CL1
Cybersecurity Laboratories 1
Objectives
This UC aims to consolidate the knowledge acquired throughout the program by designing and implementing functions common to Security Operations Centers (SoC). By the end, students will be able to:
- Understand the relationship between security requirements and system monitoring
- Use real-time monitoring tools
- Apply techniques for processing and visualizing security events
- Apply techniques for preventing and recovering from security incidents
- Apply technical standards for auditing and recording security incidents
- Manage integrated systems for preventing, monitoring and responding to security incidents
Program
The topics covered in this UC are transversally complementary, i.e., despite exploring knowledge acquired in other Ucs, here they are interconnected in a way that is not possible in any of them individually. Thus, in the context of a SoC, the contents are explored in the following combinations:
- Mapping security models onto continuous monitoring strategies
- Aggregation and processing of security events
- Threat analysis, e.g., honeypots and Cyber Threat Intelligence (CTI)
- Penetration testing and incident prevention
- Auditing compromised systems
- Incident response
Bibliography
- A. Lee. Successful Research Projects: A Guide for Postgraduates. 1st Edition, Routledge, 2019.
- A. Badiru, C. Rusnock, V. Valencia. Project Management for Research: A Guide for Graduate Students, Routledge, 2016. As this is an integrative and laboratory-based course, the bibliography to be used corresponds to that identified in the non-optional courses in the syllabus.