A Primer on Cybersecurity
Training Provider: SINGAPORE UNIVERSITY OF TECHNOLOGY AND DESIGN
Course Reference: TGS-2021010347
S$540
Original: S$1,800
Save S$1,260
About This Course
1.fundamental concepts of cybersecurity such as Confidentiality, Availability, Integrity;
2.fundamental cryptographic primitives and their applications;
3.principles behind secure communication protocols;
4.principle of secure software construction;
5.basic web vulnerability assessments;
6.basic operatomg suste, security;
7.cybersecurity issues pertaining Cybder-Physical Systems
What You'll Learn
Day 1:
Brief introduction to the security concepts
Integrity and Confidentiality in terms of information flow
Availability in distributed systems, concurrency challenges
Access control mechanisms
Threat assessment
Symmetric cryptography (from Caesar Cipher to AES)
Asymmetric cryptography (Diffie-Hellman Key Exchange, RSA, Digital signatures)
Authentication Challenges and TLS
Design principles
Common design, implementation and operation level vulnerabilities
Owasp Top 10 (SQL-injections and countermeasures)
Secure software development life-cycle
Day 2:
Refresher OS (memory layout, calling conventions, user vs kernel mode)
Buffer overflow attacks, return-to-libc
Use of compromised machines (spam, botnet, data stealing)
Attack vectors: phishing, social engineering, spearphishing
Malware (virus, worm, rootkits)
Threats by attackers with physical access
Trusted computing
Best practices/mitigation
Networking Basics (Ip (Public/Private), Arp, Nat)
Spoofing, Eavesdropping, Denial of Service
Securing Network Architectures
Wireless (802.11, Gps)
Cloud: Basic definition, service models
- Deployment models
loT: Applications, Devices, Network Architectures
Industrial Control Systems: Overview of architectures, devices and protocols, threats and countermeasures
Brief introduction to the security concepts
Integrity and Confidentiality in terms of information flow
Availability in distributed systems, concurrency challenges
Access control mechanisms
Threat assessment
Symmetric cryptography (from Caesar Cipher to AES)
Asymmetric cryptography (Diffie-Hellman Key Exchange, RSA, Digital signatures)
Authentication Challenges and TLS
Design principles
Common design, implementation and operation level vulnerabilities
Owasp Top 10 (SQL-injections and countermeasures)
Secure software development life-cycle
Day 2:
Refresher OS (memory layout, calling conventions, user vs kernel mode)
Buffer overflow attacks, return-to-libc
Use of compromised machines (spam, botnet, data stealing)
Attack vectors: phishing, social engineering, spearphishing
Malware (virus, worm, rootkits)
Threats by attackers with physical access
Trusted computing
Best practices/mitigation
Networking Basics (Ip (Public/Private), Arp, Nat)
Spoofing, Eavesdropping, Denial of Service
Securing Network Architectures
Wireless (802.11, Gps)
Cloud: Basic definition, service models
- Deployment models
loT: Applications, Devices, Network Architectures
Industrial Control Systems: Overview of architectures, devices and protocols, threats and countermeasures
Entry Requirements
Basic math and basic knowledge of programming languages
Course Details
Back to All Courses
Note: To apply for this course, visit the SkillsFuture website or contact the training provider directly.
More Courses from SINGAPORE UNIVERSITY OF TECHNOLOGY AND DESIGN
Transform physical spaces by thoughtfully integrating digital experiences with the real world. This ...
This is an introductory course to the internals of major internet applications and software, includi...
Operations Security is essential part of cyber defence. Learners will be able to describe the techni...