Cyber Security Basics: A Hands-on Approach

Course
en
English
30 h
This content is rated 0 out of 5
Source
  • From www.edx.org
Conditions
  • Self-paced
  • Free Access
  • Fee-based Certificate
More info
  • 6 Sequences
  • Intermediate Level

Their employees are learning daily with Edflex

  • Safran
  • Air France
  • TotalEnergies
  • Generali
Learn more

Course details

Syllabus

Lecture 1. Cybersecurity: an overview
This lecture introduces the impact of cybersecurity nowadays, as well as some examples of cyberthreats that motivate the relevance of this area of study. Types of cyberthreats, such as cybercrime or cyberwarfare, are later described, together with an overview of the current cyberthreat landscape. Finally, some well-known cybersecurity events are presented.

Lecture 2. Computer forensics
This lecture introduces computer forensics, that is the technique focused on the analysis and preservation of evidences in a particular computer device after an attack occurs. Common forensic traces are defined, namely traces left by deleted files, hidden data and fake emails.

Lecture 3. Assembly programming: towards reversing
This lecture introduces the main concepts of reverse engineering, that is, the ability to take an executable element and try to figure out how it works. The definition of this technique is introduced. After some theoretical knowledge, examples of disassembling C codes and decompiling codes in different languages, namely Java and C, are presented.

Lecture 4. Cyberdefense
This lecture introduces the main concepts of cyberdefense together with common applied tools. After presenting this topic, firewalls are outlined. The following part involves the description of Intrusion Detection Systems (IDSs). Security Information and Event management (SIEM) systems, which refer to a general approach to manage cyberdefense, are finally presented.

Lecture 5. Malware and Advanced Persistent Threats (APTs)
This lecture explains the main concepts related to malware and Advanced Persistent Threats (APTs), together with the main techniques to achieve their identification. The definition and types of malware, APTs and some real cases are introduced.

Lecture 6. Vulnerabilities and exposures
This last lesson presents vulnerabilities description and management. It describes and gives examples of the most common vulnerabilities at software, network and web level. The definition, use and application of penetration testing (pentesting) are also presented, as well as some examples applying the well-known tool Metasploit. Repositories of vulnerabilities are finally introduced.

Prerequisite

Users with basic knowledge of computer networks and operating systems. No prior knowledge of computer security is necessary.

Instructors

Lorena González Manzano
Associate Professor and researcher in the Computer Security Lab (COSEC)
Universidad Carlos III de Madrid

José María de Fuentes
Associate Professor and researcher in the Computer Security Lab (COSEC)
Universidad Carlos III de Madrid

Pedro Peris-Lopez
Associate Professor and researcher in the Computer Security Lab (COSEC)
Universidad Carlos III de Madrid

Juan E. Tapiador
Associate Professor and researcher in the Computer Security Lab (COSEC)
Universidad Carlos III de Madrid

Editor

Universidad Carlos III de Madrid (UC3M) is an innovative public university committed to the improvement of society through teaching of the highest quality and cutting-edge research in line with stringent international guidelines. UC3M has three degree-granting Schools, in addition to a School of Graduate Studies and a Doctoral School.

Established in 1989, UC3M develops its activities in four campuses and enrolls about 18.000 students in undergraduate and graduate programs (18% are foreign students). UC3M has a large offer of programs taught in English and is the 1st university in Spain and the 3rd in Europe in terms of undergraduate students taking part in the Erasmus student exchange programs. UC3M is included in the QS Top 50 Under 50, a ranking of the world’s top 50 universities established within the last 50 years.

Platform

Harvard University, the Massachusetts Institute of Technology, and the University of California, Berkeley, are just some of the schools that you have at your fingertips with EdX. Through massive open online courses (MOOCs) from the world's best universities, you can develop your knowledge in literature, math, history, food and nutrition, and more. These online classes are taught by highly-regarded experts in the field. If you take a class on computer science through Harvard, you may be taught by David J. Malan, a senior lecturer on computer science at Harvard University for the School of Engineering and Applied Sciences. But there's not just one professor - you have access to the entire teaching staff, allowing you to receive feedback on assignments straight from the experts. Pursue a Verified Certificate to document your achievements and use your coursework for job and school applications, promotions, and more. EdX also works with top universities to conduct research, allowing them to learn more about learning. Using their findings, edX is able to provide students with the best and most effective courses, constantly enhancing the student experience.

This content is rated 4.5 out of 5
(no review)
This content is rated 4.5 out of 5
(no review)
Complete this resource to write a review