
Pass the Hash, Linux System Into Gathering, RegEx Basic
Capstone Challenge
SOC Advanced
AD Rights Management, PCAP Forensics, IPS Rules
PCAP Forensics 2, Visual Spoofing, Basic Shell Scripting
PowerShell Basic 1, Investigations with Wireshark, Suricata Challenge
PowerShell Basic 2, AD GPO LOKI IOC Scanner
Systemd Journal, Splunk API, Identifying Linux10Cs
Weak & Reused Credentials, Nikto, Linux Investigation Challenge
Firewoll Policies: Fortis0S, Lateral Movement, Greenbone Vulnerability Management
PowerShell Logging, Splunk Input Configuration, Botnet Takedown Challenge
Windows, NTLM, Process Injection IR CVE-2019-15107 WebMin 1.890 Exploit Unauthorized RCE
OpenSCAP, Sudo Killer, TLP Overview
Capstone Project
Utilize above skills and experience learned to perform
scanning, enumeration and exploitation
Require setup of virtual machines on student's laptop/ desktop as their own labs for hacking.
Perform Open Source Intelligence investigations (User Profiles IDs, Photographs, Emails, Maps, Satellite Images, Social Network, Telephones)
Setup Cybersecurity Lab and perform exploitation on vulnerable Operating System/Services