Recent changes
Login
Lecture02. Cyberdefense – end devices
Resources:
https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-123.pdf
https://www.mandiant.com/resources/blog/time-between-disclosure-patch-release-and-vulnerability-exploitation
https://www.blackhillsinfosec.com/bypass-anti-virus-run-mimikatz/
https://lolbas-project.github.io/
https://www.youtube.com/watch?v=spsDVBeJ4bk
General info CDCI
Lectures
Lecture01. Cyberdefense introduction
Lecture02. Cyberdefense – end devices
Lecture03. Cyberdefense – web security
Lecture04. Cyberdefense – network
Lecture05. Cyberdefense – mobile devices
Lecture06. cyberdefense – cloud
Lecture07. (Open) Threat intelligence introduction
Lecture08. Threat intelligence - Online fingerprinting
Lecture09. Threat intelligence - Online searching
Lecture10. Threat intelligence - Social media intelligence
Lecture11. Threat intelligence - Dark web
Lecture12. Threat intelligence - Advanced Persistent Threats (APTs)
Labs
Lab01. Malware sample analysis
Lab02. Cuckoo sandboxing
Lab03. Network discovery
Lab04. Man-in-the-middle attack
Lab05. Practical cryptography
Lab06. Data exfiltration
Lab07. TBA
Lab09. TBA
Assignments
Resources
Useful resources
cdci/lectures/02.txt · Last modified: 2024/03/15 09:32 by mihai.chiroiu
Old revisions
Media Manager
Back to top