course aims in Estonian
Kursus annab:
* ülevaate küberkurjategijate poolt kasutatavatest tehnoloogiatest
* ülevaate probleemidomeenist
* kogemuse erinevatest tehnoloogiatest ja tennilistest vahenditest, nagu kurivara, antiviirused, anonümiseerimise tehnoloogiate rakendused, tulemüürid jne.
course aims in English
Course aims
* Provide an overview of adversary model
* Provide an overview of technologies used by cybercriminals
* Provide an overview of problem domain
* Provide the experience with different technologies and tools like
Malware, Antiviruses ,Anonymization technologies, Exploits, Firewalls,Antiviruses etc.
learning outcomes in the course in Est.
Peale kursuse läbimist, tudeng tunneb:
* erinevaid ohumudeleid
* praeguse aja peamisi küberohtusid
* kurivaraga opereerimise algtõdesid ja kiiranalüüsi võimalusi
* ketta- ja võrguekspertiisi aluseid
Tudeng on teostanud individuaalse uurimuse ja omab kogemust informatsiooni kogumisest küberintsidendi juhtimise protsessis
learning outcomes in the course in Eng.
After completing the course, the student:
* knows Möbius defence, Cyber Kill Chain and Threat-based Defense models.
* knows the most significant current cyber threats
* knows the basics of Malware handling and quick analysis options.
* knows the basics of Disk and network forensics
* has performed individual research
* has experienced the information gathering aspect of the cyber incident management process
brief description of the course in Estonian
Kursus on mõeldud tudengitele, kellel on keskmisel tasemel ülevaade arvutitehnoloogiatest.
Loengud katavad ohumudeleid, küberründeid ja tehnikaid, mida kasutame turvalisuse tagamiseks. Samuti käsitletakse intsidendi elutsüklit ja antakse kiire ülevaate vahenditest ja taktikatest, mida intsidendi elutsükli eri etappides kasutada, põhinedes teaduslikel artiklitel.
Teemad hõlmavad ka operatsiooonisüsteemi turvalisust, kurivara, võimeid, infovoo kontrolli, keele turvalisust, võrguprotokolle, riistvara turvalisust ja samuti ka veebi app-ide turvalisust.
Kodutööd sisaldavad praktikume, mis on aluseks väikestele individuaalsetele uurimisprojektidele, kus tudengid õpivad kasutama mõndasid neidt tehnoloogiatest, nagu algne kurivara analüüs, anonümiseerimise pritsiibid, tulemüür, ..... jne. ja nende rakendusprintsiipe.
brief description of the course in English
This course is aimed at students who have a moderate understanding of computer technology.
The lectures cover adversarial threat models, attacks that compromise security, and techniques for achieving security, incident lifecycle and quick overview of tools and tactics used in different lifecycle stages, based on recent research papers.
Topics include operating system (OS) security, malware, capabilities, information flow control, language security, network protocols, hardware security, and security in web applications.
Assignments include labs that are preparation for small individual research projects where students get to learn usage and application principles of some of these technologies such as basic malware analysis,anonymising principles, Firewall, IDS, IPS basic configuration, etc.
type of assessment in Estonian
-
type of assessment in English
-
independent study in Estonian
-
independent study in English
-
study literature
Reading (academic papers, case studies) assigned in class.
study forms and load
daytime study: weekly hours
4.0
session-based study work load (in a semester):