Tags:
create new tag
view all tags

Cyber-Security Lab

Academic Year 2021-2022

  • Teacher Prof. Claudio Cilli
  • Office: Via Salaria, 113 - 3° Piano - Stanza 313
  • Reception hours: See below
  • Classroom: Remote via WebEx

Reception hours

  • Personal reception:
    • at the lesson end or during breaks
    • at the reception hours published on the Department web site
    • by appointment, after an e-mail request
  • Alternate reception:
    • e-mail

Advices

Course is finished. Some seminars are still programmed. Information on this site

Check links here for cybersecurity webinars

Lessons Connection Parameters

All Tuesdays 15:00-18:00

Information

  • Specialized seminars are offered every month

  • Lessons:
    • Tuesdays 15-18
    • Remote call via WebEx until further notice

    • specialized seminars (date, time and locations to be announced)

  • Available thesis:
    • Experimental Thesis (requires developing a prototype, 6-8 months duration, it maight grant the maximum number of points available.
      1. Fake News Problem: Use AI algorithms and crawling tecniques to study the credibility of an author of a digital news
      2. Fake News Problem: Use AI algorithm to define an OCR to study the dimensions of the characters in a digital news
    • CompilativeThesis (it doesn't require to develop a prototype, 6 months, it doesn't give the maximum number of points available.
      1. Use of quantum crypthography to trasmit data in 5g Architecture.

Propedeuticity

In order to better understand course topics, students are encouraged to attend courses related to the subjects.

AFC Objectives

This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDOS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive class they will have hands on understanding and experience in Ethical Hacking.

Course outline

  • 01. Introduction to Ethical Hacking
  • 02. Footprinting and Reconnaissance
  • 03. Scanning Networks
  • 04. Enumeration
  • 05. System Hacking
  • 06. Malware Threats
  • 07. Sniffing
  • 08. Social Engineering
  • 09. Denial-of-Service
  • 10. Session Hijacking
  • 11. Hacking Web Servers
  • 12. Hacking Web Applications
  • 13. SQL Injection
  • 14. Hacking Wireless Networks
  • 15. Hacking Mobile Platforms
  • 16. Evading IDS, Firewalls, and Honeypots
  • 17. Cloud Computing
  • 18. Cryptography

Additional seminars by international specialists and speakers

Additional information and Italian version are here: * Laboratorio di Cyber-Security*

Reference material

  • Copy of slides used during the lessons
  • Handhouts authored by the teacher

Additional suggested books

  • Jim Stickley, The Truth about Identity Theft, Pearson Education, Inc., 2009
  • Andy Oram & John Viega, Beautiful Security, O’Reilly, 2009
  • Tim Mather, Subra Kumasarawamy, Shahed Latif, Cloud Security & Privacy, 2009
  • Nitesh Dbanjani, Brett Hardin & Bill Rios, Hacking: The Next Generation, O’Reilly, 2009

Exams

  • Select an IT security-related topic and produce a research based on the chosen topic, ending with a report and a presentation

Exam registration

  • The verbalization responsible - prof. Alessandro Mei - will open an examination appeal. Students have to sign-in after delivering the elaborate. Once evaluated by the teacher, the grade will be communicated to prof. Mei, who shall record the exam result.

Teaching materials

Topic attachments
I AttachmentSorted ascending History Action Size Date Who Comment
Quicktime moviemp4 889509.mp4 r1 manage 34416.3 K 2021-12-07 - 11:49 ClaudioCilli  
Quicktime moviemp4 907655.mp4 r1 manage 33352.6 K 2021-12-07 - 11:46 ClaudioCilli  
Quicktime moviemp4 907704.mp4 r1 manage 28269.5 K 2021-12-07 - 11:46 ClaudioCilli  
Quicktime moviemp4 923990.mp4 r1 manage 43721.8 K 2021-12-07 - 11:46 ClaudioCilli  
Quicktime moviemp4 924054.mp4 r1 manage 39091.6 K 2021-12-07 - 11:47 ClaudioCilli  
Quicktime moviemp4 924856.mp4 r1 manage 26259.2 K 2021-12-07 - 11:47 ClaudioCilli  
Quicktime moviemp4 926592.mp4 r1 manage 37513.4 K 2021-12-07 - 11:47 ClaudioCilli  
Quicktime moviemp4 926594.mp4 r1 manage 32065.3 K 2021-12-07 - 11:47 ClaudioCilli  
Quicktime moviemp4 928930.mp4 r1 manage 34523.0 K 2021-12-07 - 11:49 ClaudioCilli  
Quicktime moviemp4 928932.mp4 r1 manage 41236.9 K 2021-12-07 - 11:47 ClaudioCilli  
Edit | Attach | Watch | Print version | History: r102 < r101 < r100 < r99 < r98 | Backlinks | Raw View | Raw edit | More topic actions
Topic revision: r102 - 2021-12-20 - ClaudioCilli






 
Questo sito usa cookies, usandolo ne accettate la presenza. (CookiePolicy)
Torna al Dipartimento di Informatica
This site is powered by the TWiki collaboration platform Powered by PerlCopyright © 2008-2022 by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding TWiki? Send feedback