CL2
Cybersecurity Laboratories 2
Objectives
- Apply cryptography and cryptanalysis concepts in practical contexts
- Develop vulnerability analysis and exploitation skills in operating systems
- Deepen knowledge of network security
- Understand the effectiveness and performance aspects of intrusion detection and prevention systems
- Provide analytical experience on the choice and configuration of secure cloud systems
- Develop skills in resolving security incidents
Program
The content will be covered as competitive challenges, for instance, Capture The Flag (CTF). This will promote the consolidation of complex concepts through their application in situations that emulate real-life scenarios. The challenges include:
- Applied cryptography, e.g., breaking simple ciphers and identifying password synthesis and recovery algorithms.
- Common vulnerabilities and attacks in operating systems, e.g., exploitation of vulnerabilities, hardening, privilege escalation and execution of malicious code
- Advanced network security, e.g., detection and prevention of attacks on computer networks, denial of service attacks, anomalous patterns
- Cloud systems security, e.g., exploitation of insecure configurations, integrity of virtual machines
Bibliography
- A. Lee. Successful Research Projects: A Guide for Postgraduates. 1st edition, Routledge, 2019.
- A. Badiru, C. Rusnock, V.. Valencia, Project Management for Research: A Guide for Graduate Students. Routledge, 2016.
- “Shell We Play A Game? CTF-as-a-service for Security Education,” by Erik Trickel, Francesco Disperati, Eric Gustafson, Faezeh Kalantari, Mike Mabey, Naveen Tiwari, Yeganeh Safaei, Adam Doupe, and Giovanni Vigna, in Proceedings of the USENIX Workshop on Advances in Security Education (ASE), Vancouver, BC, August 2017. As this is an integrative and laboratory-based course, the bibliography to be used includes the ones identified in the non-optional courses in the syllabus.