The course "Cybersecurity Fundamentals" provides a robust foundation in cybersecurity essentials, preparing you to recognize and manage threats in today's digital landscape. Across four comprehensive modules, you'll gain hands-on experience with malware identification, network traffic analysis, internet addressing, and IoT security protocols. In Module 1, explore the relationship between faults, vulnerabilities, and exploits, and learn essential malware identification techniques. Module 2 introduces NetFlow analysis with tools like SiLK and Wireshark, equipping you to collect and interpret network data. Module 3 deepens your understanding of IPv4 and IPv6, BGP routing, and host lookup tools, while Module 4 addresses IoT cybersecurity, where you’ll build a secure IoT framework using Docker and Node-Red.
This course stands out by combining practical exercises with foundational knowledge, ensuring you’re ready to apply what you learn to real-world situations. Whether you’re a beginner or expanding your cybersecurity expertise, completing this course will enhance your ability to protect networks, manage internet space, and secure IoT devices—skills in high demand across the IT sector.
Overview
Syllabus
- Course Introduction
- This course covers the identification and analysis of various malware types, vulnerabilities, and exploitation techniques, including the evaluation of antivirus (AV) solutions. Students will utilize NetFlow and the SiLK toolkit to monitor and analyze network traffic for security insights. Additionally, the course includes understanding addressing, BGP lookup, and the security considerations associated with Internet of Things (IoT) devices.
- Malware, Vulnerabilities, Exploitation and AV
- In this module, we will explore the intricacies of malware, vulnerabilities, and exploits. Students will learn to differentiate between faults, flaws, vulnerabilities, and exploits, utilize major malware catalogs, and understand the significance of signatures and polymorphism in malware identification. The course also covers key malware types and foundational exploitation techniques, including buffer overflows and SQL injections.
- NetFlow and The SiLK Toolkit
- This module introduces the fundamental concepts of NetFlow, covering its major components, processes, and analysis principles. Students will learn how NetFlow is derived from network traffic, differentiate it from session data, and utilize tools like SiLK or Wireshark to collect and analyze router and PC traffic effectively.
- Addressing, BGP and Lookup
- This module explores the fundamentals of Internet space management, including the purchasing process, and the differences between IPv4 and IPv6 addressing. It delves into the structure of CIDR blocks, autonomous systems, and BGP routing. You'll also learn to use tools like WHOIS, looking glasses, and RIBS to gather host information.
- Internet of Things (IoT)
- This module explores the cybersecurity landscape of the Internet of Things (IoT), delving into NIST's trust concerns, IoT protocols, and the associated risks. Participants will understand privacy concerns, and risk mitigation strategies, and will gain hands-on experience in building an IoT framework and creating custom Node-Red flows using Docker containers.
Taught by
Jason Crossland