Skip to content

aa9863/DADA

master
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Code

Defence Against the Dark Arts

Repo for the CU Online Defence against the Dark arts course.

Notes:

Phishing:

  • St11 is Video?
  • Combined Articles St11-13 (Though I would have thogught st11 is a video) as there is a load of overlap
  • Modified st13 Chenged to protecting against phisihng.

Topics

FL Step Wk Title Step title Who
1 What is security? st1 Introduction DG
st2 OWASP Top 10 DG
st3 State of threats DG
1.2 st4 Know your enemy DG
st5 Cost of Threats DG
st6 What about U (VIDEO) DG
Blended Lab session st7 Is the threat real?
--------- ---- ------------------------ ------ --------------------------------------------------------------------------------------------------- -----
2 Are you naked online? st8 Social Engineering (VIDEO) JS
st9 Open Source Intelligence DG
Blended Lab session st10 What can you find out about yourself? DG
--------- ---- ------------------------ ------ --------------------------------------------------------------------------------------------------- -----
3 Going phishing st11 Phishing Intro Video JS
st12 Phishing Intro DG
st13 Avioding Phishing DG
Blended Lab session st14 Attack EvilCorp
--------- ---- ------------------------ ------ --------------------------------------------------------------------------------------------------- -----
4 Crypto st15 Cryptography JS
st16 Communications JS
st17 Passwords JS
Blended Lab session st18 Assess your passwords JS
--------- ---- ------------------------ ------ --------------------------------------------------------------------------------------------------- -----
5 GDPR'n'U st19 What is GDPR? (VIDEO) JS
st20 What this means for your data JS
Bleneded Lab Session st21 Discussion on GDPR JS
Discussion Cryptographic Backoors DG
--------- ---- ------------------------ ------ --------------------------------------------------------------------------------------------------- -----
6 Hackers and the Hacked st22 Computer misuse JS
st23 The hackers JS
st24 the hacked JS
st25 The law JS
Blended Lab Session st26 Guilty or Innocent JS
--------- ---- ------------------------ ------ --------------------------------------------------------------------------------------------------- -----
7 H4ck th3 pl4n3t st27 Introduction to exploit week DG
st28 XSS DG
st29 SQLi DG
st30 Privileges DG
Blended Lab Session st31 Capture the Flag DG
--------- ---- ------------------------ ------ --------------------------------------------------------------------------------------------------- -----
8 Malware st32 Worms and Viruses (VIDEO) JS
st33 FireWalls JS
st34 AntiViruses JS
Blended Lab Session st35 Finding a back door JS
--------- ---- ------------------------ ------ --------------------------------------------------------------------------------------------------- -----
9 How did they do that? st36 Case studies showing examples of hacking events DG
st37 NOTW Phone Hacking DG
st38 Password Stories
Blended Lab Session st39 Voter Game
--------- ---- ------------------------ ------ --------------------------------------------------------------------------------------------------- -----
10 The business factor st40 BusinessFactors
st41 Protecting yourself
st42 Summary
Blended Lab Session st43 Final Discussion