ICT Security Basics - from Trust to Blockchain - ict4hm003 3001 2020 Spring
Learn security fundamentals to understand current trends.
Blockchains, TOR network and video conference encryption all stand on these fundamentals.
Online course - I (Tero) will give and evaluate all my courses completely online during 2020 Spring.
Moodle (requires Haaga-Helia account)
In this course, you will
- Learn fundamentals of computer security
- See them in hands on exercises
In detail, you'll
- Have an idea of computer security fundamentals (confidentiality, ...)
- Think of security as risk management; recognize some of the risks in ICT
- Can put infosec tools in perspective, and has tested some of these tools
- Can take attacker view (at least on a superficial, hypothetical and descriptive level)
- Has had a look on some concurrent security tools and techniques
This course gives you grand overview of security principles and practice with tools implementing these principles. Even though you're expected to be able to install and configure programs and troubleshoot some errors, this is not my most technical course. If you want a demanding, hands on technical course with exploitation practice, pick Tunkeutumistaus (Penetration Testing ict4tn027-3003) in addition to this.
This initial timetable will change during the course.
- w14 Mon 2020-03-30 Organizing, overivew of the course. Fundamentals. CIA triad. Adversarial situation. Business view. Attack tree. Attacker view and pentest. The most common ways to attack companies (spear phising, OWASP 10...).
- w15 Mon 2020-04-06 17:40-20:30 Niko Marjomaa, Accenture - Leading security. (Easter w16 Mon 2020-04-13)
- w17 Mon 2020-04-20 Low hanging fruit for the defender. Low hanging fruit for the attacker.
- w18 Mon 2020-04-27 Encryption. CIA in encryption. Symmetric and asymmetric encryption. Hashing. Two way authentication. Measurment. Breaking encryptions.
- w19 Mon 2020-05-04 Practical encryption technieques. PGP for email encryption. Public key infrastructure. Centralized and distributed trust (e.g. TLS vs PGP).
- w20 Mon 2020-05-11 New applications for encryption. Anonymous (pseudonymous?) networks: TOR. Virtual private networks and SSH tunneling. Distributed file sharing (e.g. syncthing). Blockchain and cryptocurrencies.
- w21 Mon 2020-05-18 Presentations.
Homeworks 50% and presentations 50%. Evaluation is based on totality of the skills and knowledge demonstrated.