Cyber security technologies II  

Descriptions: This course is aimed at students who have a very good understanding of computer technology. The lectures cover adversarial threat models, attacks that compromise security, and techniques for achieving security, incident lifecycle and quick overview of tools and tactics used in different lifecycle stages, based on recent research papers. Topics include operating system (OS) security, malware, capabilities, information flow control, language security, network protocols, hardware security, and security in web applications. Assignments include labs that are preparation for small individual research projects where students get to learn usage and application principles of some of these technologies such as basic malware analysis,anonymising principles, Firewall, IDS, IPS basic configuration, etc. Learning outcomes: After completing the course, the student: * knows Möbius defence, Cyber Kill Chain and Threat-based Defense models * knows the most significant current cyber threats * knows the basics of Malware handling and quick analysis options. * knows the basics of Disk and network forensics * has performed individual research * has experienced the information gathering aspect of the cyber incident management process
Presential
English
Cyber security technologies II
English

Funded by the European Union. Views and opinions expressed are however those of the author(s) only and do not necessarily reflect those of the European Union or HaDEA. Neither the European Union nor the granting authority can be held responsible for them. The statements made herein do not necessarily have the consent or agreement of the ASTRAIOS Consortium. These represent the opinion and findings of the author(s).