COURSE DESCRIPTION
In today’s increasingly digitized world, digital security should be a priority for any enterprise. In this course, students will obtain the skills necessary to help ensure digital security at any enterprise, wherever they might work in the future. Time will be devoted to understanding an organisation’s security policy, running a security audit, and understanding different types of cybersecurity threats. Students will also gain exposure to regular IT security procedures, along with the skills necessary to train end users on security optimisation throughout an organisation.
Prerequisite: SPE10, SPE20, SPE30.
DESCRIPTION DU COURS
Dans notre monde de plus en plus numérisé, la sécurité digitale devrait être une priorité pour chaque entreprise. Dans ce cours, les étudiants acquerront les compétences nécessaires pour assurer la sécurité numérique dans n’importe quelle entreprise. Du temps sera consacré à la compréhension de la politique de sécurité d’une organisation, à l’exécution d’un audit de sécurité et à la compréhension de différents types de menaces cybers. Les étudiants seront également exposés aux procédures régulières de sécurité informatique, ainsi qu’aux compétences nécessaires pour former les utilisateurs finaux sur l’optimisation de la sécurité.
Pré-requis: SPE10, SPE20, SPE30
Links to resources for presentations or summaries:
PRIVACY
- Cyber Security Minute | NEWS10 ABCHow to Anonymize Everything You Do Online | WIRED
Hacker Lexicon: What Is Perfect Forward Secrecy? | WIRED - Wanna Protect Your Online Privacy? Open a Tab and Make Some Noise | WIRED
Fundamentals of Information Systems Security – Wikibooks, open books for an open worldHIGH PROFILE CASES
Election cyberattack proves people are still the biggest flaw
Inside the Hunt for Russia’s Most Notorious Hacker | WIRED
Did the Russians “hack” the election? A look at the established facts | Ars Technica
The Perfect Weapon: How Russian Cyberpower Invaded the U.S. – The New York Times
Inside the OPM Hack, The Cyberattack that Shocked the US Government | WIRED
What’s Up With The Internet Today? Websites Lag, Don’t Load For Many In U.S. : The Two-Way : NPR
24 cyber criminals arrested in Europol operationGENERAL ENTREPRISE CYBER SECURITY
What is shadow IT (shadow information technology)? – Definition from WhatIs.com
Election cyberattack proves people are still the biggest flaw
What is ITSM (IT Service Management)? – Definition from WhatIs.com
What is security information and event management (SIEM)? – Definition from WhatIs.com
What is security information management (SIM)? – Definition from WhatIs.com
VPNs And Privacy: Using Virtual Private Networks May Put Your Data At Risk : All Tech Considered : NPR
SANS Institute: Reading Room
Nearly a third of malware attacks are zero-day exploits
Wireshark · Go Deep.
How it Works: Cybersecurity – YouTube
Cybersecurity: Crash Course Computer Science #31 – YouTube
The steps to effective cybersecurity incident response
Tabletop cybersecurity exercises essential to infosec training
Content / Special Publications – SP 800 series / NIST SP 800-37 Guide for the Security Certification and Accreditation of Federal Information Systems – NIST IT SecurityCLOUD SECURITY (see more in cloud computing class section)
A framework for evaluating cloud computing risk
Technical Communities Overview – Open Networking Foundation
Web application and API security trends and threats – O’Reilly MediaINTRUSION DETECTION
What is advanced persistent threat (APT)? – Definition from WhatIs.com
What is software-defined perimeter (SDP)? – Definition from WhatIs.com
Why signature-based detection isn’t enough for enterprises
Identifying the warning signs of network intrusions
Four handy botnet detection techniques and tools: A tutorial
Insider threat detection tools that sniff out dangers from within
What is network behavior anomaly detection (NBAD)? – Definition from WhatIs.com
How to hone an effective vulnerability management program
Cybersecurity checklist a strategy tool for increasing attack costs
What is zero-day exploit? – Definition from WhatIs.com
Thank you for Downloading all 20 CIS Controls
Five traits employers should look for when hiring cyber security professionals – TechRepublicTOOLS
Kali Linux | Penetration Testing and Ethical Hacking Linux Distribution
Metasploit | Kali Linux
LAN Turtle by Hak5
BackTrack Linux – Penetration Testing Distribution
Cyberinsurance: Assessing risks and defining policies
VirusTotal – Free Online Virus, Malware and URL ScannerMachine Learning and Cyber Security Resources
Insider threat detection tools that sniff out dangers from within
Downloading Junkware Removal Tool
SANS Information Security Training | Cyber Certifications | Research
How does AWS Directory Service offer security benefits?
IDS on a budget of…well…0$ – IT Security – Spiceworks
Intrusion detection systems – SecTools Top Network Security Tools
IDS, IPS and UTM – What’s the Difference? | AlienVault
Passive Recon – Nine must-have OSINT tools<
Download | SimpleRisk
Open Networking Technical Communities, Corporate Memberships
Course Features
- Lecture 0
- Quiz 0
- Duration 21 hours
- Skill level All levels
- Language English
- Students 0
- Assessments Yes