01
Introduction to Cyber Security
Reviewing the course subjects
- Going through cyber and information security broad perspective of case studies.
Cyber and information security - Basics review
- Basic concepts and terminology
- Access Control in physical world, networks, operating systems. Focusing on two tangential axes: (1) identification, authentication, and authorizations (in advance of the IAM world); (2) limiting communication access.
- Information security principles: the need for knowledge, the principle of minimum privilege, crediting shared resources.
- Briefing existing methods and tools for dealing withcyber threats categories. Emphasising that technology is not a solution by itself but rather a single tier in the set of "process - technology - human beings."
- MITRE ATT@CK MATRIX methodology.
- Anti-Malware World - Malware types and methods for dealing - Signature, Heuristics, Protocol Deviations, Behavioral / Contextual.
Introduction to Cyber Threats
- Firewall World - a quick overview of evolution from Packet Filter to Stateful Inspection and emphasizing the gaps between protection (or activity) on different OSI layers (Network Firewall vs). Application Firewall).
- IDPS World - Intrusion Detection and Intrusion Prevention reference.
- The difference between Host-IDPS (and Host-FW) and Network-IDPS (and Network-FW).