create new tag
view all tags

Cyber-Security Lab

Academic Year 2019-2020

  • Teacher Prof. Claudio Cilli
  • Office: Via Salaria, 113 - 3° Piano - Stanza 313
  • Reception hours: See below
  • Classroom: Seminars Room or Colossus Laboratory

Reception hours

  • Personal reception:
    • at the lesson end or during breaks
    • at the reception hours published on the Department web site
    • by appointment, after an e-mail request
  • Alternate reception:
    • e-mail


  • Due to coronavirus emergency, lessons will take place via conference call

Seminar Friday April 10th, 2020

Title "Attacchi multipli contemporanei: lezioni apprese da casi reali" ("Multiple simultaneous attacks: lessons learned from real cases")

Connection parameters:

All Fridays 14:00 | 2 ore | (UTC+01:00) Amsterdam, Berlino, Berna, Roma, Stoccolma, ViennaRicorre ogni Venerdì con validità 13/3/2020 da 14:00 a 16:00, (UTC+01:00) Amsterdam, Berlino, Berna, Roma, Stoccolma, Vienna

Accedi tramite sistema video
Chiama 843960387@unitelmasapienza.webex.com
È possibile anche chiamare e immettere il numero della riunione.


  • Specialized seminars are offered every month

  • Lessons:
    • Friday 14-16
    • room G0 (Gzero) - Ground floor - building G - Viale Regina Elena, 295

    • specialized seminars (date, time and locations to be announced)

  • Available thesis:
    • Progettazione di un circuito di pagamento decentralizzato per il trasferimento di valuta. Il lavoro si propone di descrivere le caratteristiche proprie di un circuito di pagamento finalizzato alla gestione di un portafoglio personale dedicato al trasferimento di valuta (e.g. scambio di denaro contante, scambio di valute digitali, addebito/accredito verso altri circuiti) attraverso l’utilizzo della tecnologia blockchain. Il progetto è volto alla realizzazione di un prototipo funzionante.


In order to better understand course topics, students are encouraged to attend courses related to the subjects.

AFC Objectives

This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDOS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive class they will have hands on understanding and experience in Ethical Hacking.

Course outline

  • 01. Introduction to Ethical Hacking
  • 02. Footprinting and Reconnaissance
  • 03. Scanning Networks
  • 04. Enumeration
  • 05. System Hacking
  • 06. Malware Threats
  • 07. Sniffing
  • 08. Social Engineering
  • 09. Denial-of-Service
  • 10. Session Hijacking
  • 11. Hacking Web Servers
  • 12. Hacking Web Applications
  • 13. SQL Injection
  • 14. Hacking Wireless Networks
  • 15. Hacking Mobile Platforms
  • 16. Evading IDS, Firewalls, and Honeypots
  • 17. Cloud Computing
  • 18. Cryptography

Additional seminars by international specialists and speakers

Additional information and Italian version are here: * Laboratorio di Cyber-Security*

Reference material

  • Copy of slides used during the lessons
  • Handhouts authored by the teacher

Additional suggested books

  • Jim Stickley, The Truth about Identity Theft, Pearson Education, Inc., 2009
  • Andy Oram & John Viega, Beautiful Security, O’Reilly, 2009
  • Tim Mather, Subra Kumasarawamy, Shahed Latif, Cloud Security & Privacy, 2009
  • Nitesh Dbanjani, Brett Hardin & Bill Rios, Hacking: The Next Generation, O’Reilly, 2009


  • Select an IT security-related topic and produce a research based on the chosen topic, ending with a report and a presentation

Exam registration

  • The verbalization resposnsible - prof. Anna Labella - will open an examination appeal. Students have to sign-in after delivering the elaborate. Once evaluated by the teacher, the grade will be communicatyed to prof. Labella, who shall record the exam result.

Teaching materials

Edit | Attach | Watch | Print version | History: r84 < r83 < r82 < r81 < r80 | Backlinks | Raw View | Raw edit | More topic actions
Topic revision: r84 - 2020-03-27 - ClaudioCilli

Questo sito usa cookies, usandolo ne accettate la presenza. (CookiePolicy)
Torna al Dipartimento di Informatica
This site is powered by the TWiki collaboration platform Powered by PerlCopyright © 2008-2020 by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding TWiki? Send feedback