Advanced cyber security for institute teachers

seguretat-professorat

The aim of this course is to provide a global view of the different aspects that cyber security includes in order to know how to identify them and learn how to use the most appropriate tools in each of them:

  • Ethical hacking : Computer networks are susceptible to computer attacks. Regular network audits provide very important information about the level of security of the various assets you have. We will see how security audits should be carried out and learn about the different tools that can help us carry them out.
  • Prevention and response: Bringing the student closer to techniques of detection, prevention and response to computer attacks. Currently, systems generate a large amount of data, and it is necessary to create environments that allow information to be centralized to optimize analysis. Aspects related to the centralization and management of security events will be worked on in order to proactively detect possible attacks.
  • Computer forensics: The detection, preservation and investigation of electronic tests or evidence that can be used to defend the company against possible criminal liability is known as “computer forensics”. We will try to understand the legal and technical aspects necessary to carry out a forensic analysis correctly and we will learn to obtain evidence in different work environments through a correct selection of tools.
  • Security in application development: More than 80% of attacks on computer systems are made by exploiting vulnerabilities in web applications. It is therefore essential that developers have security knowledge and that this knowledge is integrated into their day-to-day work.

The course includes several guided practical exercises that help to consolidate the concepts presented during the sessions.

Prior knowledge of TCP/IP networks as well as the use of Windows and Linux systems at an advanced user level is required.

The course lasts 32 hours, the teaching format will be agreed beforehand. 

Advanced cyber security for institute teachers

Contents

  1. Ethical hacking
    1. Introduction and legal aspects
    2. Information gathering
    3. Vulnerability scanning and identification
    4. Manual analysis
    5. Automated analysis
    6. Exploitation
  2. Cyberattacks: Prevention and response
    1. Infrastructure security
    2. Monitoring
    3. Response (Incident Management)
  3. Forensic computing
    1. Introduction
    2. Obtaining evidence
    3. Analysis techniques and tools
  4. Security in application development
    1. OWASP Top 10

 

Benefits for the participant

As a result of the training, the participant will be able to:

  • Become aware of the impact, risks and dangers of the internet in the organization.
  • Recognize the problems arising from computer vulnerabilities.
  • Recognize potential incidents and use appropriate procedures to report security issues.
  • Develop the ability to audit and detect risks arising from IT threats in all types of organizations and contexts.
  • Develop the ability to understand and be able to perform forensic analysis of systems, devices and networks.
  • Know the different types and methodologies of forensic analysis for effective practice with optimal results.
  • Know and know how to apply the main audit methodologies in IT security to determine security levels and keep systems protected at all times.
  • Know the main vulnerabilities in IT security, their exploitation and post-exploitation.
  • Detect and monitor different types of threats against servers and know the best practices in the field.
  • Develop the ability to understand and be able to monitor systems and networks to effectively detect different types of IT threats.
  • Know the main vulnerabilities that can⁣ â£ have an application â£ and know how to apply the techniques to solve them.

To whom it is addressed

Mainly for high school teachers.