0% found this document useful (0 votes)
114 views27 pages

IIIT B - Advanced Executive Program in Cybersecurity-19 Nov'24

The Advanced Executive Program in Cybersecurity, offered by Simplilearn, IIIT Bangalore, and IBM, aims to equip professionals with essential cybersecurity skills through a blend of theoretical knowledge and hands-on experience. The program includes various core topics such as malware analysis, ethical hacking, and application security, along with access to integrated labs and industry-recognized certifications. It targets lower- and mid-level management professionals in the BFSI, cybersecurity, and fintech sectors, requiring a bachelor's degree and at least one year of work experience for eligibility.

Uploaded by

rachit.m.shah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
114 views27 pages

IIIT B - Advanced Executive Program in Cybersecurity-19 Nov'24

The Advanced Executive Program in Cybersecurity, offered by Simplilearn, IIIT Bangalore, and IBM, aims to equip professionals with essential cybersecurity skills through a blend of theoretical knowledge and hands-on experience. The program includes various core topics such as malware analysis, ethical hacking, and application security, along with access to integrated labs and industry-recognized certifications. It targets lower- and mid-level management professionals in the BFSI, cybersecurity, and fintech sectors, requiring a bachelor's degree and at least one year of work experience for eligibility.

Uploaded by

rachit.m.shah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 27

Advanced Executive

Program in Cybersecurity
In collaboration with:

1
Table of Contents:
About the Program 03

Key Features of the Program 04

About IIIT-B 05

About IBM 05

About Simplilearn 05

Integrated Labs & Tools 06

Slack Channel 07

Eligibility Criteria 08

Application Process 08

Talk to an Admissions Counselor 09

Cybersecurity Industry Trends 10

Who Should Enroll in this Program? 10

Learning Path Visualization 11

Core Topics 12

Electives 19

Capstone Projects 21

Learning Outcomes 22

Advisory Board 23

Certificate 25

Corporate Training 26

Features of Corporate Training 26

2
About the Program
The digital landscape has grown by leaps and bounds. Cybersecurity skills are
now among the most sought-after and highly compensated as the business
world has shifted towards a digital operational framework, and business data and
organizational assets face an enhanced risk of cyber violations and cyberattacks.
The Advanced Executive Program in Cybersecurity, a collaboration between
Simplilearn, IIIT Bangalore, and IBM, is designed to empower you with the practical
skills needed to enhance your organization’s cybersecurity strategy. The curriculum
covers various topics, from cryptography to malware analysis. It is structured to
ensure you understand the theory and gain hands-on experience through practical
projects and labs.

This program features the perfect mix of theory, case studies, and extensive hands-
on practical experience through integrated labs. It provides a comprehensive
education, leveraging IIIT Bangalore‘s academic excellence and Simplilearn’s unique
blend of self-paced online videos, live virtual classes, hands-on projects, and
integrated labs.

3
Key Features of the Program
Program completion certificate Empower your cybersecurity
from IIIT Bangalore (Digital & learning with generative AI
Physical)

Experiential learning via


Program transcript from IIIT multiple real-life innovation
Bangalore projects and capstones

Attend masterclasses delivered Masterclass from Former-NPCI


by IIIT Bangalore professors Expert

Practice labs and projects with Earn an industry-recognized


integrated labs Simplilearn certificate after
completing each module

Access to the IBM Learning


Portal Participate in live virtual classes
led by industry experts, hands-
on projects, and integrated labs
Engage in capstone projects in
3 domains
Access Simplilearn’s JobAssist
Service to get noticed by top
Industry-recognized IBM
hiring companies
certifications for IBM courses

Exclusive hackathons
conducted by IBM

4
About IIIT - Bangalore
The International Institute of Information Technology Bangalore, popularly known as
IIIT Bangalore was established in 1999 with a vision to contribute to the IT world by
focusing on education and research, entrepreneurship, and innovation.

IIIT Bangalore has been ranked 1st among the private technical universities in India
as per India Today, August 2021 edition. It has been ranked 8th overall among
engineering universities in the August 2021 edition and was ranked 10th in the same
category as per India Today, August 2020 edition.

About IBM
IBM Learning encompasses various programs and platforms to empower individuals
with the skills and knowledge needed to succeed in the digital age. These initiatives
include online courses, certifications, workshops, and learning paths covering cloud
computing, artificial intelligence, cybersecurity, data science, and more.

