Permalink
Show file tree
Hide file tree
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Showing
3 changed files
with
81 additions
and
4 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,77 @@ | ||
# Is the threat real? | ||
|
||
## Week 1 Lab | ||
|
||
Our first lab task is about evaluating the scale of cyber security - | ||
as a risk and as an industry. Just how many people "get hacked"? How | ||
big is the industry for cyber security products and services? | ||
|
||
# What Can You Find Out About Yourself? | ||
|
||
## Week 2 Lab | ||
|
||
In this week's lab, we are going to use OSINT to discover what | ||
information is available on-line about ourselves (or our organisation) | ||
that might be useful for an attacker or pen-tester. | ||
|
||
[Lab sheet](./st10_WhatCanYouFind.md) | ||
|
||
|
||
# Attack Evil Corp | ||
|
||
## Week 3 Lab | ||
|
||
This lab puts you in the position of a pen-tester, with the job of | ||
looking for security vulnerabilities in the Evil Corp systems. | ||
|
||
# Assess Your Passwords | ||
|
||
## Week 4 Lab | ||
|
||
Why are you made to have a password of a given length, with | ||
upper-case, lowe-case, numbers and so on? This lab will allow you to | ||
see how "breakable" your passwords are and what effect complexity has. | ||
|
||
# Discussion on GDPR | ||
|
||
## Week 5 Lab | ||
|
||
GDPR! Everyone knows it is important, but what does it mean in | ||
practice? This lab will involve a discussion of some recent cases and | ||
their implications for the future of national and international data | ||
protection. | ||
|
||
# Guilty or Innocent | ||
|
||
## Week 6 | ||
|
||
All rise! This week, you will be play the part of prosecution, defence | ||
and jury, by turns, to determine who is guilty or innocent, and what | ||
punishment they deserve. | ||
|
||
# Capture the Flag | ||
|
||
## Week 7 Lab | ||
|
||
Let the games begin... | ||
|
||
In teams, this week you will be competing for prizes in the annual | ||
Defence Against the Poorly Illuminated Arts Capture the Flag | ||
Competition. | ||
|
||
# Finding a Back Door | ||
|
||
## Week 8 Lab | ||
|
||
# Voter Game | ||
|
||
## Week 9 Lab | ||
|
||
# Final Discussion | ||
|
||
## Week 10 Lab | ||
|
||
In the final lab for this module, we will be holding a discussion | ||
about what has been learned, what has been surprising and what you can | ||
do to continue learning about cyber security. If schedules permit, | ||
there may be a special guest or two. |
File renamed without changes.