Skip to content
Permalink
15106798e3
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Go to file
 
 
Cannot retrieve contributors at this time
107 lines (77 sloc) 2.2 KB
---
author: 'Dan Goldsmith'
title: 'A152CEM:'
subtitle: "Introduction to Cyber Security"
email: 'aa9863@coventry.ac.uk'
---
# Introduction
## Welcome
> Welcome to the Module
## Module Name
- Officially its "Introduction to Cyber Security"
- May also be known as
- "Cyber Security for Everyone"
- "Defence against the Dark Arts"
## Course Team
- Dan Goldsmith (aa9863@coventry.ac.uk)
- James Shuttleworth (csx239@coventry.ac.uk)
- Adam Barns
## About Dan
- Computer Scientist and Ethical Hacker
- Favourite topics are the "Red Team"
- Breaking things
- Reverse Engineering
- Malware and Exploit Development.
## About James
- Not a hacker in the modern sense of the word. Prefer's the term
"spicy computer scientist."
- Absolutely a hacker in the old sense of the word. Someone who
likes to make computers do interesting things.
# How will you be taught?
## No Lectures
- Except for this one....
- Co-Delivery approach.
- Course materials delivered via Coventry University Online
- Use Aula for "Community Driven Learning"
## Pre Reading for Labs
- So this means you need to do some pre-reading (or watching videos)
- Work through the online materials, before the Lab session
- Will bring this all together in the Lab sessions
## Aula
- Collaborative learning platform
- Each week there will be topics to discuss
- Use the feed to create posts (using #tags), and comment on others.
## Lab Activities
- Review of the Week
- Group Discussion of topics for that week
- Presentations?
# What will we be doing?
## What is Security?
- What are the Threats?
- Who are the Threats?
- How much does this cost?
## Social Engineering
- Are you Naked online?
- Social Engineering
- OS-Int
- Phishing
## Cryptography
- Securing Data
- Securing Communications
- Passwords
## The Legal Bit
- GDPR
- Ethics
- Law around Hacking
- Business Factors
## H4ck th3 Pl4n3t!!!
- Real world Web Application Hacking
## Malware
- Worms
- Viruses
- Antivirus / Malware
# Assessment:
## Report
- One Coursework Element
- Due at the end of the Module (8th April 2021)
- Report on Cyber Security threats to a fictional Organisation