Systems and Enterprise Security - A.A. 2017-2018

Lecturer: Leonardo Querzoni
CFUs: 6
Lecture hours:
    1st semester:
    Wednesday 9:00-12:00, room A5
    Friday 11:00-13:00, room A5

Most of today's business are performed on the web or involve the usage of connected devices and systems. Criminal organizations, political groups and industrial competitors active on the web threaten on a daily basis the activities of thousands of companies, agencies and government bodies though cyber attacks. Facing such threats require both knowledge on the basic security tools that can be used to protect information and services, and on the organizational aspects that makes cybersecurity a manageable activity. This course aims at providing students with a bottom-up approach to cybersecurity for complex systems and enterprises.

Syllabus
  • Introduction to cybersecurity
  • System Defense and Monitoring
    • Intrusion detection
    • Network segmentation
    • SIEMs
    • Intrusion tolerance
  • Security Modeling and testing
    • Threat models
    • Penetration testing
    • Malware Analysis
  • Risk Management and Security governance
    • Governance for security
    • Cybersecurity frameworks
    • Economics of vulnerabilities
Notes

The lectures for October 25th and 27th are CANCELLED. Next lecture is scheduled for November 3rd.

Lectures

September 29th, 2017 - Course introduction, Introduction to cybersecurity
October 4th, 2017 - Introduction to cybersecurity (cont.)
October 6th, 2017 - Introduction to cybersecurity (cont.)
October 11th, 2017 - Case study: Target, Intrusion detection
October 13th, 2017 - Intrusion detection (cont.)
October 18th, 2017 - Port Scan Detection
October 20th, 2017 - Case studies: Honan's hack | Network segmentation
November 3rd, 2017 - Malware analysis
November 8th, 2017 - Malware analysis
November 10th, 2017 - Chrome hack | SIEM
November 15th, 2017 - Intrusion tolerance

Slides

The password for accessing the following PDFs is "ses"

  1. Practical Info - pdf
  2. Introduction to cybersecurity - pdf
  3. Case study: Target - pdf
  4. Intrusion detection - pdf
  5. Port Scan Detection - pdf
  6. Case study: Honan's hack - pdf
  7. Network segmentation - pdf
  8. Malware analysis - pdf 1, pdf 2, pdf 3, VM (10Gb)
  9. Case study: How to hack Chrome in 6 simple steps - pdf
  10. SIEM - pdf
  11. Intrusion tolerance - pdf
Exams

Schedule

Exam rules
Rules
Report templates: Word - LaTeX
Info for practical assignments on malware analysis

Useful links

Introduction to modern attack techniques and strategies

Blogs

Databases

Intrusion Detection

Network segmentation

Threat modeling

Incident management

Penetration testing

Governance

Tools