Cyber-Security Lab
Academic Year 2021-2022
- Teacher Prof. Claudio Cilli
- Office: Via Salaria, 113 - 3° Piano - Stanza 313
- Reception hours: See below
- Classroom: Remote via WebEx
Reception hours
- Personal reception:
- at the lesson end or during breaks
- at the reception hours published on the Department web site
- by appointment, after an e-mail request
- Alternate reception:
Advices
Course is finished. Some seminars are still programmed. Information on this site
Check links here for cybersecurity webinars
Lessons Connection Parameters
All Tuesdays 15:00-18:00
Information
- Specialized seminars are offered every month
- Available thesis:
- Experimental Thesis (requires developing a prototype, 6-8 months duration, it maight grant the maximum number of points available.
- Fake News Problem: Use AI algorithms and crawling tecniques to study the credibility of an author of a digital news
- Fake News Problem: Use AI algorithm to define an OCR to study the dimensions of the characters in a digital news
- CompilativeThesis (it doesn't require to develop a prototype, 6 months, it doesn't give the maximum number of points available.
- Use of quantum crypthography to trasmit data in 5g Architecture.
Propedeuticity
In order to better understand course topics, students are encouraged to attend courses related to the subjects.
AFC Objectives
This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDOS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive class they will have hands on understanding and experience in Ethical Hacking.
Course outline
- 01. Introduction to Ethical Hacking
- 02. Footprinting and Reconnaissance
- 03. Scanning Networks
- 04. Enumeration
- 05. System Hacking
- 06. Malware Threats
- 07. Sniffing
- 08. Social Engineering
- 09. Denial-of-Service
- 10. Session Hijacking
- 11. Hacking Web Servers
- 12. Hacking Web Applications
- 13. SQL Injection
- 14. Hacking Wireless Networks
- 15. Hacking Mobile Platforms
- 16. Evading IDS, Firewalls, and Honeypots
- 17. Cloud Computing
- 18. Cryptography
Additional seminars by international specialists and speakers
Additional information and Italian version are here: * Laboratorio di Cyber-Security
*
Reference material
- Copy of slides used during the lessons
- Handhouts authored by the teacher
Additional suggested books
- Jim Stickley, The Truth about Identity Theft, Pearson Education, Inc., 2009
- Andy Oram & John Viega, Beautiful Security, O’Reilly, 2009
- Tim Mather, Subra Kumasarawamy, Shahed Latif, Cloud Security & Privacy, 2009
- Nitesh Dbanjani, Brett Hardin & Bill Rios, Hacking: The Next Generation, O’Reilly, 2009
Exams
- Select an IT security-related topic and produce a research based on the chosen topic, ending with a report and a presentation
Exam registration
- The verbalization responsible - prof. Alessandro Mei - will open an examination appeal. Students have to sign-in after delivering the elaborate. Once evaluated by the teacher, the grade will be communicated to prof. Mei, who shall record the exam result.
Teaching materials