0% found this document useful (0 votes)
10 views16 pages

Edureka - Program Brochure

The Post Graduate Program in Cyber Security and Ethical Hacking, offered in partnership with Purdue University, aims to equip students with essential skills in cybersecurity and ethical hacking. The program includes 400+ hours of immersive learning, live instructor-led sessions, and a curriculum designed by industry experts, culminating in a certificate recognized globally. With the cybersecurity market projected to grow significantly, the program also provides career assistance and opportunities in various cybersecurity roles post-completion.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views16 pages

Edureka - Program Brochure

The Post Graduate Program in Cyber Security and Ethical Hacking, offered in partnership with Purdue University, aims to equip students with essential skills in cybersecurity and ethical hacking. The program includes 400+ hours of immersive learning, live instructor-led sessions, and a curriculum designed by industry experts, culminating in a certificate recognized globally. With the cybersecurity market projected to grow significantly, the program also provides career assistance and opportunities in various cybersecurity roles post-completion.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

Post Graduate Program in

Cyber Security and Ethical Hacking


About the Post Graduate Program in Cyber Security and Ethical Hacking in partnership
with Purdue University
The Post Graduate Program in Cyber Security and Ethical Hacking, a collaborative offering from Edureka and Purdue University,
is an excellent opportunity for cyber security and ethical hacking enthusiasts to enter the domain. Purdue University, ranked 99
globally as per the 2024 QS ranking, is a top public research institution developing practical solutions to today’s toughest
challenges. Purdue offers a transformative education to all, led by some of the most eminent professors in the world, to
empower students to move the world forward.

Edureka is an online education platform focused on


delivering top-quality learning to working professionals.
We have the highest course completion rate in the
industry. We strive to create an online ecosystem for our
global learners to equip themselves with industry-relevant
skills in today’s groundbreaking technologies.
Why is Cyber Security and Ethical Hacking important?
Cybersecurity as well as ethical hacking serve the purpose of safeguarding against
cyber threats, thereby ensuring the protection of data privacy and the integrity of
systems. These measures play a crucial role in preventing financial losses, securing
both personal and organizational information, and maintaining compliance with
regulations. Furthermore, ethical hacking serves to proactively identify vulnerabilities,
thereby strengthening defensive mechanisms. These practices are indispensable for
instilling trust in digital interactions, while also safeguarding national security and
facilitating the secure adoption of emerging technologies. Given the nature of our
digital era, these practices are fundamental to maintain economic stability and
fostering technological innovation.

Equipped with data, organizations are using Cyber Security to:

Protect sensitive info and ensuring


Minimize losses and preventing harm
confidentiality

Safeguard valuable IP assets Meet obligations and ensuring legality

Minimize disruptions and ensuring resilience Build trust and preserving brand image
According to Statista, the cyber security market is poised to achieve a valuation of $183.10 billion by 2024 and estimated to grow at a
CAGR of 10.56% between 2024 to 2028, culminating in a total market volume of $273.60 billion. This upward trajectory is primarily driven
by the rise in cyber-attacks, which can be attributed to the widespread adoption of e-commerce, smart devices, cloud computing, and the
Internet of Things (IoT). Consequently, organizations are increasingly allocating resources towards sophisticated cybersecurity measures
in order to mitigate the risk of cyber threats in a dynamic and rapidly evolving cybersecurity landscape.

Current Trends in the Cyber Security Job Market:

Global cyber security industry is


The number of unfilled cyber Average salary of cyber security
estimated to achieve a valuation
security jobs is expected to Professional varies from
of $273.60 billion by 2028 –
reach 3.5 million in 2025 $84,000 – $110,000 - Indeed.com
Statista

Salary Trend Across Countries

Country Entry Level Mid Level Senior Level

India INR 550,000 INR 1,100,000 INR 4,300,000

United States $105,315 $166,308 $ 200,000

United Kingdom £40,188 £56,131 £ 205,000

Switzerland CHF 104,277 CHF 125,635 CHF 150,000

Australia A$98,000 A$130,600 A$ 180,000

Canada CA$81,022 CA$105,004 CA$ 100,000


Key Highlights

7 months of online Purdue & Edureka Certificate Curriculum curated by Instructor-Led Live
post-graduate program on completion Edureka & approved by Purdue Online Sessions

