Cyber Threats and Defenses
Duration: 1 Week
Summary:
This module describes some of the most prominent cyber attacks and cyber defenses.
These are covered in brief video lectures that do a good job of providing the concept, but occasionally get more deeply technical.
In this course, we do not expect you to understand the deeply technical aspects,
but we do expect you to learn the vocabulary and the basic ideas behind the threats and defenses.
Learning Objectives
The objective of this module is to introduce several cyber threats and defenses against them.
After doing the material in this module, you should be able to:
- Describe some of the major categories of technical attacks (man-in-the-middle, denial of service, buffer overflow, zero day attack)
- Identify common vulnerabilities in web applications (cross-site scripting, SQL injection)
- Define social engineering
- Identify common methods of social engineering: phishing attack, shoulder surfing, dumpster diving, wardriving
- Define insider threat and provide an example of it
- Define a rogue wireless access point
- Identify common network defense technologies ( firewalls, ids, proxies)
- Define penetration testing for cyber security
- Define incident response for cyber security
Course Material
Conceptual Questions
Practicum