Cyber Security Basics: A Hands-on Approach

课程
en
英语
30 时
此内容评级为 0/5
来源
  • 来自www.edx.org
状况
  • 自定进度
  • 免费获取
  • 收费证书
更多信息
  • 6 序列
  • 等级 中级

他们的员工每天都在学习Edflex

  • Safran
  • Air France
  • TotalEnergies
  • Generali
Learn more

课程详情

教学大纲

Lecture 1. Cybersecurity: an overview
This lecture introduces the impact of cybersecurity nowadays, as well as some examples of cyberthreats that motivate the relevance of this area of study. Types of cyberthreats, such as cybercrime or cyberwarfare, are later described, together with an overview of the current cyberthreat landscape. Finally, some well-known cybersecurity events are presented.

Lecture 2. Computer forensics
This lecture introduces computer forensics, that is the technique focused on the analysis and preservation of evidences in a particular computer device after an attack occurs. Common forensic traces are defined, namely traces left by deleted files, hidden data and fake emails.

Lecture 3. Assembly programming: towards reversing
This lecture introduces the main concepts of reverse engineering, that is, the ability to take an executable element and try to figure out how it works. The definition of this technique is introduced. After some theoretical knowledge, examples of disassembling C codes and decompiling codes in different languages, namely Java and C, are presented.

Lecture 4. Cyberdefense
This lecture introduces the main concepts of cyberdefense together with common applied tools. After presenting this topic, firewalls are outlined. The following part involves the description of Intrusion Detection Systems (IDSs). Security Information and Event management (SIEM) systems, which refer to a general approach to manage cyberdefense, are finally presented.

Lecture 5. Malware and Advanced Persistent Threats (APTs)
This lecture explains the main concepts related to malware and Advanced Persistent Threats (APTs), together with the main techniques to achieve their identification. The definition and types of malware, APTs and some real cases are introduced.

Lecture 6. Vulnerabilities and exposures
This last lesson presents vulnerabilities description and management. It describes and gives examples of the most common vulnerabilities at software, network and web level. The definition, use and application of penetration testing (pentesting) are also presented, as well as some examples applying the well-known tool Metasploit. Repositories of vulnerabilities are finally introduced.

先决条件

Users with basic knowledge of computer networks and operating systems. No prior knowledge of computer security is necessary.

讲师

Lorena González Manzano
Associate Professor and researcher in the Computer Security Lab (COSEC)
Universidad Carlos III de Madrid

José María de Fuentes
Associate Professor and researcher in the Computer Security Lab (COSEC)
Universidad Carlos III de Madrid

Pedro Peris-Lopez
Associate Professor and researcher in the Computer Security Lab (COSEC)
Universidad Carlos III de Madrid

Juan E. Tapiador
Associate Professor and researcher in the Computer Security Lab (COSEC)
Universidad Carlos III de Madrid

编辑

Universidad Carlos III de Madrid

平台

EdX est une plateforme d'apprentissage en ligne (dite FLOT ou MOOC). Elle héberge et met gratuitement à disposition des cours en ligne de niveau universitaire à travers le monde entier. Elle mène également des recherches sur l'apprentissage en ligne et la façon dont les utilisateurs utilisent celle-ci. Elle est à but non lucratif et la plateforme utilise un logiciel open source.

EdX a été fondée par le Massachusetts Institute of Technology et par l'université Harvard en mai 2012. En 2014, environ 50 écoles, associations et organisations internationales offrent ou projettent d'offrir des cours sur EdX. En juillet 2014, elle avait plus de 2,5 millions d'utilisateurs suivant plus de 200 cours en ligne.

Les deux universités américaines qui financent la plateforme ont investi 60 millions USD dans son développement. La plateforme France Université Numérique utilise la technologie openedX, supportée par Google.

此内容评级为 4.5/5
(没有评论)
此内容评级为 4.5/5
(没有评论)
完成这个资源,写一篇评论