Digital literacy is essential in today's world. Learn about the traces we leave online, how to improve your digital privacy, and potential threats.
This course introduces the concept of Cyber Security, explains various types of threats available resulting in cyber attacks, and develops your understanding of the defence mechanisms available.
Lesson Structure
There are 11 lessons in this course:
-
Introduction to Cyber Security and cyber attacks/defences
-
Importance of cybersecurity
-
Threats - passive attacks, active attacks
-
Common types of attacks - injection, phishing, denial of Service, malware, spoofing, man in the middle, network attacks
-
Layered approach to defense
-
Physical security
-
Software and Operating System Security, Network security
-
Vulnerability Assessment
-
Assessing vulnerabilities
-
Security posture
-
Performing vulnerability assessment - 5 steps
-
Identifying and classifying assets
-
Threats and risk assessment
-
Baseline reporting
-
Penetration testing - techniques, penetration testing versus vulnerability assessment
-
Securing the facilities and networks
-
Securing a data centre
-
Securing the network
-
Hardware level
-
Software PC, Device level
-
Securing your online digital footprint
-
Digital footprints
-
Social media
-
Web browsing
-
Devices used
-
Managing digital footprint
-
Protecting user reputation
-
Sharing personal information
-
Preserving freedoms
-
Preventing financial; losses
-
Privacy risks
-
Developing better online habits
-
Investigating default settings
-
Using privacy enhancing tools
-
Internet Security and Digital Certificates
-
Digital certificates
-
Digital signatures
-
Digital rights management and Information rights management
-
Electronic books and magazines
-
Generating a digital certificate
-
Exchanging and verifying a digital certificate
-
Web browsing
-
TLS and SSL
-
Security issues
-
Secure web browsing using https
-
Wireless Network Vulnerabilities, Attacks and Security
-
Types of wireless data networks
-
NFC and Bluetooth network attacks
-
Wireless LAN attacks
-
Network blurred edges
-
Wireless data replay attacks
-
Wireless DOS attacks
-
Rogue access point
-
Attacks on home LANs - war driving, war chalking
-
Wireless security vulnerability and solutions
-
IEEE wireless security vulnerabilities
-
Firewalls, IDS and IPS
-
Types of firewall protection
-
Packet filtering firewalls
-
Application/proxy firewalls
-
Hybrid firewalls
-
Firewall limitations
-
Formats and firewalls
-
UTM appliance
-
Intrusion detection systems
-
Network intrusion systems
-
Host based intrusion detection systems]
-
Intrusion prevention systems
-
Common detection methodologies
-
Anomaly based IDPS
-
Signature based IDPS
-
Cryptography
-
Definition, terminology and characteristics
-
Common cipher attacks
-
Ciphertext only attacks
-
Known plaintext attack
-
Dictionary attack
-
Bruit force attack
-
Power analysis attack
-
Fault analysis attack
-
Cryptographical algorithms
-
Symmetric encryption
-
MAC function
-
Asymmetric encryption
-
Slipcovering keys
-
Hash algorithms
-
Access Control and Authentication
-
What is access control
-
Definition, terminology
-
Access control models - RBAC, RAC, HBAC
-
Implementation - group policies, ACL, DACL, SACL
-
Authentication and authorisation
-
Securing and protecting passwords
-
Multi factor authentication
-
Cyber attack Disaster Recovery strategies
-
Five stage response
-
Recovery planning
-
Backup procedures
-
cloud storage
-
Monitoring and logging events
-
Containment of attack
-
Assessing damage
-
Recovery procedures - system images SEO, restore data corruption
-
Authorities tracking attackers
-
Data ands security policies
-
Ongoing Security Management
-
Managing security events - events monitoring
-
Centralised versus Distributed data collection
-
Being organised
-
Understanding the workplace
-
Security and decision making
-
Division of responsibilities
-
Time management
-
Networking
-
Attitude
-
Products and services
-
The law
Each lesson culminates in an assignment which is submitted to the school, marked by the school's tutors and returned to you with any relevant suggestions, comments, and if necessary, extra reading.
Aims
-
Define cyber security.
-
Explain the goals and importance of cyber security.
-
Understand important terminology relating to cyber security and list some attacks and defence mechanisms.
-
Explain how to perform a vulnerability assessment.
-
Understand the tools and techniques available.
