Course Details

Course summary: 

What is Cyber made of? What are the main cyber threats and how can they be mitigated? This course reviews the building blocks of the major Internet technologies, which consist of communication equipment and various types of endpoint devices (PC, mobile). We will study various threats and the ways hackers attack corporate networks, endpoint devices, Web applications and Clouds, as well as defense tools and protocols. 

This course is designed to provide both introduction to Cyber Security basics for daily use as well as an overview of Cyber as a domain of the broader academic discipline of Computer Sciences. 

Session 1: Communication Network Security

Introduction to the main network communication technologies: OSI 7-layers model and DARPA model, TCP/IP and DNS, LAN vs WAN architectures. Overview of different LAN and perimeter network attacks: MitM, Spoofing, DDOS, Replay attacks, DNS attacks and more.

Session 2: Endpoint Basics and Security   

Introduction to PC and mobile device basic architectures. Basics concepts of operating systems and how they are built. Introduction to the world of Malwares. What is the outline of a classic endpoint cyber­attack? Overview of methods and product types for endpoint security. 

Session 3: Social Engineering and OSINT

Understanding social engineering and its application for cyber-attacks: Phishing, SPAM and SCAM attacks and more. Main concepts of authentication security: brute force attacks and countermeasures such as 2FA. What is OSINT, and how can it threaten cyber security.

Session 4: Cyber Security Methodologies

Discussing of the Cybersecurity framework, importance of compliance, standardization, and regulation. Revealing main Cyber Security tools and future trends. Examples of cyber-attack case study. 

Session 5: Summary, conclusion & takeaways

Built with