Skip to content
Permalink
2900f794d1
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Go to file
 
 
Cannot retrieve contributors at this time

Is the threat real?

Week 1 Lab

Our first lab task is about evaluating the scale of cyber security - as a risk and as an industry. Just how many people "get hacked"? How big is the industry for cyber security products and services?

What Can You Find Out About Yourself?

Week 2 Lab

In this week's lab, we are going to use OSINT to discover what information is available on-line about ourselves (or our organisation) that might be useful for an attacker or pen-tester.

Lab sheet

Attack Evil Corp

Week 3 Lab

This lab puts you in the position of a pen-tester, with the job of looking for security vulnerabilities in the Evil Corp systems.

Assess Your Passwords

Week 4 Lab

Why are you made to have a password of a given length, with upper-case, lowe-case, numbers and so on? This lab will allow you to see how "breakable" your passwords are and what effect complexity has.

Discussion on GDPR

Week 5 Lab

GDPR! Everyone knows it is important, but what does it mean in practice? This lab will involve a discussion of some recent cases and their implications for the future of national and international data protection.

Guilty or Innocent

Week 6

All rise! This week, you will be play the part of prosecution, defence and jury, by turns, to determine who is guilty or innocent, and what punishment they deserve.

Capture the Flag

Week 7 Lab

Let the games begin...

In teams, this week you will be competing for prizes in the annual Defence Against the Poorly Illuminated Arts Capture the Flag Competition.

Finding a Back Door

Week 8 Lab

Voter Game

Week 9 Lab

Final Discussion

Week 10 Lab

In the final lab for this module, we will be holding a discussion about what has been learned, what has been surprising and what you can do to continue learning about cyber security. If schedules permit, there may be a special guest or two.