Tags:
create new tag
view all tags

Cyber-Security Lab

Academic Year 2017-2018

  • Teacher Prof. Claudio Cilli
  • Office: Via Salaria, 113 - 3° Piano - Stanza 313
  • Reception hours: See below
  • Classroom: Seminars Room or Colossus Laboratory

Reception hours

  • Personal reception:
    • at the lesson end or during breaks
    • at the reception hours published on the Department web site
    • by appointment, after an e-mail request
  • Alternate reception:
    • e-mail

Information

  • Specialized seminars are offered every month

  • Next lessons:
    • To be defined

  • Available thesis:
    • Tesi 1: Descrizione di un sistema decentralizzato per la distribuzione diretta di strumenti finanziari. Il lavoro si propone di individuare le caratteristiche proprie di un mercato autonomo per il collocamento di strumenti finanziari semplici (e.g. titoli obbligazionari) attraverso l’utilizzo della tecnologia blockchain. Il progetto è volto alla realizzazione di un prototipo funzionante.
    • Tesi 2: Progettazione di un circuito di pagamento decentralizzato per il trasferimento di valuta. Il lavoro si propone di descrivere le caratteristiche proprie di un circuito di pagamento finalizzato alla gestione di un portafoglio personale dedicato al trasferimento di valuta (e.g. scambio di denaro contante, scambio di valute digitali, addebito/accredito verso altri circuiti) attraverso l’utilizzo della tecnologia blockchain. Il progetto è volto alla realizzazione di un prototipo funzionante.

Propedeuticity

In order to beete understand the course topics, mstudents are encouraged to attend courses related to the subjects.

AFC Objectives

This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive class they will have hands on understanding and experience in Ethical Hacking.

Course outline

  • 01. Introduction to Ethical Hacking
  • 02. Footprinting and Reconnaissance
  • 03. Scanning Networks
  • 04. Enumeration5. System Hacking
  • 06. Malware Threats
  • 07. Sniffing
  • 08. Social Engineering
  • 09. Denial-of-Service
  • 10. Session Hijacking
  • 11. Hacking Web Servers
  • 12. Hacking Web Applications
  • 13. SQL Injection
  • 14. Hacking Wireless Networks
  • 15. Hacking Mobile Platforms
  • 16. Evading IDS, Firewalls, and Honeypots
  • 17. Cloud Computing
  • 18. Cryptography

Additional seminars by international specialists and speakers

Additional information and Italian version are here: * Laboratorio di Cyber-Security*

Reference material

  • Copy of slides used during the lessons
  • Handhouts authored by the teacher

Additional suggested books

  • Jim Stickley, The Truth about Identity Theft, Pearson Education, Inc., 2009
  • Andy Oram & John Viega, Beautiful Security, O’Reilly, 2009
  • Tim Mather, Subra Kumasarawamy, Shahed Latif, Cloud Security & Privacy, 2009
  • Nitesh Dbanjani, Brett Hardin & Bill Rios, Hacking: The Next Generation, O’Reilly, 2009

Exams

  • Select an IT security-related topic and produce a research based on the chosen topic, ending with a report and a presentation

Exam registration

  • The verbalization resposnsible - prof. Anna Labella - will open an examination appeal. Students have to sign-in after delivering the elaborate. Once evaluated by the teacher, the grade will be communicatyed to prof. Labella, who shall record the exam result.

Teaching materials

Edit | Attach | Watch | Print version | History: r73 < r72 < r71 < r70 < r69 | Backlinks | Raw View | Raw edit | More topic actions
Topic revision: r73 - 2017-11-16 - ClaudioCilli






 
Questo sito usa cookies, usandolo ne accettate la presenza. (CookiePolicy)
This site is powered by the TWiki collaboration platform Powered by PerlCopyright © 2008-2017 by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding TWiki? Send feedback