ABOUT THE COURSE: As we interact with various industry and their needs for cyber security, they often complain that the courses at academic institutions provide students with the fundamentals of cyber security, but the students are often not familiar with the practical issues associated with running a cyber security operation in a real organization. Also, while a lot of the theses at master’s level or dissertation at the PhD level are based on theoretical exploration of techniques, algorithms, or mathematical modeling of cyber security problems, there is a dearth of dissertation and thesis on the practical aspects of running cyber security operations. Having worked very closely with industry, we appreciate such concerns because there are very interesting problems to be solved for practical cyber security which also requires a great deal of fundamental thinking, reasoning, and concerns about human cognition of the inputs the operators and leaders receive from cyber security tools, dashboards, policy formulations but then in the crowd of details, fundamentals are lost, reasoning is replaced by ad hoc decisions. To change that, we need workforce, as well as academics who can abstract out the fundamentals from such practical problems are develop various practically oriented methods, methodologies, policy frameworks, and decision processes which would simplify cyber operations. This course is meant to be a first step towards that line of thinking, modeling, and methodology development.INTENDED AUDIENCE: 3rd,4th year students of Computer Science and post graduate students of Computer Science, Cyber Security and Working ProfessionalsPREREQUISITES: A previous course on fundamentals of Cyber Security is desirable, if not, courses in Operating System, Networking, Software Engineering, and Programming will be desirable
Practical Cyber Security for Cyber Security Practitioners
Indian Institute of Technology Kanpur and NPTEL via Swayam
-
119
-
- Write review
Overview
Syllabus
Week 1:Introduction:Cyber Security Posture, Maturity, and Continuous Improvement StrategiesWeek 2:Knowing your attacker: MITRE ATT&CK FrameworkWeek 3:Knowing your attacker: MITRE ATT&CK FrameworkWeek 4:Cyber Kill Chains: Lockheed Martin Cyber Kill Chain and Unified Kill ChainWeek 5:Defending Yourself: MITRE DEF3ND FrameworkWeek 6:Securing your Configurations: STIG BenchmarkingWeek 7:Sharing Threat Intelligence: STIX and TAXII 2.0Week 8:Cyber Security Risk ManagementWeek 9:Cyber Resilience AssessmentWeek 10:Cyber Security Policy FormulationWeek 11:Cyber Security Policy FormulationWeek 12:Cyber Crisis Management Plan and Cyber Incident Management Plan
Taught by
Prof. Sandeep K. Shukla