Skip to content
Permalink
d157ea818d
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Go to file
 
 
Cannot retrieve contributors at this time
author title subtitle email
Dan Goldsmith
A152CEM:
Introduction to Cyber Security
aa9863@coventry.ac.uk

Introduction

Welcome

Welcome to the Module

Module Name

  • Officially its "Introduction to Cyber Security"
  • May also be known as
    • "Cyber Security for Everyone"
    • "Defence against the Dark Arts"

Course Team

About Dan

  • Computer Scientist and Ethical Hacker
  • Favourite topics are the "Red Team"
    • Breaking things
    • Reverse Engineering
    • Malware and Exploit Development.

About James

  • Not a hacker in the modern sense of the word. Prefer's the term "spicy computer scientist."
  • Absolutely a hacker in the old sense of the word. Someone who likes to make computers do interesting things.

How will you be taught?

No Lectures

  • Except for this one....
  • Co-Delivery approach.
    • Course materials delivered via Coventry University Online
    • Use Aula for "Community Driven Learning"

Pre Reading for Labs

  • So this means you need to do some pre-reading (or watching videos)
  • Work through the online materials, before the Lab session
  • Will bring this all together in the Lab sessions

Aula

  • Collaborative learning platform
  • Each week there will be topics to discuss
  • Use the feed to create posts (using #tags), and comment on others.

Lab Activities

  • Review of the Week
  • Group Discussion of topics for that week
  • Presentations?

What will we be doing?

What is Security?

  • What are the Threats?
  • Who are the Threats?
  • How much does this cost?

Social Engineering

  • Are you Naked online?
    • Social Engineering
    • OS-Int
    • Phishing

Cryptography

  • Securing Data
  • Securing Communications
  • Passwords

The Legal Bit

  • GDPR
  • Ethics
  • Law around Hacking
  • Business Factors

H4ck th3 Pl4n3t!!!

  • Real world Web Application Hacking

Malware

  • Worms
  • Viruses
  • Antivirus / Malware

Assessment:

Report

  • One Coursework Element
  • Due at the end of the Module (10th April 2020)
  • Report on Cyber Security threats to a fictional Organisation