Master comprehensive cybersecurity concepts and practices through this extensive course covering critical aspects of internet information security. Explore the cyber world security landscape, starting with fundamental phenomena and progressing through CSIRT/CERT operations, basic security issues, and the intersection of real and cyber worlds. Learn about hacker attack strategies, international security standards, and hacktivism. Dive deep into system vulnerabilities, malicious software types, social engineering techniques, and password management. Develop practical skills in organizational security strategy development, policy creation, and incident handling procedures. Study advanced topics including cryptology's role in information security, malware analysis, computer forensics, and data leakage phenomena. Engage in interactive discussions, practical exercises, and assessments through midterm and final essays to solidify understanding of each topic.
Overview
Syllabus
- Course Profile
- Course Description
- Course Learning Outcomes
- Content Structure
- Lecturer
- Session A. CYBER 6: PHENOMENON OF INFORMATION SECURITY IN CYBER WORLD
- Learning Outcomes
- Learning Materials
- Discussion and Interaction
- Exercise Session A
- Session B. CSIRT / CERT: SUPERVISORY TEAM OF INTERNET SECURITY
- Learning Outcomes
- Learning Materials
- Discussion and Interaction
- Exercises
- Session C. BASIC ISSUES OF INTERNET SECURITY
- Learning Outcomes
- Learning Materials
- Discussion and Interaction
- Exercises
- Session D. THE RELATION BETWEEN THE REAL WORLD AND CYBER WORLD
- Learning Outcomes
- Learning Materials
- Discussion and Interaction
- Exercise
- Session E. THE STRATEGY AND THE WAY HACKER ATTACKS INTERNET SECURITY
- Learning Outcomes
- Learning Materials
- Discussion and Interaction
- Exercise
- Session F - TEN SECURITY ASPECTS IN INTERNATIONAL STANDARDS
- Learning Outcomes
- Learning Materials
- Discussion and Interaction
- Exercise
- Session G - HACTIVISM PHENOMENON AND VARIOUS INS AND OUTS OF ITS PROBLEM
- Learning Outcomes
- Learning Materials
- Discussion and Interaction
- Exercise
- Session H - FOUR DOMAINS OF SYSTEM VULNERABILITIES
- Learning Outcome
- Learning Materials
- Discussion and Interaction
- Exercises
- Session I - Various Types of Malicious Software
- Learning Outcome
- Learning Materials
- Discussion and Interaction
- Exercise
- Midterm exam
- Essay
- Session J - SOCIAL TECHNIQUE ENGINEERING
- Learning Outcome
- Learning Materials
- Discussion and Interaction
- Exercise
- Session K - Password Management
- Learning Outcome
- Learning Materials
- Discussion and Interaction
- Exercise
- Session L - STRATEGY OF AN ORGANIZATION TO SECURE ITSELF
- Learning Outcome
- Learning Materials
- Discussion and Interaction
- Exercise
- Session M - Setting Up the Policy of Information and Internet Security
- Learning Outcome
- Learning Materials
- Discussion and Interaction
- Exercise
- Session N - PROCEDURE OF CYBERWORLD'S SECURITY INCIDENT HANDLING
- Learning Outcome
- Learning Materials
- Discussion and Interaction
- Exercise
- Session O - THE ROLE OF CRYPTOLOGY IN INFORMATION SECURITY
- Learning Outcome
- Learning Materials
- Discussion and Interaction
- Exercise
- Session P - MALWARE ANALYSIS TECHNIQUE
- Learning Outcome
- Learning Materials
- Discussion and Interaction
- Exercise
- Session Q - COMPUTER FORENSIC TECHNIQUE
- Learning Outcome
- Learning Materials
- Discussion and Interaction
- Exercise
- Session R - PHENOMENA OF DATA and CONFIDENTIAL INFORMATION LEAKAGE
- Learning Outcome
- Learning Materials
- Discussion and Interaction
- Exercise
- Final Exam
- Essay
Taught by
Eko Indrajit