Skip to content
Permalink
master
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Go to file
 
 
Cannot retrieve contributors at this time
# Defence Against the Dark Arts
Repo for the CU Online Defence against the Dark arts course.
## Notes:
Phishing:
- St11 is Video?
- Combined Articles St11-13 (Though I would have thogught st11 is a video) as there is a load of overlap
- Modified st13 Chenged to protecting against phisihng.
## Topics
| FL Step | Wk | Title | | Step title | Who |
|---------|----|------------------------|------|---------------------------------------------------------------------------------------------------|-----|
| | 1 | What is security? | st1 | [Introduction](./Articles/st01_Introduction.md) | DG |
| | | | st2 | [OWASP Top 10](./Articles/st02_OWASP_Top10.md) | DG |
| | | | st3 | [State of threats](./Articles/st03_StateOfThreats.md) | DG |
| 1.2 | | | st4 | [Know your enemy](./Articles/st04_KnowYourEnemy.md) | DG |
| | | | st5 | [Cost of Threats](./Articles/st05_CostOfAttacks.md) | DG |
| | | | st6 | [What about U (VIDEO)](./media/scripts.md#what-about-you) | DG |
| | | Blended Lab session | st7 | [Is the threat real?](./labs/lab_index.md#is-the-threat-real?) | |
|---------|----|------------------------|------|---------------------------------------------------------------------------------------------------|-----|
| | 2 | Are you naked online? | st8 | [Social Engineering (VIDEO)](./media/scripts.md#social-engineering) | JS |
| | | | st9 | [Open Source Intelligence](./Articles/st_9_OSINT.md) | DG |
| | | Blended Lab session | st10 | [What can you find out about yourself?](./labs/lab_index.md#what-can-you-find-out-about-yourself) | DG |
|---------|----|------------------------|------|---------------------------------------------------------------------------------------------------|-----|
| | 3 | Going phishing | st11 | [Phishing Intro Video](./media/scripts.md#phishing) | JS |
| | | | st12 | [Phishing Intro](./Articles/st11_WhatIsPhishing.md) | DG |
| | | | st13 | [Avioding Phishing](./Articles/st13_AviodPhishing.md) | DG |
| | | Blended Lab session | st14 | [Attack EvilCorp](./labs/lab_index.md#attack-evil-corp) | |
|---------|----|------------------------|------|---------------------------------------------------------------------------------------------------|-----|
| | 4 | Crypto | st15 | [Cryptography](./Articles/st15_Cryptography.md) | JS |
| | | | st16 | [Communications](./Articles/st16_communications.md) | JS |
| | | | st17 | [Passwords](./Articles/st17_passwords.md) | JS |
| | | Blended Lab session | st18 | Assess your passwords | JS |
|---------|----|------------------------|------|---------------------------------------------------------------------------------------------------|-----|
| | 5 | GDPR'n'U | st19 | [What is GDPR? (VIDEO)](./media/scripts.md#gdpr) | JS |
| | | | st20 | [What this means for your data](./Articles/st20_gdpr_what_it_means.md) | JS |
| | | Bleneded Lab Session | st21 | Discussion on GDPR | JS |
| | | Discussion | | [Cryptographic Backoors](./Articles/st18a_CrypographicBackdoors.md) | DG |
|---------|----|------------------------|------|---------------------------------------------------------------------------------------------------|-----|
| | 6 | Hackers and the Hacked | st22 | [Computer misuse](./Articles/st22_computer_misuse.md) | JS |
| | | | st23 | [The hackers](./Articles/st23_the_hackers.md) | JS |
| | | | st24 | [the hacked](./Articles/st24_the_hacked.md) | JS |
| | | | st25 | [The law](./Articles/st25_the_law.md) | JS |
| | | Blended Lab Session | st26 | Guilty or Innocent | JS |
|---------|----|------------------------|------|---------------------------------------------------------------------------------------------------|-----|
| | 7 | H4ck th3 pl4n3t | st27 | [Introduction to exploit week](./Articles/st27_ExploitWeekIntro.md) | DG |
| | | | st28 | [XSS](./Articles/st28_XSS.md) | DG |
| | | | st29 | [SQLi](./Articles/st29_SQLi.md) | DG |
| | | | st30 | Privileges | DG |
| | | Blended Lab Session | st31 | Capture the Flag | DG |
|---------|----|------------------------|------|---------------------------------------------------------------------------------------------------|-----|
| | 8 | Malware | st32 | [Worms and Viruses (VIDEO)](./media/scripts.md#worms-and-viruses) | JS |
| | | | st33 | [FireWalls](./Articles/st33_firewalls.md) | JS |
| | | | st34 | [AntiViruses](./Articles/st34_Antivirus.md) | JS |
| | | Blended Lab Session | st35 | Finding a back door | JS |
|---------|----|------------------------|------|---------------------------------------------------------------------------------------------------|-----|
| | 9 | How did they do that? | st36 | [Case studies showing examples of hacking events](./Articles/st36_CaseStudyIntro.md) | DG |
| | | | st37 | [NOTW Phone Hacking](./Articles/st37_CaseStudyTwo.md) | DG |
| | | | st38 | [Password Stories](./Articles/st38_CaseStudy3.md) | |
| | | Blended Lab Session | st39 | Voter Game | |
|---------|----|------------------------|------|---------------------------------------------------------------------------------------------------|-----|
| | 10 | The business factor | st40 | [BusinessFactors](./Articles/st40_ProtectIndustry.md) | |
| | | | st41 | Protecting yourself | |
| | | | st42 | [Summary](./Articles/st42_Overview.md) | |
| | | Blended Lab Session | st43 | Final Discussion | |