-
Compare and contrast vulnerability scanning and penetration testing.
-
Explain how to secure physical data storage, data centre security, data warehouse and networks.
-
Understand the effects of leaving a wide online digital footprint.
-
Understand the options available for users to manage their online digital footprint.
-
Understand what a firewall, an Intrusion Detection System (IDS), and an Intrusion Prevention System (IPS) represent in the world of cyber security.
-
Explain the importance and functions of firewalls, IDS and IPS systems, and the benefits and protection they offer in protecting computers as well as computer networks.
-
Understand the concept of cryptography and the importance of encrypting and decrypting data.
-
Explain components of cryptographic protocols and common standards used in encryption and decryption.
-
Understand the importance of digital signatures and digital certificates in securing web traffic.
-
List the various types of wireless data communications networks and understand types of vulnerabilities and attacks against each of them.
-
Explain wireless network security standards available to protect wireless networks.
-
Define Access Control and become familiar with its terminology.
-
Understand the importance of implementing access control models.
-
Define authentication and understand the importance of creating and securing strong passwords and implementing double-factor or multi-factor authentication.
-
Explain how to recover from a cyber-attack and best procedures for setting up redundancy and quick recovery methods prior and after attack has occurred and minimizing impacts to systems and networks involved.
What You Will Do
-
Research layered defence concepts and in particular the idea of defence in depth.
-
Research and explain your choice of cyber-attack.
-
Report on good vulnerability scanners currently available in the market.
-
Research 4 privacy enhancing tools online, such as VPNs, password managers, and other encryption software.
-
Research the latest firewall solutions in the market.
-
Research the latest NIDS and HIDS solutions in the market.
Learn to Assess, then Minimise Vulnerabilities
Cybersecurity starts with understanding potential vulnerabilities, then assessing vulnerabilitiy in a particular situation, then finally taking actions to eliminate or prevent those vulnerabilities.
When organizations are trying to secure their assets, knowledge equates to power. As businesses constantly increase their dependence on information technology -- including placing/migrating data to the cloud, IoT (internet of things) devices, mobile devices, social platforms, and others – their exposure to cyber risks continues to rise significantly. However, just like an annual health check, a vulnerability management program can help organizations identify weaknesses in their cyber systems before these turn into problems.
Security Posture
This is the technical term for an overall security plan. It is everything from initial planning to implementation. An organisation's security posture usually includes:
- Technical policies
- Non-technical policies
- Procedures
- Controls
Performing a Vulnerability Assessment
The majority of all cyberattacks are designed to exploit known weaknesses and vulnerabilities. And with thousands and thousands of new vulnerabilities discovered every year, it is important for organizations to exercise constant vigilance to evaluate IT security posture and discover weaknesses, as well as to respond appropriately. A robust vulnerability assessment program is the key to responding to this more dangerous threat environment. This is because a vulnerability assessment is a formal process that identifies and quantifies the security weaknesses including the application software, hardware and networks.
A vulnerability assessment for an organization should produce a clear report containing a list of the components that require attention in the organization’s environment – and where on the list of priorities these components lie. Systems administrators in organizations’ IT departments are constantly updating, patching and applying software patches to their critical systems, however managing software updates and patches is quite a challenging task for IT departments because patches are known to occasionally cause disruption to other software and in some instances, systems requiring patches cannot be taken offline. For this reason, a good vulnerability assessment will provide the organization with a list of prioritized vulnerabilities sorted by system or software (or others) and can be used by the organization’s IT department and used as a to-do list to improve the organization’s security posture.
It is important for any organization, even if it is not a high priority target, to devise a plan of defence against today’s advanced cyberattacks whereby attackers program the attacks to actively search for vulnerabilities in systems and networks and automatically start their attack process as soon as these are found. It is also important to know that scanning for vulnerability assessments is one thing, and analysing/prioritizing vulnerabilities by including them in an overall “risk management program” is another.
A typical vulnerability assessment often involves the 5 steps below:
- Identifying which assets need to be protected;
- Evaluating threats against those assets;
- Undertaking vulnerability appraisal to understand how susceptible the current protection method is;
- Assessing risks (using the likelihood and impact of any potential weakness exploitation);
- Mitigating risks.
ENROL or Use our FREE Course Advice Service to Connect with a Tutor