Companies and their IT systems are affected by advanced intrusions, various ransomware attacks and or thefts of both sensitive and secret information. In case of being compromised companies need to understand their weak points, ways of intrusion and attackers attributes. The course focuses on developing the student’s skills to investigate and analyze complex cyber attacks (Cyber Kill Chain) and to track the threat actor, discover exploited vulnerabilities so that companies can restore data and system integrity.Digital forensic is the process of detecting and investigating hacking attacks via properly extracted and analyzed evidence and artifacts to report the crime and prevent similar attacks in the future. The crime with computers and digital technologies in today’s cyber world is on the rise. Digital forensic techniques are being used by law enforcement agencies, police, government, and corporate entities around the world. The tools and techniques covered in the course will prepare the attendees to conduct digital forensic investigations using ground-breaking technologies.
In a daily routine every company produces a large amount of data security related and non-security related. Within this course you will learn how to utilize that data for cybersecurity purposes, which tools you should use to extract information out of raw data. It covers topics such as how to acquire (e.g., through SIEM) and prepare security data, from collection and storage to management and analysis as well as visualization and presentation.The course is divided into three modules and will start with an introduction to Data-Driven Security and building the Analytics Toolbox Hello, world. We will the continue with Data Collection and Processing, Network Data Sources and Machine Learning Basics. By the end of the course, you will learn more about security aspects such as Security Data Analysis, Designing Security Dashboards, Visualizing Security Data and Data Collection and Processing.
This course is a guide to the cybersecurity issues arising throughout the entire development process. We consider the development from the security perspective from the beginning stage until the final release and beyond. No matter whether you are a developer, engineer, or a top-level manager, this course will benefit you. You will learn some useful hands-on approaches for trade-off analysis, requirements prioritization methods, risk assessment approaches, and other security aspects at all stages of development.
The course is divided into four modules. Firstly, you will learn the core principles of machine learning. The second module covers security problems in Machine Learning (ML) systems, e.g., showing various types of attacks on ML systems in an adversarial ML. In the third module, available methods, tools, and other safeguards that could be used against the different types of attacks are covered.By the end of this course, you will be able to understand:• Machine Learning basics by understanding the domain, prior knowledge and goals,• Data integration, selection, cleaning and pre-processing, learning models and learning types.• Threat modeling in Machine Learning• Security tools for Machine Learning• Practical tools - Applied Machine Learning. You will also have obtained basic knowledge about security-enhancing approaches, how to use ML to detect and counteract cyber-attacks, and how to use these approaches to protect against various risks in ML systems.
This course covers the malware analysis methodology that includes static and dynamic analysis, as well as disassembling, deobfuscation, decryption, and debugging techniques. You will learn to analyze various types of threats such as phishing, exploits, malicious implants in office documents, malware used in supply-chain attacks, cyberespionage and ransomware campaigns, as well as cyberweapons created by the nation-state groups. The course content and, specifically practical assignments, are created based on analysis of the real-world cyberattacks and continuously updated taking into account the modern attacking tactics and techniques. Malware created for Windows and Android platforms (IA 32/Intel® 64, ARM architectures are in the focus. In addition, modern malware analysis and detection approaches that use Machine Learning models are discussed in the course.The course will be interesting for security professionals who want to deepen their knowledge in reverse engineering and malware analysis and for students that just started studying cybersecurity. Throughout the course, you will be supplied with numerous recorded videos and live Q&A sessions to dive into the details.
This course covers areas of legal and ethical implications of ethical hacking. It also introduces detection and exploitation of vulnerabilities in IT infrastructure, including different reconnaissance techniques. The course provides in-depth understanding of the penetration testing phases, various attack vectors, and preventative countermeasures. The course encompasses that the student should learn to understand and discover weaknesses and vulnerabilities in information systems, perform the attacks, check the strength of existing security controls, etc.
This course shows how fundamental testing practices are applied in the context of secure software development. You will learn to integrate automated software testing with different approaches to verify software security, leveraging theories from continuous quality assurance in software development, as well as security best practices. The course is adapted to give a solid introduction to non-testing experts with interest in software security, and addresses how professionals (developers, managers, decision-makers) can incorporate security into the quality assurance process of their products/services.
This course provides an introduction into network security and covers core security concepts such as, e.g., firewalls, authentication, certificate management, encryption, "stateful packet inspection", VPN and others. During the course you are provided with slide and video materials as well as a set of practical assignments and thus gain both theoretical and practical knowledge and skills needed for the installation, troubleshooting, and monitoring of network devices to maintain the integrity, confidentiality, and availability of data and devices.
This course aims to answer questions surrounding security measures or how to evaluate the current cybersecurity posture. The course will provide guidelines to assist organizations in the development, selection, and identification of the data to be captured and show how this information can be used to compute a cybersecurity indicator of risk. You will be able to generate a cybersecurity indicator of risk with respect to a specific organization. The purpose of the cybersecurity indicator is to allow for the evaluation of the level of cybersecurity competency at a particular point in time of an organization and, when this process is repeated at other points in time, it allows the status of an organization’s cybersecurity programs progress over time to be determined.This course is intended to help organizations that implement or operate a portion of the global infrastructure of information and communication technologies to evaluate their own cybersecurity capabilities and calculate their cybersecurity indicator of risk. After the course, you will be able to facilitate the decision-making process within organizations on improving cybersecurity and lowering cybersecurity risks. Furthermore, these guidelines provide an indication of where organizations could/should invest resources to improve their cybersecurity.