400+ Hours of Purdue Alumni Association High-Quality Lab Industry-Grade Capstone


Immersive Learning membership opportunity Environment Projects
The Edureka Advantage

WHAT I NEED WHAT EDUREKA OFFERS WHAT OTHERS OFFER

Practical Knowledge and exposure relevant to Live instructor-led online classes Recorded videos without any
the current industry/job needs by industry experts interaction with the instructor

Personalised Attention and help to make Dedicated technical and No personal attention. Online
progress in my learning non-technical teams to resolve recordings common for
all your doubts everyone
Curriculum designed by world-class global Curriculum curated by Curriculum by unknown foreign
institutes, relevant to the current industry/job Edureka & approved by Purdue or non-recognised colleges
needs

Help Sessions, both regular and one-on-one 24x7 subject matter expert Unsatisfactory support and zero
support for your technical doubt clearing sessions
doubts

Support & Guidance even after the course Lifetime access to our Learning No support after the completion
completion Management System and of the course
Edureka Support

Certificate/Credentials which are highly Certificate jointly issued by Purdue Certificate from unknown
University & Edureka, recognized foreign or local colleges
recognized in the industry/market
globally

Career Guidance and Placement Support to get a Complete access to a plethora Minimal or no career/placement
of our Career Assistance and services
relevant job in a top company
Placement Services
Immersive Learning Experience A unique learning ecosystem to Recorded videos without any
give you an offline-like live experience
immersive experience
Career Assistance Services

Live Career-oriented Profile Building Leadership Skill Extensive


Webinars Assistance Development Sessions Interview Prep
Live webinar sessions that A dedicated Career Coach will Recurring training sessions with Expert tips, sample interview
include curriculum and career provide expert tips on how to experts to help learners develop questions, mock interviews with
services walkthrough to help create an attractive, relevant Interpersonal & Leadership Skills constructive feedback from
learners understand their resume and LinkedIn profile industry experts to gain
learning objective and hands-on experience of technical
expectations of hiring managers rounds, HR round, and more.

1-on-1 Career Job Search Assistance


Mentoring Sessions & Job Feeds
One-on-one Career Mentoring Access to multiple job portals to
sessions on how to develop the help learners navigate through
right skills and attitude to secure a thousands of jobs including
dream job global remote jobs

Note: Placement Assistance will be provided to students applying only in India


Learn more about Edureka’s hiring partners in the next section.
Our Hiring Partners
Get discovered by Fortune 500 companies & global recruiters through our
tie-ups with leading recruiting firms and companies like:

What’s in it for You?


After completing the program, you will receive a course completion certificate in Cyber Security
and Ethical Hacking that will be awarded jointly by Edureka & Purdue University.

Once you complete your certification, you will have the opportunity to discover various Cyber Security jobs that are
available worldwide, such as:

Senior Level: Mid Level: Entry Level:

Chief Information Security Officer Security Engineer Cyber Security Analyst

Security Administrator Information Security Auditor Incident Response Analyst

Penetration Tester Vulnerability Assessment Analyst Security Consultant

Network Engineer SOC Analyst


Security Architect
Learning Path

Course 1 - Computer Networks and Operating Systems


Week Linux Fundamentals, Cybersecurity Tools in Kali Linux, System Security, Basics of Networking, and
01- 03 Network Security.

Course 2 - Applied Cryptography and Information Security Principles


Week Introduction to Cryptography, Symmetric Ciphers, Asymmetric Ciphers, Pseudo-Random Number
04-06 Generation, and Steganography and Data Integrity Algorithms.

