The Cybersecurity Specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. These concepts are illustrated with examples drawn from modern practice, and augmented with hands-on exercises involving relevant tools and techniques. Successful participants will develop a way of thinking that is security-oriented, better understanding how to think about adversaries and how to build systems that defend against them. The students will understand the concepts of reactive vs. proactive security and will have hands on activity's
What we will learn
What is cyber and the digital universe?
What is denial of service and how it is performed?
How is information gathering performed?
How to gain privileges (with brute-forcing and without)?
How to inject code into interpreted context?
How to exploit vulnerable code?
What are blacklists and how are they implemented?
What are whitelists and how are they implemented?
How to improve authentication mechanisms?
How to better manage your current assets?
How to create baselines and detect anomalies?
How to use and improve the human factor?
What are APTs?
What is security by design?
(Entry level (first cyber course graduation) : Technical/scientific mind-set, very good English (reading), search skills (google
Part 1: Threat Landscape
o Protocol malformations
o Reflections and amplifications
o Scanning, fingerprinting and enumeration
o Manual vs. Automated spidering
o Credential harvesting
o Resource mapping
o Error based information disclosure
o Brute-force logins and passwords
o Password hashes and password dictionaries
o Custom dictionaries and password complexity
o Bypass authentication mechanisms
o Bypass session management
o Bypass OS user and fs permissions
o Bypass security software
o cmd OS injections
o data-store injections
o file injections (XML, json, etc)
o remote file and resource inclusion
o injecting web clients (browsers)
o injecting client applications (office, pdf, etc)
o Buffer, stack and heap overflows
o Browser and plugin exploitation
o Code execution
Part 2: strategies
What is defense all about
o IP blacklists
o Anti-malware defenses
o URL filtering (… and ad blocking too)
o Block mail SPAM and spoofs
o Application firewalls (proxies and reverse-proxies, WAFs, DB-fw)
o Firewalls and access-lists
o Application whitelisting
o Application firewalls (positive proxies and reverse-proxies)
o strong passphrases
o multi-factor authentication
o permissions and the ‘need to know’ rule
o admins (locale & domain) and roots
o patch operating systems and applications
o perform vulnerability scans
o harden OS and application configurations
o maintain a ‘master’ system image bank
o backup and disaster recovery
o keep detailed logs and network traffic captures
o Honeypots and decoys
o Exploit mitigation tools
o Centralized log collection and analysis (aka SIEM)
o Network/host-based anomaly detection
o Heuristic A/V and HIPS
o New profession: security analyst
o User education
o Skill assessment and training (of security teams)
o Secure coding for developers
o Penetration test