게시글 보기
DLE Course-1: “Cyber Security”
Eventsperiod
2019-07-09 ~ 2019-08-03
Hit
6197
Date
2019-07-05

▶ When: 9 July ~ 3 August 2019

▶ How: E-learning (2 classes per week)

Organizer: BdREN (Bangladesh)  

 

The course will deal with the principles of Cyber Security. The main purpose of this course is to give 

a holistic view of the cyber-security so that the trainees after successful completion of this course will be better 

prepared moving forward in throttling real-life cyber threats.

 

For details please follow: https://dle.asiaconnect.bdren.net.bd

 

DLE Course-1: “Cyber Security”

Course Duration: 4 weeks, 2 classes/week

Course Contents

 

1. Introduction to Cybersecurity (2 Hours)

5. Privacy in the Cyberspace (2 Hours)

• Concept of Cyberspace, Cybercrime, Cyberwar and Cybersecurity
• Concept of Integrity, Confidentiality and Availability
• Other Cybersecurity functionalities
• The People Involved (Amateurs, Crackers, Criminals, Regular users)
• Cybersecurity protection methods (Cryptography Controls, Software and Hardware Controls, Laws and Policies, Physical Controls)

 

• Legal and Illegal Threats
• Recent Privacy Issues
• Tracking Problems
• Data Collection and Sharing
• Privacy Enhancement Tools

 

2. Software Security (2 Hours)

6. Open Source Intelligence (2 Hours)

• Concept of Attack, Vulnerability, Control, Problems, Threat and Risks
• Categories of Attacks and Threats
• Security concern (Hardware, Software, Storage media, Data, Memory, People, Organizations, Communications)
• Software Vulnerabilities and Exploits
• Introduction to Malware
• Lifecycle of Virus and Bots

 

• Concept of Open Source Intelligence
• Privacy in Social Networks
• Privacy in Cryptocurrencies
• Information Searching Tools
• Human Aspects

 

3. Web Security (2 Hours)

7. Introduction to network security (2 Hours)

• Web Basics
• Security Requirements (Authenticity, Integrity, Confidentiality, Availability and non-repudiation)
• History of Web Security Protocols
• Overview of TLS Protocol
• Concept of Public key Infrastructure • Attacks on TLS

 

• Basic Attack Types
• Authentication Methodologies and Protocols
• Types of Firewalls (packet filter, stateful and application level)
• Intrusion Detection and Prevention Systems

 

4. Web Application Security(2 Hours)

8. Network Security Protocol and Standard (2 Hours)

• Most Common Web Application Attacks
• OWASP Top 10
• Input Validation
• Authentication and Session Management
• Access Controls
• Injection
• Protection Methodologies

 

• PGP
• S/MIME
• SSH
• IPSEC
• DNSSec