Introduction to Cyber Security-Module 1
Introduction: What You Will Learn from This Course on Cyber Security
()
Assignments and Reading
()
Hacking an Old-Fashioned Soda Machine
()
Simple Worm Program
()
Trojan Horse Login Program
()
Malicious Compiler Program
()
Typical Unix Kernel Attack
()
Explaining Interview Series
()
Welcome Lou Manousos (Part 1)
()
Welcome Lou Manousos (Part 2)
()
Introduction to Cyber Security-Module 1 Assignments
Required: Smashing the Stack for Fun and Profit,” Aleph One
Required: “Reflections on Trusting Trust,” Ken Thompson
Video: DEF CON 23
Video: Kevin Mitnick | Talks at Google
Suggested: Introduction to Cyber Security (Ch. 1-2)
Suggested: TCP/IP Illustrated Volume 1 (2nd Ed.), (Ch. 1-2)
Understanding Basic Security Frameworks-Module 2
Assignments and Reading
()
Purpose of Cyber Security
()
Adversary Types
()
Vulnerability Types
()
Threat Types
()
Matching Quiz
()
Matching Quiz Solution
()
Confidentiality Threat
()
Integrity Threat
()
Availability Threat
()
Fraud Threat
()
Testing for Vultnerabilities
()
Attacks
()
Brute Force vs. Hueristic Attacks
()
Crytanalysis
()
Cryptanalyzing Caesar Cipher
()
Welcome Jose Dominguez
()
Understanding Basic Security Frameworks-Module 2 Assignments
Required: “Why Cryptosystems Fail,” Ross Anderson
Required: “There Be Dragons,” Steve Bellovin
Video: DMARC Whiteboard Session
Video: Defcon 26
Suggested: Introduction to Cyber Security, (Ch. 3 - 4)
Suggested: TCP/IP Illustrated Volume 1 (2nd Ed.), (Ch. 3 – 4)
Examining Cyber Threats More Closely-Module 3
Assignments and Reading
()
SQL/ Slammer Worm of 2003
()
Nachi Worm of 2003
()
Botnet Design
()
Botnet Arithmetic
()
Welcome Elad Yoran
()
Assets and Infrastructure
()
Calculating Risk
()
Making Security and Cost Decisions Based on Risk
()
Threat Trees and Completeness of Analysis
()
Examining Cyber Threats More Closely-Module 3 Assignments
Required: “Hackers Remotely Kill a Jeep on the Highway with Me in It,” Andy Greenberg, Wired Magazine
Required: “A Hacker’s Evolution: Austin’s HD Moore Grew Up with Cybersecurity Industry,” 512 Tech
Suggested: Introduction to Cyber Security (Ch. 5 - 6)
Suggested: TCP/IP Illustrated Volume 1 (2nd Edition), (Ch. 5 - 6)
Video: “Top Hacker Shows Us How It’s Done,” Pablos Holman, TEDx Midwest
Video: “All Your Devices Can be Hacked,” Avi Rubin, TED Talk
Introducing Security Risk Analysis-Module 4
Assignments and Reading
()
Mapping Assets to Threats
()
Estimating Risk for Threat-Asset Pairs
()
Example Case Study Matrix (Part 1)
()
Example Case Study Matrix (Part 2)
()
Example Case Study Matrix (Part 3)
()
Mapping Assets, Threats, Vulnerabilities, and Attacks
()
Welcome Nasir Memon
()
Introducing Security Risk Analysis-Module 4 Assignments
Required: “A Man-in-the-Middle Attack on UMTS,” Meyer and Wetzel
Required: “Are Computer Hacker Break-Ins Ethical?” Eugene Spafford
Video: “What’s Wrong With Your Password,” Lorrie Faith Cranor, TED Talk
Video: “Fighting Viruses, Defending the Net,” Mikko Hypponen, TED Talk
Suggested: Introduction to Cyber Security, (Ch. 7 - 8)
Suggested: TCP/IP Illustrated Volume 1 (2nd Ed.), (Ch. 7 – 8)
Introducing Security Risk Analysis-Final Project
Project Description
Additional Self-Learning Opportunities