▶ When: 9 July ~ 3 August 2019 ▶ How: E-learning (2 classes per week) ▶ Organizer: BdREN (Bangladesh) The course will deal with the principles of
Cyber Security. The main purpose of this course is to give a holistic view of
the cyber-security so that the trainees after successful completion of this
course will be better prepared moving forward in throttling real-life cyber
threats. For details please follow: https://dle.asiaconnect.bdren.net.bd
DLE Course-1: “Cyber Security”
Course Duration: 4 weeks, 2 classes/week
Course Contents
|
1.
Introduction to Cybersecurity (2 Hours)
|
5.
Privacy in the Cyberspace (2 Hours)
|
• Concept of
Cyberspace, Cybercrime, Cyberwar and Cybersecurity
• Concept of Integrity, Confidentiality and Availability
• Other Cybersecurity functionalities
• The People Involved (Amateurs, Crackers, Criminals, Regular users)
• Cybersecurity protection methods (Cryptography Controls, Software and
Hardware Controls, Laws and Policies, Physical Controls)
|
• Legal and
Illegal Threats
• Recent Privacy Issues
• Tracking Problems
• Data Collection and Sharing
• Privacy Enhancement Tools
|
2.
Software Security (2 Hours)
|
6.
Open Source Intelligence (2 Hours)
|
• Concept of
Attack, Vulnerability, Control, Problems, Threat and Risks
• Categories of Attacks and Threats
• Security concern (Hardware, Software, Storage media, Data, Memory, People,
Organizations, Communications)
• Software Vulnerabilities and Exploits
• Introduction to Malware
• Lifecycle of Virus and Bots
|
• Concept of Open
Source Intelligence
• Privacy in Social Networks
• Privacy in Cryptocurrencies
• Information Searching Tools
• Human Aspects
|
3.
Web Security (2 Hours)
|
7.
Introduction to network security (2 Hours)
|
• Web Basics
• Security Requirements (Authenticity, Integrity, Confidentiality,
Availability and non-repudiation)
• History of Web Security Protocols
• Overview of TLS Protocol
• Concept of Public key Infrastructure • Attacks on TLS
|
• Basic Attack
Types
• Authentication Methodologies and Protocols
• Types of Firewalls (packet filter, stateful and application level)
• Intrusion Detection and Prevention Systems
|
4.
Web Application Security(2 Hours)
|
8.
Network Security Protocol and Standard (2
Hours)
|
• Most Common Web
Application Attacks
• OWASP Top 10
• Input Validation
• Authentication and Session Management
• Access Controls
• Injection
• Protection Methodologies
|
• PGP
• S/MIME
• SSH
• IPSEC
• DNSSec
|
|