Edology
Edology Logo

Post Graduate Program in Cyber Security and Defense 

  • Offered byEdology

Post Graduate Program in Cyber Security and Defense
 at 
Edology 
Overview

Industry's only program with cloud-based advanced learning simulation platform with built-in security tools by Edology and Rangeforce

Duration

11 months

Total fee

1.50 Lakh

Mode of learning

Online

Official Website

Go to Website External Link Icon

Credential

Certificate

Post Graduate Program in Cyber Security and Defense
 at 
Edology 
Highlights

  • Earn a certificate after completion of course from Rangeforce
  • Fee can be paid in installments
  • 100% Placement Assistance
  • 24/7 Lab and Content access
  • Live Q&A with doubt sessions; 2 hours per week
Read more
Details Icon

Post Graduate Program in Cyber Security and Defense
 at 
Edology 
Course details

Skills you will learn
Who should do this course?

Computer Science Graduate or equivalent from any recognized University globally

Working IT professionals with 3- 5 years of experience and hands on exposure to Windows & Linux Servers, Networking and IT Support

What are the course deliverables?

Security operation

Detection/investigations

Threat hunting and intelligence

Scanning

Alert evaluation and validation

Incident handling

Security tools usage

Common attack TTPs

Enumeration

Reconnaissance

Malware analysis

OSINT

More about this course

Edology’s PGP in Cyber Security and Defense prepares the learners to hone their programming skills and participate in industry-standard cybersecurity training

You will learn to use new technologies, detect new threats, and prevent massive data breaches

Post Graduate Program in Cyber Security and Defense
 at 
Edology 
Curriculum

SOC Basic

SOC Introduction, Linux Syslog, Event Logs: PowerShell Queries & Filters

Threat Landscape, Splunk Basics, Splunk Fields & Transforms 

Malware Analysis Intro, Yara Overview, Email Header Analysis

Email URL Analysis, Wireshark Basics, Email Challenge

Intro to RegEx, Recorded Future, Splunk: Visualizations

VARA Rule Generaton, VARA Rule Management, Splunk: Alerts

Suricata Basics, VARA Rule Writing, Threat Intel Challenge

IDS Rules, Suricata Rule Management, Procmon

Malware Analysis: VirusTotal, Privilege Escalation Intro, Remote Code Execution Intro

Pass the Hash, Linux System Into Gathering, RegEx Basic

Capstone Challenge

 

SOC Advanced

AD Rights Management, PCAP Forensics, IPS Rules

PCAP Forensics 2, Visual Spoofing, Basic Shell Scripting

PowerShell Basic 1, Investigations with Wireshark, Suricata Challenge

PowerShell Basic 2, AD GPO LOKI IOC Scanner

Systemd Journal, Splunk API, Identifying Linux10Cs

Weak & Reused Credentials, Nikto, Linux Investigation Challenge

Firewoll Policies: Fortis0S, Lateral Movement, Greenbone Vulnerability Management

PowerShell Logging, Splunk Input Configuration, Botnet Takedown Challenge

Windows, NTLM, Process Injection IR CVE-2019-15107 WebMin 1.890 Exploit Unauthorized RCE

OpenSCAP, Sudo Killer, TLP Overview

 

Capstone Project

Utilize above skills and experience learned to perform

scanning, enumeration and exploitation

Require setup of virtual machines on student's laptop/ desktop as their own labs for hacking.

Perform Open Source Intelligence investigations (User Profiles IDs, Photographs, Emails, Maps, Satellite Images, Social Network, Telephones)

Setup Cybersecurity Lab and perform exploitation on vulnerable Operating System/Services

Faculty Icon

Post Graduate Program in Cyber Security and Defense
 at 
Edology 
Faculty details

Dr. Akashdeep Bhardwaj
25 years of IT experience in areas of Information Security, IT Infrastructure, and Operations Management working for various multinational organizations. He also has vast expertise in managing IT Infrastructure and Data Centre operations for Networking, Windows, Exchange, Storage, and IT Help desk Support teams.
Rupert Collier
Rupert has over 20 years of experience in the IT industry in a variety of roles and specialist areas. He has extensive experience in many areas of technology - primarily in the areas of cyber-security, virtualization, storage, and network monitoring. He is also a proven sales leader and performer, through both direct and indirect channels. Collier also has extensive experience in building IT brands, solution-selling, channel & product management, and team leadership.
Archie Jackson
Archi comes with 20+ years of insightful experience in IT Infrastructure design, implementation, and operations with strong service management, leadership, and digital transformation skills

Post Graduate Program in Cyber Security and Defense
 at 
Edology 
Placements

Lock IconTop Recruiters for Edology
ACCENTURE
CapGemini
Cognizant
Colgate Palmolive
Deloitte
HDFC Bank
HP
Microsoft
pwc
TATA

Post Graduate Program in Cyber Security and Defense
 at 
Edology 
Entry Requirements

GraduationUp Arrow Icon
  • N/A
Other eligibility criteriaUp Arrow Icon
Conditional OfferUp Arrow Icon
  • Not mentioned

Other courses offered by Edology

1.75 L
10 months
– / –
1.2 L
9 months
– / –
1.5 L
10 months
– / –
1.5 L
10 months
– / –
View Other 5 CoursesRight Arrow Icon
qna

Post Graduate Program in Cyber Security and Defense
 at 
Edology 

Student Forum

chatAnything you would want to ask experts?
Write here...