About Simplilearn
Founded in 2010 and based in Plano, Texas and Bangalore, India, Simplilearn, a
Blackstone portfolio company, is the world’s leading digital skills provider, enabling
learners across the globe. Simplilearn offers access to world-class work-ready
training to individuals and businesses worldwide. Simplilearn offers 1,500+ live online
classes each month across 150+ countries, impacting over 8 million learners globally.
The programs are designed and delivered with world-renowned universities, top
corporations, and leading industry bodies via live online classes featuring top
industry practitioners, sought-after trainers, and global leaders. From college
students and early career professionals to managers, executives, small businesses,
and big corporations, Simplilearn’s role-based, skill-focused, industry-recognized,
and globally relevant training programs are ideal upskilling solutions for diverse
career or business goals.

5
Integrated Labs & Tools
Four Virtual Machines will be provided in the laboratories (VM):

Windows Kali Linux OS Ubuntu OS Webgoat

The malware listed below is malware that students wouldn’t want to install on a
computer but can use in our lab’s virtual machine (VM). Students can simply access
it without harming their PCs.

OpenJDK Zenmap

NMap Traceroute

RanSim Exeinfo PE

Virustotal MTR

Threat Dragon Burpsuite

Shodan Cuckoo

Nessus Metasploit

Nikto OpenVAS

Crunch New Relic

6
Slack Channel
Active Engagement and Peer-to-Peer communication during and
after live sessions

7
Eligibility Criteria
Those wishing to enroll in the program must apply for admission.

For admission to this program, candidates:

Should have a bachelor’s degree in any discipline with an average of


50% or higher marks

With a non-programming background can also apply

Must have a minimum of 1 year of work experience

Application Process
The application process consists of three simple steps:

Step 1: Submit an Application


Complete the application, including a brief statement of purpose explaining
your interest in and qualifications for the program.

Step 2: Application Review


A panel of admissions counselors will review your application and statement
of purpose to determine whether you qualify for acceptance.

Step 3: Admission
Qualified candidates will be offered admission. You can accept this offer
by paying the program fee.

8
Talk to an Admissions Counselor
We have a team of dedicated admissions counselors who can help you with the
application process and related matters.

Our team is available to:

Answer your questions about the application process.

Discuss your financing options.

Provide insight into the curriculum, program outcomes, and more.

Inquire Now Contact Us | 1-800-212-7688

9
Cybersecurity Industry Trends
As per Fortune Business, The global cyber security market size is projected to
grow from $172.32 billion in 2023 to $424.97 billion in 2030.

13.8% CAGR ₹11-12 L $345 billion


Projected market The average annual Forecasted Cyber
growth between salary of a cybersecurity Security market size
2023-2030 professional in India. by 2026
Fortune Business Glassdoor Market.us

Who Should Enroll in this Program?


This program has been designed to meet the upskilling requirements of lower- and
mid-level management professionals working in BFSI, cybersecurity, and fintech
fields who have prior technical knowledge of the basics of cybersecurity. The
course is ideal for people looking to work in job roles/positions such as, but not
limited to:

Security infrastructure specialists Cloud security architects

Network security consultants Cybersecurity software developers

Security analysts Malware analysts

Application security analysts Threat hunters

Blue team members

Note: Our pre-requisite courses, which would be assigned to the learners


before the start of the program, would cover the basics of cybersecurity.

10
Learning Path Visualization
Core Topics

Induction for Advanced Executive


Program in Cybersecurity

Enterprise Infrastructure
Security

Application/Web Application
Security

Ransomware and Malware Analysis

Ethical Hacking and VAPT

Capstone Project

Pre-Requisites:
Introduction to Cybersecurity Network Fundamentals

Linux Fundamentals Cryptography

Electives:
IIIT Bangalore Cyber Security Master Class IBM: Penetration Testing, Incident Response
and Forensics
Masterclass from Former NPCI Expert
Gen AI with Cyber Security
Security Governance and Framework

IBM: Network Security & Database IBM: Cybersecurity Compliance Framework,


Standards & Regulations
Vulnerabilities
Core Topics:

Module 1 - Induction for Advanced Executive


Program in Cybersecurity

This introductory course provides an overview of the program structure,


curriculum, learning outcomes, and more. You’ll clearly understand what lies
ahead and how this program can help you achieve your professional goals

Upon completion of this module, you will:

Get acquainted with your peers Gain a complete understanding


of the program

Module 2 - Enterprise Infrastructure Security

The Enterprise Infrastructure Security course will enable learners to gain


knowledge and skills in a series of advanced and current concepts in
cybersecurity, and related to enterprise and infrastructure security. After the
completion of this module, learners will have a comprehensive understanding
of the NICE framework, security controls, networking concepts, traffic
analysis, packet analyzers, sniffers, firewalls, SIEM, VLAN, VPN, identity and
access management, and much more.

Domain 1 - Security Essentials


Cybersecurity Threats

CIA Triad Vulnerabilities

Malwares Risk

Attacks Security Controls

12
BYOD Router

NICE Framework Transmission media

Domain 2 - Network Basics


Networking concepts Common network attacks

OSI models Network Devices

TCP/IP model Hubs,

Ports Bridges

Secure protocols Switch

Domain 3 - Network Security


Security Devices SIEM

Firewall Secure Design

Unified threat management (UTM) Virtual Local Area Network (VLAN)

NGFW Virtual Private Network (VPN)

Web application firewalls DMZ

Intrusion Detection Prevention Domain Name System (DNS)


System
Dynamic Host Configuration
Network Access Control Protocol (DHCP)

Domain 4 - Identity & Access Management


AAA Authentication System

MFA SSO

Authorization Active directory

Access control models LDAP

IAM Lifecycle

13
Module 3 - Application and Web Application
Security

The Application and Web Application Security course will enable learners
to gain knowledge and skills in OWASP tools and methodologies, insecure
deserialization, clickjacking, black box, white box, fuzzing, symmetric/
asymmetric cryptography, hashing, digital signatures, API security, patch
management, and much more.

Domain 1 - Core Concepts


Types of application Security policies, standards,
procedures, guidelines, baselines
Web application components

Web servers

Domain 2 - Software Security


Vulnerability database (VDB) CSRF

SANS Top 25 Software Errors SSRF

OWASP tools and methodologies Clickjacking

Injection

Domain 3 - Secure Software Testing


Vulnerability assessment Black box, white box

Penetration testing Fuzzing

SAST, DAST

14
Domain 4 - Cryptography
Symmetric cryptography Broken Access Control

Asymmetric cryptography Security misconfigurations

Hashing Cross site scripting (XSS)

Digital Signature Insecure deserialization

Digital Certificate Using components with known

Encryption vulnerabilities

Broken Authentication Insufficient logging and monitoring

Sensitive Data Exposure Beyond OWASP

XML External Entities (XXE)

Domain 5 - Secure Software Lifecycle Management


SSDLC How to stop API Attacks?

Threat modeling System Hardening

OWASP Secure coding guide Secure configuration

API Security Patch management

Common API Vulnerabilities Application Monitoring & Logging

15
Module 4 - Ransomware and Malware Analysis

Malware, specifically ransomware, costs businesses more than $75 billion per
year. These attacks continue to be a threat to the security of companies. In
this module you will get an overview of how to detect, analyze, and protect
yourself and your company from ransomware attacks.

Domain 1 - Introduction to Malware

What is Malware? Ransomware Families

Malware Family Pros and Cons of Paying the


Ransom
History and Evolution of Malware
Ransomware Operators and
What is Malware Market today
Targets
Birth of a Malware
How Does Ransomware Spread?
Malware Distribution Technique
Dealing with Ransomware
How much damages malwares Incidents
cause
Negotiate / Pay Ransom
Is Ransomware a Malware
Ransomware threat prevention and
Types of Ransomware response

How to defend Malware Infection Secure Design Principles

Anatomy of a Ransomware Attack

Domain 2 - Malware Analysis

What is malware analysis Dynamic analysis techniques

Why Malware Analysis Malware Behaviors and


Functionalities
Types of Malware analysis
techniques Malware Obfuscation Techniques

Static analysis techniques

16
Domain 3 - Ransomware Malware
Introduction to Ransomware Dangerous Convergences

Domain 4 - Advanced Malware Protection


Enterprise Defense Strategies Ransomware Decryption Tools

Protecting Endpoint Ransomware Removal Tools

Protecting Servers The future of malware capabilities

Zero-Trust Model Future victims

Threat Intelligence and Malware


Protection

Module 5 - Ethical Hacking and VAPT

This module provides you with the hands-on training required to master the
techniques hackers use to penetrate network systems, helping you fortify your
systems against it. You will also gain an understanding about the finer nuances of
advanced hacking concepts, penetration testing, and vulnerability assessment.

