INTERNET SECURITY & LABORATORYModule LABORATORY
Academic Year 2024/2025 - Teacher: SERGIO ESPOSITOExpected Learning Outcomes
- Knowledge and understanding. Students will get to grips with the security issues affecting the Internet today, as well as of methods and tools to thwart such issues.
- Applying knowledge and understanding. Students will complete their fundamental security knowledge with the practical applications of the tools to establish security, for example through the setup, both at hardware and software level, of a portable laboratory consisting of laptops and hubs.
- Making judgements. Students will become expert players of the "security game", namely the game of finding attacks to a system that would have to be secure, and then devising appropriate ways to patch the attacks found.
- Communication skills. Students will familiarise with the typical cyber security terms, building their capacity to conjugate the general "security" word as appropriate depending on context.
- Learning skills. Students will get the critical attitude and competences to tackle and solve the security problems are they arise in various forms.
Course Structure
During each lesson, slides will be projected to support upfront teaching. The course is designed to be highly interactive between students and the lecturer, due to the extremely practical nature of the covered topics.
Required Prerequisites
Good logic reasoning. Fundamentals about operating systems and networks.
Attendance of Lessons
Attending the course is mandatory.
Detailed Course Content
- Intrusions
- Firewall
- Intrusion Prevention System
- Endpoint Detection and Response
- Incident Response
- System Logs
- Security Information and Event Management
- Security Orchestration, Automation and Response
- Security Operation Center
- Recent Threats
Textbook Information
- William Stallings: Network security essentials.
- Bruce Schneier: Secrets and lies.
Course Planning
Subjects | Text References | |
---|---|---|
1 | Intrusions | Educational material given by the lecturer, online resources and aforementioned textbooks |
2 | Firewall | Educational material given by the lecturer, online resources and aforementioned textbooks |
3 | Intrusion Prevention System | Educational material given by the lecturer, online resources and aforementioned textbooks |
4 | Endpoint Detection and Response | Educational material given by the lecturer, online resources and aforementioned textbooks |
5 | Incident Response | Educational material given by the lecturer, online resources and aforementioned textbooks |
6 | System Logs | Educational material given by the lecturer, online resources and aforementioned textbooks |
7 | Security Information and Event Management | Educational material given by the lecturer, online resources and aforementioned textbooks |
8 | Security Orchestration, Automation and Response | Educational material given by the lecturer, online resources and aforementioned textbooks |
9 | Security Operation Center | Educational material given by the lecturer, online resources and aforementioned textbooks |
10 | Recent Threats | Educational material given by the lecturer and online resources |
Learning Assessment
Learning Assessment Procedures
- Optional mid-term tests, with lab activities aiming to solve real-world problems.
- Implementation project.
- Oral examination.
Examinations may take place remotely, if required by the circumstances.
For the assignment of grades for individual assessments, the following criteria are typically followed:
- Fail: The student has not acquired the basic concepts and is unable to answer questions or complete the exercises.
- 18-23: The student demonstrates a minimal mastery of the fundamental concepts; their ability to present and connect content is modest, and they can solve simple exercises.
- 24-27: The student shows a good grasp of the course content; their ability to present and connect the content is good, and they solve exercises with few errors.
- 28-30 with honors: The student has acquired all course content and can present them comprehensively with a critical perspective; they solve exercises completely and without errors.
Students with disabilities and/or learning disorders (DSA) must contact the lecturer and the CInAP representative at DMI well in advance of the exam date to inform them of their intention to take the exam with the appropriate compensatory measures.
Examples of frequently asked questions and / or exercises
- Mid-term test: detect the exploitation of a CVE, using one of the solutions discussed within the course.
- Implementation project: protect a server that runs some outdates services, leveraging both protection and monitoring solutions.
- Oral examination: describe a possible strategy for the detection of a ransomware.