Who should attend
This program is suited for professionals working in roles including:
- Information Technology Professionals
- Software Engineers
- System Architects
- Software Developers
- App Developers
- Systems Analysts
- Network Security Engineers
3+ years of work experience in an IT domain or relevant academic credentials.
About the course
The Stanford Advanced Computer Security Certificate Program will provide you the skills needed to protect networks, secure electronic assets, prevent attacks, ensure the privacy of your customers, and build secure infrastructure. Through six online computer science courses , you'll have access to the latest research and best practices from world-class Stanford faculty and leading cyber security professionals. The course material is concise, relevant, and designed specifically for busy professionals in today's cyber workforce.
This program is offered by Stanford Center for Professional Development and is delivered and supported by Great Learning. Upon successful completion of the program, participants will earn a Certificate of Achievement from Stanford Center for Professional Development.
- Get the Stanford Center for Professional Development advantage. Build cutting-edge cybersecurity skills with a pioneering computer science school
- Get a certificate from Stanford Center for Professional Development. Showcase your skills with a certificate from the Stanford Center for Professional Development
- Internationally renowned faculty. Learn from pioneers in the field of cybersecurity, both in research and industry
- Mentorship from industry experts. Learn the tricks of the trade from seasoned cybersecurity practitioners
- Gain practical cybersecurity experience. Work on hands-on projects that develop your ability to solve real-world problems
- Learn with minimal disruption to your job. Completely online learning experience that’s both convenient and immersive
This 6-month structured program will help you gain advanced skills needed to protect networks, secure electronic assets, prevent attacks, ensure the privacy of your customers, and build secure infrastructures.
World-class learning material
Online content drawing from the latest research and best practices, synthesized by Stanford faculty and industry experts.
Gain real-world insights
Get access to exclusive insights from senior industry practitioners at leading organizations such as Google, LinkedIn and Data Theorem.
Learn from highly accomplished peers. Participate in discussions, engage in community problem-solving and build your network.
Gain industry-relevant skills through hands-on projects. Apply what you’ve learnt to real-world problems and build your professional portfolio.
- Mobile application security measures
- Models to develop and secure Android applications
- Security detection and measures in iOS
- Trends in mobile device management (MDM)
Writing Secure Code
- Control Hijacking Attacks and Defenses
- Static and Dynamic Analysis
- Attacks Using Virtual Machines
- Language-based Security Models
- Tools for Writing Code Securely
- Isolation Techniques
Exploiting Web Applications
- SQL Injection (and other forms of command injection including LDAP and XPath Injection)
- Browser Security Model (document object model, same-origin-policy and violations of it), and SSL
- Cross-Site Scripting (XSS), Cross-Site Request Forgery (XSRF), and Cross-Site Script Inclusion (XSSI), Clickjacking
- Coverage of HTML5 vulnerabilities due to frame communication, localstorage, cross-origin resource sharing, and other HTML5 features
- Prevention techniques including input validation, output escaping, signatures, message authentication codes, and frame busting
Your lab & project work includes:
- SQL Injection Lab
- Stack Smashing Vulnerabilities
- XPath Injection
- Function Pointer Vulnerabilities
- LDAP Injection
- Integer Smashing Vulnerabilities
- Cross-site scripting (XSS)
- Format String Vulnerabilities
- Cross-site request forgery (CSRF)
- Fuzzing & Dynamic Analysis
- HTTP Man-in-the-Middle attack
- Session Management Attack
Using platforms & tools like:
- Kali Linux
- Packet Tracer
- ... and many others
Using Cryptography Correctly
- Introduction to Cryptography
- Symmetric Encryption
- Using Cryptography Correctly
- Public-Key Cryptography
- Advanced Topics in Cryptography
- User Authentication
- Application security measures
- Trends in malware, privacy and security for mobile devices
- How to idenitfy operating system holes
- Ways to prevent network attacks and gaps in security policy
- The important interplay of privacy and digital right management
Emerging Threats and Defenses
- Advanced persistent threats and mobile threats
- Cloud trust assumptions and threat models
- Machine learning use for detection and defenses
- Network traffic analysis, web trafficking and defenses
- SSL/TLS protocol and authentication infrastructure
- Trusted cloud hardware and advanced cryptographic solutions
Cyber Security Course | Cyber Security Certifications | Cyber Security Online Course - Great Learning
John Mitchell is the Mary and Gordon Crary Family Professor in the School of Engineering at Stanford University. He has a faculty appointment in Computer Science, as well as courtesy appointments in Electrical Engineering and the Graduate School of Education. He has research interests in computer...
Professor Boneh heads the applied cryptography group and co-directs the computer security lab. Professor Boneh's research focuses on applications of cryptography to computer security. His work includes cryptosystems with novel properties, web security, security for mobile devices, and cryptanalys...
Neil Daswani is a co-founder of Dasient, Inc., a new stealth-mode Internet security company backed by some of the most influential investors in Silicon Valley. In the past, Neil has served in a variety of research, development, teaching, and managerial roles at Google, Stanford University, DoCoMo...
Videos and materials
Because of COVID-19, many providers are cancelling or postponing in-person programs or providing online participation options.
We are happy to help you find a suitable online alternative.