Domain 1

What is a Security Testing Breach Attack Simulation

Why Security Testing Manual and Automated Scanning

What is a Security Vulnerability? Dealing with Vulnerabilities

Types of Security Testing Types of Security Vulnerability

Vulnerability Assessment National Vulnerability Database

Penetration Testing Selecting Technology

17
Automation in VM Managing Vulnerabilities in the
Cloud
Execution, Reporting, and Analysis
Vulnerability Remediation or
Principles of Mitigation
Mitigation
Exploitable Vulnerability Reporting
What is Vulnerability Management

Domain 2 - Vulnerability Assessment


Vulnerability Assessment Program Social Engineering
and
Mobile Hacking
Technology
Using the Metasploit Framework
General Architecture
Exploitation
Active and Passive Scanning
Privileges Escalation
Technology
Avoiding Detection
The Standard for Vulnerability
Severity Rating Maintaining Access

Vulnerability database (VDB) Covering your Tracks

Common Vulnerabilities and Cloud Penetration Testing

Exposures (CVE)

Domain 3 - Penetration Testing


Penetration testing concepts i.e. Introduction to Kali Linux
what why & how we do pen test?
System Hacking
Penetration testing methodology
Infrastructure Hacking
Types of penetration testing
Client-Side Hacking
Tools and techniques used in
Password Hacking
penetration testing
Web Application Hacking
Information Discovery

Scanning & Enumerating Target

18
Domain 4 - Advanced Penetration Testing
Red Teaming Operations Being Ethical

Blue Teaming Operations Gaining written permission

Purple Teaming Non-disclosure agreements

Breach Attack Simulation Rules of engagement

Bug Bounty Program Penetration Testing Report Writing

Guidelines for Penetration Testers Report Read-Out

Module 6 - Capstone Project

This Capstone Project will allow you to implement the skills you learned
throughout this program. Dedicated mentoring sessions will teach you how to
solve a real-world, industry-aligned problem. This is the final step in the learning
path and will enable you to showcase your expertise in cybersecurity
to prospective employers.

Electives:

Module 1 - IIIT Bangalore Cybersecurity Master Class

Acquire a comprehensive understanding of technological advancements in


cybersecurity through interactive masterclasses conducted by IIIT-B professors.

Module 2 - Masterclass by Former NPCI Expert

Attend online interactive masterclasses conducted by former NPCI expert


and learn the practical application of acquired skills in Cybersecurity

19
Module 3 - Security Governance and Framework

Learn about the frameworks that govern the cybersecurity domain and the
compliance requirements that professionals must follow in this field.

Module 4 - IBM: Network Security & Database Vulnerabilitieses

In this IBM module, you will understand TCP/IP and OSI models, DNS,
DHCP, switching, routing, IP addressing, NAT, packet sniffing, and database
vulnerabilities like SQL injection.

Module 5 - IBM: Penetration Testing, Incident Response and Forensics

In this IBM module, you will learn about pen testing tools for identifying security
weaknesses, incident response techniques for effective handling of security
incidents, the importance of digital forensics in investigations, and automation for
increased efficiency and customization in cybersecurity operations.

Module 6 - Gen AI with Cybersecurity

Explore generative AI’s critical role in cybersecurity, covering threat


intelligence, report summarization, playbooks, and its impact on combating
phishing, malware, misinformation, and deepfakes. Gain insights into cutting-
edge strategies for cyber defense and threat prediction.

Module 7 - IBM : Cybersecurity Compliance Framework, Standards


& Regulations

Understand key cybersecurity concepts like governance, risk, compliance, AI ethics,


and audits. Identify cybersecurity laws and regulations, both national and international,
and their impact on organizations. Learn industry standards, including COBIT and SOC
reports, to enhance security and ensure compliance.

20
Capstone Projects

A day in the life of a A day in the life of a


Security Analyst: Malware Analyst:

Review and update an Provide security to the bank’s


organization’s password policy assets by examining, identifying,
settings to comply with the latest and understanding malware, such
security requirements. as viruses, worms, bots, rootkits,
ransomware, and Trojan horse

A day in the life of a A day in the life of a


Network Consultant: Penetration Tester:

Provide security to the bank’s Run a gray-box penetration test


assets by designing, integrating, using the tools at your disposal
and implementing complex to probe for vulnerabilities that
network architecture solutions hackers with nefarious intent
after reviewing the network might be able to exploit to gather
security. secure data.

21
Learning Outcomes
Upon successful completion of the program, you will:

1. Proficient Understanding 4. Mastery of OWASP Tools and


of NICE Framework: Learners will Methodologies: Learners will
demonstrate a comprehensive master using OWASP tools and
understanding of the NICE methodologies to identify and
framework, enabling them to address vulnerabilities in web
align cybersecurity practices with applications effectively.
industry standards effectively.

2. Expertise in Implementing 5. Capability to Secure APIs and


Security Controls: Learners will Web Applications: Learners will
become adept at implementing become proficient in securing APIs
various security controls to and web applications by adopting
safeguard enterprise infrastructure, encryption techniques, patch
networks, and systems from cyber management, and secure coding
threats. practices.

3. Advanced Knowledge in 6. Expertise in Ransomware


Networking Concepts: Learners Detection and Mitigation:
will acquire advanced knowledge Learners will acquire specialized
of networking concepts and their skills in detecting, analyzing, and
applications in enhancing security mitigating ransomware attacks,
measures within organizational contributing to heightened
environments. cybersecurity resilience for
organizations.

22
Advisory Board
V SRIDHAR
Faculty In-Charge, Continuing Professional
Education, Institutional Finance

Education : Ph.D. (University of Iowa)

Dr. V. Sridhar is Professor at the Centre for IT and Public Policy at the International
Institute of Information Technology Bangalore, India. He is the author of two
books published by the Oxford University Press: The Telecom Revolution in
India: Technology, Regulation and Policy (2012), and The Dynamics of Spectrum
Management: Legacy, Technology, and Economics (2014).

He is currently:

Member, Advisory Committee, Member, Technical and


Facebook India Tech Scholars Financial Advisory Committee,
Programme, Facebook India, E-Procurement, Centre for
July 2021-Current. E-Governance, Government of
Karnataka. Apr 2019-Current.

Member, IT and ITeS Sectional Member, Think Tank on Digital


Committee, Services Sector Markets, Competition Commission
Department 10, Bureau of Indian of India. Sep 2018 – Current.
Standards, June 2020 – Current.

23
SRINIVAS VIVEK
Assistant Professor

Education : Ph.D. (University of Luxembourg)

Previously, he was a (post-doctoral) Research Associate in the Cryptography


group of the Department of Computer Science at the University of Bristol
between Jun’15-Dec’17. Prof. Nigel Smart was his supervisor.

He obtained his Ph.D. from the University of Luxembourg, Luxembourg, in


2015. He was affiliated to the Laboratory of Algorithmics, Cryptology and
Security (LACS) in the Computer Science and Communications Research
Unit. His doctoral thesis was in Cryptography and was supervised by Prof.
Jean-Sébastien Coron and Prof. David Galindo.

He did his M. Sc. (Engg.) at the Indian Institute of Science, Bangalore, India,
between 2008-2011. He was affiliated to the Department of Computer
Science & Automation. His thesis was supervised by Prof. Veni Madhavan.
Prior to this, he obtained B. Tech. in Information Technology from National
Institute of Technology Karnataka, Surathkal, India, in 2008.

CHANDRASHEKAR RAMANATHAN
Professor & Dean (Academics) & Faculty-in-charge
Computing

Education : Ph.D. (Mississippi State University)

Professor Chandrashekar Ramanathan is a faculty member at IIITB since


2007. Professor Chandrashekar received his Ph.D degree from Mississippi
State University. His thesis was in the area of object-oriented databases.
He has extensive application software development experience spanning
over 10 years in large multinational organizations. His current focus is in the
area of information convergence and software engineering. Technology for
education, Application architectures, enterprise architecture and content
management are his other areas of interest.

24
University Certificate

Complete all the courses in the mandatory learning path successfully to obtain
this industry-wide recognized course completion certificate from IIIT Bangalore.

IBM Certificate

Industry-recognized IBM certificates for IBM courses

25
Corporate Training

Features of Corporate Training:

Tailored learning solutions

Flexible pricing options

Enterprise-grade learning management system (LMS)

Enterprise dashboards for individuals and teams

24X7 learner assistance and support

26
USA INDIA

Simplilearn Americas, Inc. Simplilearn Solutions Pvt Ltd.


5851 Legacy Circle, 6th 53/1 C, Manoj Arcade, 24th Main Rd,
Floor, Plano, TX 75024, Sector 2, HSR Layout,
United States Bengaluru - 560102,
Phone No: +1-844-532-7688 Karnataka, India
Phone No: 1800-212-7688

www.simplilearn.com
c 2009-2023 - Simplilearn Solutions. All Rights Reserved.

27

You might also like