Course Program
Course.program.txt — Plain Text, 1 kB (1329 bytes)
Contenuto del file
0-Cyber Security fundamentals - Basic concepts - Internet levels - Useful links 1-Infrastructure security - Physical Layer/Hardware - TCP/IP Protocols insecurity - IOT Security - Who is connecting to my network (wired and wireless) - Firewalls and related items - Expand you network: VPN - Biometrics 2-Systems Security - Operating systems and virtual infrastructures - Authentication, authorization, identification - Data security (backups, disaster recovery, redundancy) - From monitoring to intrusion prevention - Encryption fundamentals - Practical encryption (certificates, digital signature) 3-Software and frameworks - Vulnerabilities life cycle - Security in web application development - Secure software lifecicle - Cookies fundamentals 4-Offence and defence - Who are the "villains" - Most diffuse kinds of threats - Damage Control - Digital Forensic - How they become "villains" (criminology fundamentals) - Bitcoin 5-Human, legal and organizational items - Risk analysis and cost-benefit-simplicity evaluation - The human factor - BYOD and Shadow IT, two non technological problems - Social Engineering, a rising threat - Spam, phishing and surroundings - Password management - Outline of current legislation and certifications (GDPR) - Basic elements of IT process management