Description
This course gives students a fundamental understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are built and applied to real-world systems is also provided. Simple Unix kernel hacks, Internet worms, and Trojan horses in software utilities are all examples. Network attacks such as distributed denial of service (DDOS) and botnet attacks are also described and illustrated with real-world examples from the last few decades.
Syllabus :
1. Introduction to Cyber Security
- Introduction: What You Will Learn from This Course on Cyber Security
- Assignments and Reading
- Hacking an Old-Fashioned Soda Machine
- Simple Worm Program
- Trojan Horse Login Program
- Malicious Compiler Program
- Typical Unix Kernel Attack
- Explaining Interview Series
2. Understanding Basic Security Frameworks
- Purpose of Cyber Security
- Adversary Types
- Vulnerability Types
- Threat Types
- Matching Quiz
- Matching Quiz Solution
- Confidentiality Threat
- Integrity Threat
- Availability Threat
- Fraud Threat
- Testing for Vultnerabilities
- Attacks
- Brute Force vs. Hueristic Attacks
- Crytanalysis
- Cryptanalyzing Caesar Cipher
3. Examining Cyber Threats More Closely
- SQL/ Slammer Worm of 2003
- Nachi Worm of 2003
- Botnet Design
- Botnet Arithmetic
- Welcome Elad Yoran
- Assets and Infrastructure
- Calculating Risk
- Making Security and Cost Decisions Based on Risk
- Threat Trees and Completeness of Analysis
4. Introducing Security Risk Analysis
- Assignments and Reading
- Mapping Assets to Threats
- Estimating Risk for Threat-Asset Pairs
- Example Case Study Matrix
- Mapping Assets, Threats, Vulnerabilities, and Attacks