This shows you the differences between two versions of the page.
cdci:lectures:01 [2024/03/07 23:58] mihai.chiroiu |
cdci:lectures:01 [2024/03/08 00:07] (current) mihai.chiroiu |
||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== Lecture01. ====== | + | ====== Lecture01. Cyberdefense introduction ====== |
- | + | ||
- | Lecture 01 – cyberdefense introduction | + | |
- | frameworks, cyber threats and threat actors | + | |
- | Lecture 02 – cyberdefense – end devices | + | |
- | Lecture 03 – cyberdefense – web security | + | |
- | Lecture 04 – cyberdefense – networks | + | |
- | Lecture 05 – cyberdefense – mobile devices | + | |
- | Lecture 06 – cyberdefense – mobile devices | + | |
- | + | ||
- | + | ||
- | Lecture 07 – (open) threat intelligence | + | |
- | Data gathering tools and approaches, data analysis techniques | + | |
- | Lecture 08 – threat intelligence | + | |
- | Online Tracking Techniques | + | |
- | Digital Fingerprinting | + | |
- | Lecture 09 – threat intelligence | + | |
- | (IoT) Search Engine Techniques | + | |
- | News Search | + | |
- | Document & Digital images Search | + | |
- | Lecture 10 – threat intelligence | + | |
- | Social Media Intelligence | + | |
- | Tracking Photos Downloaded from Facebook to Its Source Profile | + | |
- | Twitter Advanced Search Operators | + | |
- | LinkedIn Search | + | |
- | Lecture 11 – threat intelligence - TOR | + | |
- | the “Dark Web” | + | |
- | + | ||
- | Lecture 12 – threat intelligence | + | |
- | the nature of Advanced Persistent Threats (APTs), well-known state operations and threats, challenges for attribution/action, interaction between state actors and proxies. | + | |
+ | {{url>https://docs.google.com/presentation/d/12AiONvbxLy5CdkNTtXecxZidoulZS2Ut/preview 600px 500px}} |