This is an old revision of the document!


Lecture01.

Lecture02.

Lecture03.

Lecture04.

Lecture05.

Lecture06.

Lecture07.

Lecture08.

Lecture09.

Lecture10.

Lecture11.

Lecture12.

Lecture 01 – cyberdefense introduction frameworks, cyber threats and threat actors Lecture 02 – cyberdefense – end devices Lecture 03 – cyberdefense – web security Lecture 04 – cyberdefense – networks Lecture 05 – cyberdefense – mobile devices Lecture 06 – cyberdefense – mobile devices

Lecture 07 – (open) threat intelligence Data gathering tools and approaches, data analysis techniques Lecture 08 – threat intelligence Online Tracking Techniques Digital Fingerprinting Lecture 09 – threat intelligence (IoT) Search Engine Techniques News Search Document & Digital images Search Lecture 10 – threat intelligence Social Media Intelligence Tracking Photos Downloaded from Facebook to Its Source Profile Twitter Advanced Search Operators LinkedIn Search Lecture 11 – threat intelligence - TOR the “Dark Web”

Lecture 12 – threat intelligence the nature of Advanced Persistent Threats (APTs), well-known state operations and threats, challenges for attribution/action, interaction between state actors and proxies.

cdci/lectures/01.1709848774.txt.gz · Last modified: 2024/03/07 23:59 by mihai.chiroiu
CC Attribution-Share Alike 3.0 Unported
www.chimeric.de Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0