Cyber Warfare: EMERGING CYBER TECHNOLOGIES AND FOCUS AREAS

This post is also available in: English

EMERGING CYBER TECHNOLOGIES AND FOCUS AREAS

Duration : 32 Hours

The Emerging Cyber Technologies and Focus Areas course is part of HackerU Advanced Cyber Warfare Course. Designed especially for MOD industries, the program is both broad and thorough, covering issues such as the construction of knowledge and the structure of a defensive cyber unit in a particularly threatened environment.

The Emerging Cyber Technologies and Focus Areas is a preliminary program for a later specialization in one of the following subjects: Defense Strategy, Attacking Techniques, Proactive Intelligence, Investigations, Malware Analysis, Reverse Engineering, Exploit Writing, SCADA Attack & Defense.

Target Audience

Information Security experts, looking for an in-depth glance into organizations threatened by Advanced Persistent Threats. Intelligence and security practitioners.

Objectives

The program delves deep into various aspects of Cyber Warfare on the defensive side, enabling participants to expand their knowledge in both methodologies and required techniques.

Pre- requisites

Background in IT as well as software development or intelligence.

Course Outline

Module 1: Mobile Devices

  • Security Challenges
  • Mobile Device vulnerabilities
  • Mobile devise defense tools and techniques
  • Mobile devise forensics

Module 2: Virtualization 

  • Virtualization explained
  • Attacks against virtual machines
  • Using virtual machines for security
  • Building a Sandbox
  • Honeypots
  • Malware analysis
  • Current Solutions

Module 3: Cloud Security

  • Cloud Terminology and Architecture
  • Cloud Risk assessment
  • Policy and Organizational risks
  • Technical risks
  • Legal risks
  • General risks
  • Cloud Vulnerabilities
  • Recommendations and best practices:
  • IA framework
  • IA requirements
  • Cloud Forensics

Module 4: Data Protection Technologies 

  • Data access monitoring
  • File access
  • Database monitoring
  • Application\Middleware control
  • Digital Rights Management
  • Data leak prevention technologies and techniques
  • Data Encryption tools

Module 5: Massive Data Processing 

Module 6: Cyber Taxonomies