Cyber Security

Cyber Security

The CYBER-TRUST project aims to develop an innovative cyber-threat intelligence gathering, detection, and mitigation platform, as well as, to perform high quality interdisciplinary research in key areas for introducing novel concepts and approaches to tackle the grand challenges towards securing the ecosystem of IoT devices. The high level project objectives, which summarize the specific challenges of the work programme are: To create a new paradigm for the next generation cyber-security systems, especially suited for the IoT that will greatly increase the capability of CIIs to counter threat actors and their methods. To quickly detect and effectively respond to/mitigate sophisticated cyber-attacks by advancing the current state-of-the-art of numerous existing techniques and by introducing new ones.


About Course

This course provides an in-depth understanding of cyber security, ethical hacking, ethical hacking phases, various attack vectors, preventing countermeasures, Bug Bunty Hunting, Penetration Testing and Forensics. This will provide you how hackers think and act maliciously so that you will be better positioned to set up your security infrastructure and defend future attacks. Understanding system weaknesses and vulnerabilities help organizations strengthen their system security controls to minimize the risk of an incident.The CYBER-TRUST project aims to develop an innovative cyber-threat intelligence gathering, detection, and mitigation platform, as well as, to perform high quality interdisciplinary research in key areas for introducing novel concepts and approaches to tackle the grand challenges towards securing the ecosystem of IoT devices. The high level project objectives, which summarize the specific challenges of the work programme are: To create a new paradigm for the next generation cyber-security systems, especially suited for the IoT that will greatly increase the capability of CIIs to counter threat actors and their methods. To quickly detect and effectively respond to/mitigate sophisticated cyber-attacks by advancing the current state-of-the-art of numerous existing techniques and by introducing new ones.Management/governance: People engaged at different managerial levels in organizations and/or infrastructure. They need to understand the role of security and the need to recognize and support security on organizational level. Management should be expected to lead by example. Architect, designer (infrastructure, software, AAI) People responsible for design of a new system and/or its significant adaptations. They need to understand implications and impacts of security precautions, identify security requirements and address them by the design. Admins/operators (Systems management, system administrators, network engineers) People responsible for operations of particular infrastructure components. The components cover a range of services, from network, through operating systems and middleware to end applications. Security specialist’s .People responsible for particular aspects related directly to security management and/or operations. The role involves (among others) incident handling and response, forensics, security monitoring (log analysis, using IDS), vulnerability management, software assessment. In addition to technical skills, there are also other important aspects, like communication

Start Date: 

2021-06-14


Duration:

50 hours


Timing:

07:00 AM - 09:00 AM


Language:

English