Skip to content
6005-CEM Security
Lecture
Initializing search
6005-CEM Security
Home
Module Information
Module Information
Module Guide
About these Docs
Assesment
Assesment
Coursework 1
Coursework 2
Target for CW1
Week 1 Introduction
Week 1 Introduction
Materials
Materials
Introduction
What Is Cyber Security?
3 Pillars of Cyber Security
CIA Triangle
Threats to Businesses
Types of Attack
Who are the Hackers
Online Lecture
Online Lecture
Lecture
Task
On Campus
On Campus
Part1
Extra
Extra
BFF Part 1
Week 2 Legal Factors
Week 2 Legal Factors
Materials
Materials
Introduction
GDPR
Privacy by design
Implementing GDPR
Online Lecture
Online Lecture
Lecture
Task
On Campus
On Campus
Lab Session
Week 3 Secure Design and Infrastructure
Week 3 Secure Design and Infrastructure
Materials
Materials
Introduction
Threats To Systems
Technology
Secure Design Principles
Secure Development Lifecycle
Online Lectures
Online Lectures
Lecture
On Campus
On Campus
Lab Session 1
Week 4 On Campus Lab
Week 4 Cryptography
Week 4 Cryptography
Materials
Materials
Introduction
Authentication
History of Crypto
Encoding
Hashing
Online Lectures
Online Lectures
Lecture
Lecture
Table of contents
Slides
Recordings
On Campus Lab Session
On Campus Lab Session
Using Hashes
Week 5 Cryptography
Week 5 Cryptography
Materials
Materials
Introduction
Symmetric Encryption
Key Exchange
Asymetric Encryption
On Campus Lab Session
On Campus Lab Session
Chat Client
Week 6 Common Vulnerblitlites and Audit
Week 6 Common Vulnerblitlites and Audit
Materials
Materials
Introduction
OWASP top 10
Classifying Vulns
Audit: Methods
Audit: Eyeballing
Audit: Automation
Week 7 HTTP and SQL Injection
Week 7 HTTP and SQL Injection
Materials
Materials
Introduction
Recap
Recap
HTTP
Requests
Tools To Automate Requests
Storing State in HTTP
SQL And Injection
SQL Injection
Database Enumeration
Blind SQL Injecton
Live Lab Session
Live Lab Session
Overview
DVWA
SQL Injection
Week 8 Shells and XSS
Week 8 Shells and XSS
Materials
Materials
Introduction
XSS
XSS Types
XSS Payloads
Intro To Shells
Remote Shells
Netcat Shells
Live Lab Session
Live Lab Session
Lab Task
Week 9 RCE
Week 9 RCE
Materials
Materials
Introduction
What is RCE
File Includes Overview
Local File Includes
Exploiting RFI
Exploiting LFI
Upload Checks
Lab Tasks
Week 10 Deserialisation and NoSQL
Week 10 Deserialisation and NoSQL
Materials
Materials
Introduction
Insecure Deserialisation
Insecure Deserial Examples
No SQL Injection
Activities
Week 11 Overflows
Week 11 Overflows
Materials
Materials
Introduction
Stack Organisation
Overflowing Buffers
My first Overflow
Smashing the Stack for Fun and Profit
Extra
Extra
Detailed Stack Walkthrough
Activities
Activities
Overflows Lab
Tools and Cheatsheets
Tools and Cheatsheets
Tools Help
Kali in the Lab
installing kali At home
Table of contents
Slides
Recordings
Week 4: Lecture
Slides
Week 4 Slides
Recordings
Back to top