Unveiling the Foundations of Cybersecurity Logistics

cy 2550 foundations of cybersecurity n.w
1 / 9
Embed
Share

Dive into the world of cybersecurity with Professor Christo Wilson in the course "CY.2550.Foundations.of.CybersecurityLogistics." Understand the importance of cybersecurity in today's digital landscape, explore software vulnerabilities, and equip yourself with essential security principles and tools. Get ready for hands-on projects and real-world experience to develop concrete skills in this critical field.

  • Cybersecurity
  • Professor Christo Wilson
  • Software Vulnerabilities
  • Security Principles
  • Hands-on Projects

Uploaded on | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. CY 2550 Foundations of Cybersecurity Logistics (the boring slides)

  2. Hello! Who am I? Professor Christo Wilson cbw@ccs.neu.edu ISEC 615 Office Hours: Thursdays 11-2pm or by appointment 2

  3. Why Take This Course? What do they all have in common? Victims of massive data breaches Every company is now a tech company, and every company is now vulnerable Target TJ Maxx Yahoo Ashley Madison Sony Pictures The Office of Personnel Management Equifax The Democratic National Convention 3

  4. Why Take This Course? Heartbleed What are these things? Software vulnerabilities that enable malicious exploits Software is so critical to our way of life that massive security vulnerabilities now achieve celebrity status Shellshock Meltdown Spectre 4

  5. Why Take This Course? Cybersecurity is now a fundamental aspect of life It affects every person It affects every company It affects every nation Adversaries are powerful and sophisticated Cybercrime is a multi-million dollar industry Nations are using the internet as a battleground Every computer scientist needs to understand cybersecurity Whether we like it or not, we are on the front lines Enormous opportunity to help people navigate a hostile internet 5

  6. Goals Fundamental understanding about cybersecurity Ability to think like an attacker and model threats Knowing essential security principles, practices, and tools Grappling with ethical, legal, and social issues Focus on software and tools Not hardware Minimal theory Project-centric, hands on experience Real projects that build concrete skills 6

  7. Books No textbook But, two required readings: Ghost in the Wires by Kevin Mitnick Countdown to Zero Day by Kim Zetter 7

  8. Projects This course is project-centric Designed to give you real experience Start early! Seriously, start early! 7 projects Due at 11:59:59pm on specified Friday Use turn-in scripts to submit your code, documentation, etc. Linux/command line basics GPG key generation and essential cryptography Password generation and cracking Social engineering (essay assignment) Mini-Capture the Flag, exploit development Forensics and incident response 8

  9. Ethics and the Law We will discuss sensitive topics in this class Brazen criminal activity Offensive hacking techniques The goal is to help you understand the capabilities and motivations of attackers Do not, under any circumstances, use these skills offensively Run exploits on Khoury College machines Use scanning or attack tools against public servers or websites Infiltrate your roommates computer and spy on them Etc. Failure to comply may result in expulsion and/or arrest

More Related Content