Cybersecurity Fundamentals

Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

About This Course

Skills You’ll Get

1

Introduction

2

Introduction to Cybersecurity

  • Data and information
  • Data communication
  • Computer network
  • World Wide Web
  • Internet
  • W3 Consortium (W3C)
  • Networking, W3 and internet relationship
  • Information security
  • World Wide Web Security
  • Network Security
  • Cybersecurity
  • Information security to cybersecurity
  • Role of risk analysis in cybersecurity
  • Conclusion
  • Points to remember
  • Questions
3

Cybersecurity Landscape and Its Challenges

  • History of computers and cybercrime
  • Cybercrime – As a profession
  • Cost of cybercrime
  • Framework for analysing the cybercosts
  • Various forms of cybercrimes
  • Challenges in cybersecurity
  • Cybercrime – As a Service
  • Cybercrime underground black market
  • Conclusion
  • Points to remember
  • Questions
4

Information Security and Intrusion Detection System

  • Critical National Infrastructure
  • Confidentiality-Integrity-Availability Triad
  • Defensive Lifecycle
  • Intrusion and its types
  • Intrusion Detection system
  • Characteristics of IDS
  • Major types of Intrusion Detection System
  • Host-based IDS versus Network-Based IDS
  • Intrusion detection and prevention principles
  • Conclusion
  • Points to remember
  • Questions
5

Cybercrime Source Identification Techniques

  • Cyber forensic
  • Intrusion activities
  • Attribution and traceback
  • Why attribution is difficult?
  • Assumptions in traceback
  • IP address and traceback mechanism
  • Classification of traceback schemes
  • Evaluation of IP Traceback Schemes
  • Active response characteristics
  • Sleepy Watermark Tracing (SWT)
  • Conclusion
  • Points to remember
  • Questions
6

Stepping Stone Detection and Tracing System

  • The problem of accountability
  • Stepping stones
  • Timing-based stepping stone detection approach
  • Brute Force Content-based Algorithm
  • Simple content-based algorithm
  • Anomaly detection techniques
  • Conclusion
  • Points to remember
  • Questions
7

Infrastructural Vulnerabilities and DDoS Flooding Attacks

  • COTS software and internet security
  • Shortfalls in internet structure
  • Cooperative intrusion traceback and Response Architecture (CITRA)
  • DDoS flooding attacks
  • DDoS attacks on OSI layers
  • Cyberwar
  • Conclusion
  • Points to remember
  • Questions

Cybersecurity Fundamentals

$ 386.55

Buy Now

Related Courses

All Course
scroll to top