Study Plan
Key concepts: Risk, Threat, Vulnerability, Incident, Assets, Attack vectors, NIST Framework, Communication protocols, Python, Malware, APT.
Tools: Python, Anaconda, Spyder, Wireshark, Capesandbox, Microsoft Visual Studio, IE Inspector HTTP Analyzer, Burp Suite, Sysinternals.
1. Introduction to Cybersecurity
This unit introduces students to the world of cybersecurity, exploring key areas, aims and fundamental concepts.
- General concepts
- Global cybersecurity panorama
- Cybersecurity actors and domains
2. Communication Protocols
This unit gives students a comprehensive understanding of IT security in Internet communication. Learn how communication protocols work, how communication is established and maintained between different devices, and how each communication layer plays an important role in the process.
- Introduction to communication protocols
- Security at the physical and data-link layers
- Security at the transport layer
- Security at the application layer
3. Fundamental Concepts of Programming
This unit immerses students in the basics of programming using Python, a versatile programming language. Learn about the syntax, data structure, and basic functions of Python, which will help develop programming skills needed for cybersecurity.
- Introduction to Python
- Python variables
- Object types
- Control structures
- Functions
4. Introduction to Malware
This unit takes a detailed look at malware and its implications for IT security. Learn how malware is developed and distributed, from its inception to current threats.
- What is malware?
- Infection vectors
- Stages of infection
- Advanced Persistent Threats (APT)
- Example
Self-Assessment Tests
Students take four multiple-choice tests with 10 questions each.
Caso práctico
As a cybersecurity specialist, you will become part of a team responsible for protecting your company's infrastructure: ImmuneTech Solutions against continuous cyber-attacks. Your company recently deployed a system enabling you to automatically report phishing and suspicious emails to the security team. Now, one particular has caused a commotion in the company
Your bosses have asked you to prepare a detailed report including all the information you can find about the attached message in order to take the appropriate action and define the scope of the incident. To do this, you will have to:
- List five components or techniques of social engineering.
- Extract the macro from the Office document.
- Share the conclusions after carrying out the malware analysis.
- Identify the location of the .py file by analyzing the Office document macro.