Defence Against the Dark Arts
Repo for the CU Online Defence against the Dark arts course.
Notes:
Phishing:
- St11 is Video?
- Combined Articles St11-13 (Though I would have thogught st11 is a video) as there is a load of overlap
- Modified st13 Chenged to protecting against phisihng.
Topics
FL Step | Wk | Title | Step title | Who | |
---|---|---|---|---|---|
1 | What is security? | st1 | Introduction | DG | |
st2 | OWASP Top 10 | DG | |||
st3 | State of threats | DG | |||
1.2 | st4 | Know your enemy | DG | ||
st5 | Cost of Threats | DG | |||
st6 | What about U (VIDEO) | DG | |||
Blended Lab session | st7 | Is the threat real? | |||
--------- | ---- | ------------------------ | ------ | --------------------------------------------------------------------------------------------------- | ----- |
2 | Are you naked online? | st8 | Social Engineering (VIDEO) | JS | |
st9 | Open Source Intelligence | DG | |||
Blended Lab session | st10 | What can you find out about yourself? | DG | ||
--------- | ---- | ------------------------ | ------ | --------------------------------------------------------------------------------------------------- | ----- |
3 | Going phishing | st11 | Phishing Intro Video | JS | |
st12 | Phishing Intro | DG | |||
st13 | Avioding Phishing | DG | |||
Blended Lab session | st14 | Attack EvilCorp | |||
--------- | ---- | ------------------------ | ------ | --------------------------------------------------------------------------------------------------- | ----- |
4 | Crypto | st15 | Cryptography | JS | |
st16 | Communications | JS | |||
st17 | Passwords | JS | |||
Blended Lab session | st18 | Assess your passwords | JS | ||
--------- | ---- | ------------------------ | ------ | --------------------------------------------------------------------------------------------------- | ----- |
5 | GDPR'n'U | st19 | What is GDPR? (VIDEO) | JS | |
st20 | What this means for your data | JS | |||
Bleneded Lab Session | st21 | Discussion on GDPR | JS | ||
Discussion | Cryptographic Backoors | DG | |||
--------- | ---- | ------------------------ | ------ | --------------------------------------------------------------------------------------------------- | ----- |
6 | Hackers and the Hacked | st22 | Computer misuse | JS | |
st23 | The hackers | JS | |||
st24 | the hacked | JS | |||
st25 | The law | JS | |||
Blended Lab Session | st26 | Guilty or Innocent | JS | ||
--------- | ---- | ------------------------ | ------ | --------------------------------------------------------------------------------------------------- | ----- |
7 | H4ck th3 pl4n3t | st27 | Introduction to exploit week | DG | |
st28 | XSS | DG | |||
st29 | SQLi | DG | |||
st30 | Privileges | DG | |||
Blended Lab Session | st31 | Capture the Flag | DG | ||
--------- | ---- | ------------------------ | ------ | --------------------------------------------------------------------------------------------------- | ----- |
8 | Malware | st32 | Worms and Viruses (VIDEO) | JS | |
st33 | FireWalls | JS | |||
st34 | AntiViruses | JS | |||
Blended Lab Session | st35 | Finding a back door | JS | ||
--------- | ---- | ------------------------ | ------ | --------------------------------------------------------------------------------------------------- | ----- |
9 | How did they do that? | st36 | Case studies showing examples of hacking events | DG | |
st37 | NOTW Phone Hacking | DG | |||
st38 | Password Stories | ||||
Blended Lab Session | st39 | Voter Game | |||
--------- | ---- | ------------------------ | ------ | --------------------------------------------------------------------------------------------------- | ----- |
10 | The business factor | st40 | BusinessFactors | ||
st41 | Protecting yourself | ||||
st42 | Summary | ||||
Blended Lab Session | st43 | Final Discussion |