18+ Skills Covered:
19+ Tools Covered:
ENROLL NOW
This cybersecurity program is tailored for professionals looking to elevate their organization's security posture. It offers practical, hands-on experience with cutting-edge techniques, tools, and technologies—including API security, network defense, malware analysis, ethical hacking, penetration testing, vulnerability assessments, and more.
Begin your cybersecurity journey with a comprehensive overview of foundational concepts and the cybersecurity landscape.
Build a strong base in operating systems, covering memory management, file systems, and system architecture.
Master core networking concepts—protocols, topologies, and security best practices—through hands-on labs using tools like PowerShell, Wireshark, and Packet Tracer.
Deepen your understanding of enterprise and infrastructure security essential for safeguarding complex IT environments.
Explore the NICE framework, security controls, SIEM, firewalls, VPNs, and identity and access management systems.
Learn critical aspects of application security, including web architecture, encryption, and OWASP Top 10 vulnerabilities.
Gain practical skills in monitoring, logging, and using frameworks like NIST and ISO/IEC 27001 to improve resilience and reduce risk.
Understand different forms of malware and ransomware, their spread, and defense mechanisms.
Get hands-on training in malware analysis and incident response to effectively detect and neutralize threats.
Explore ethical hacking fundamentals, from defensive/offensive strategies to hacker types and attack frameworks like MITRE ATT&CK® and the Cyber Kill Chain.
Practice real-world techniques in network scanning, footprinting, and enumeration.
Master vulnerability management through practical use of tools like Nessus and Nmap.
Learn to detect and defend against network threats like sniffing, DoS/DDoS attacks, and social engineering with tools such as honeypots, AAA protocols, and Wireshark.
Apply everything you've learned in a real-world, industry-based capstone project.
Demonstrate your expertise and earn a Capstone Certificate from Nvidya.
Engage in an expert-led session by Purdue faculty covering the latest trends and innovations in cybersecurity.
Dive into the world of generative AI and prompt engineering with ChatGPT.
Learn to apply GenAI in business scenarios and develop effective prompts for customized AI outputs.
Explore how generative AI is transforming cybersecurity—from enhancing threat intelligence and automating playbooks to combating phishing, malware, and deep fakes.
Understand how NLP and GenAI can bolster cybersecurity defenses and threat prediction.
Learn the basics of Microsoft Azure, including computing, networking, and storage services.
Understand Azure’s architecture and how it supports secure, scalable cloud computing.
Discover the foundations of security, compliance, and identity within Microsoft environments.
Learn to protect identities and manage data security using Microsoft’s integrated tools.
Gain advanced expertise in securing Microsoft Azure environments.
Master identity and access management, platform protection, and threat detection to ensure cloud infrastructure security.
Design and implement secure file storage for a finance team, including user account management, access control lists (ACLs), command history tracking, persistent environment settings, and security logging—all accessible via a secure web interface.
Conduct a comprehensive vulnerability assessment on Windows Server 2016 using Metasploit. Identify and exploit vulnerabilities, evaluate their impact on Confidentiality, Integrity, and Availability (CIA), and perform root cause analysis (RCA) to strengthen system security.
Deploy and secure Active Directory on a Windows Server environment. Configure client systems, manage user accounts, and enforce compliance with NIST and CIS security policies to ensure robust domain administration.
This cybersecurity program is tailored for professionals looking to elevate their organization's security posture. It offers practical, hands-on experience with cutting-edge techniques, tools, and technologies—including API security, network defense, malware analysis, ethical hacking, penetration testing, vulnerability assessments, and more.