Week Course 3 - Security for Infrastructure Protection


07-08 Security Fundamentals, Device Security, Topologies and IDS,and System Hardening
Course 4 - Building Security into Applications
Week Authentication and Authorization, Session Management, Web Security, File Security, Mobile
09-12 Security, Database Security, and Secure Development Methodologies

Course 5 - Ethical Hacking Tools and Techniques


Week Introduction to Ethical Hacking, Anonymity, Scanning Network, Enumeration, Vulnerability Analysis,
13-15 and Information Gathering

Course 6 - Device Exploitation and Security


Week Operating System Hacking, Hacking Wireless Networks, Malware Threats, Sniffi ng, IoT Hacking, and
16-18 Cloud Hacking

Course 7 - Hacking and Defending Web Apps


Week Introduction to Web Application Hacking, OWASP Top Ten – Part 1, SQL Injection, Session Hijacking,
19-22 OWASP Top Ten – Part 2, OWASP Top Ten – Part 3, and Social Engineering
Week Capstone Project
23-24

Security Priciples for Enterprises (Self-Paced)


Introduction to Enterprise Security, Planning the Security Architecture, Security Architecture Design, Security Architecture Operations,
Security Governance and Risk Management

Digital Forensics Principles and Practices (Self-Paced)


Introduction to Digital Forensics, Data Recovery and File System, OS Forensics

Note: The curriculum and content are subject to revision based on industry trends and updates.
Tools, Languages & Frameworks
Capstone Projects

Capstone Project #1: Testing Trending Vulnerabilities on Enterprise Frameworks


Problem Statement: Cybersecurity professionals need a way to learn about and test for the latest trending vulnerabilities
and exploits on the frameworks used in an enterprise. This box contains multiple vulnerable application frameworks that
can be exploited to cause significant damage.

Capstone Project#2: Explore Vulnerabilities for an E-Commerce Website


Problem Statement: This project simulates a real-life e-commerce website with over 90 known vulnerabilities. The system is
intentionally running an outdated operating system that is known to be vulnerable to exploits, in order to provide a
realistic testing environment.

Capstone Project#3: Maximum Vulnerability Impact on Unupdated Systems


Problem Statement: This box contains applications with secure functions and features that are as realistic as possible.
However, it is designed to showcase the possibilities of exploiting a machine that is not updated. This may require chaining
multiple vulnerabilities to execute an exploit. This approach is designed to showcase the maximum potential impact of a
vulnerability and to provide a more realistic assessment of its security implications.

Some of the Live Session Projects


Exploring Local Server and Network-Based Weaknesses Exploring User Access Control in the Linux Environment

Uncover Hidden Flags with Penetration Testing Techniques Analyzing Client-Side Vulnerabilities

Real-World Vulnerability Challenge Exploring Multiple Weaknesses in a Virtual Appliance


Program Faculty, Industry Mentors & Influencers
We have the best academics and industry experts to give you a robust learning experience. We aim to provide you with complete
exposure to real-time and relevant industry applications of the concepts learned

Bipin Kulkarni Shivendra Saxenai


Gaurav Sharma
CISO/Mentor/Security Evangelist Senior Director,
Founder and Consultant
Security and Privacy
Admissions Process

1 Enrolment Form

You will be required to provide personal, educational, and professional details. Once we receive your details,
our Admissions Counselor will reach out to take your candidature further.

2 Interview and Offer Letter

A one-on-one chat with our SME to understand your basic knowledge, prior work experience, and your
expectations from the course. After your interview assessment, you will receive an offer letter from us.

3 Payment

Based on your interview performance, your final fee will be determined. You need to make an upfront
payment to confirm your class batch.

4 Batch Allotment

After the payment formalities, you will be given course credentials and your learning journey will
begin!
Eligibility
The Post Graduate Program in Cyber Security and Ethical
Hacking is for any undergraduate degree holder like BCA,
B.Tech, B.E, B.Com, B.Sc, etc., with basic knowledge of any one
programming language

Program Fee
₹1,50,000 (Excluding GST)
EMI Plan EMI starts at ₹11,999/month

Contact Us
Follow us on:
For further details, please reach out to:
080 3506 8123
pgp.purdue@edureka.co

edureka!
IndiQube ETA
4th Floor, No.38/4,
Adjacent to Dell EMC2, Dodanekundi,
Outer Ring Road, Bengaluru,
Karnataka - 560048

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy