Program syllabus
Basics of Information Security
Assurance
- Vulnerability Assessment
- Penetration Testing
- Patch Management/Asset Inventory
- Certifications & Standards for Security
Authentication
Malware & Malware Analysis
- Malware Classification
- Virus/Worm
- Botnet
- Poli/Metamorphic
- Ransomware
- Fileless
- Malware Analysis: Methods & Tool chain
- Threat Intelligence
- Yara
- Machine Learning & Malware Analysis
Web App Security - OWASP Top 10
- SQL Injection
- Session Management
- XML Injection
Code Security
- Buffer Overflow
- Integer Overflow
- Race Condition
- Format String
- SPECTRE
Network Security
- Intrusion & Attacks Classification
- Network Design for security
- Firewall
- IDS/IPS
- SIEM
- (D)DOS
- iptables
- snort
- nmap
- hping
Basic Cryptography
Blockchain
Course slides
Slide title | Slide |
---|---|
Introduzione 1 | Introduzione 1 |
Assurance | Assurance |
Authentication | Authentication |
Introduzione 2 | Introduzione 2 |
CVE | CVE |
Risk Assessment and Security Testing | Risk Assessment and Security Testing |
Social Engineering 1 | Social Engineering 1 |
Social Engineering 2 | Social Engineering 2 |
Social Engineering 3 | Social Engineering 3 |
Lezione Malware 1 | Lezione Malware 1 |
Lezione Malware 2 | Lezione Malware 2 |
Malware Analysis | Malware Analysis |
Lezione Malware Analysis 1 | Lezione Malware Analysis 1 |
Lezione Malware Analysis 2 | Lezione Malware Analysis 2 |
Lezione Malware Analysis 3 | Lezione Malware Analysis 3 |
Lezione Malware Analysis 4 | Lezione Malware Analysis 4 |
Polimorfico | Polimorfico |
Metamorphic engine 1 | Metamorphic engine 1 |
Metamorphic engine 2 | Metamorphic engine 2 |
Metamorphic engine 3 | Metamorphic engine 3 |
Botnet | Botnet |
Lezione Botnet | Lezione Botnet |
Mirai-Botnet | Mirai-Botnet |
Yara | Yara |
Session Management | Session Management |
SQL Injection | SQL Injection |
SQL Injection 2 | SQL Injection 2 |
SQL Injection Lab | SQL Injection Lab |
XML Injection | XML Injection |
Buffer Overflow | Buffer Overflow |
Basic Cryptography | Basic Cryptography |
Lezione Crittografia 1 | Lezione Crittografia 1 |
Lezione Crittografia 2 | Lezione Crittografia 2 |
Lezione Crittografia 3 | Lezione Crittografia 3 |
Lezione Crittografia 4 | Lezione Crittografia 4 |
Message Authentication | Message Authentication |
DDoS | DDoS |
Network Security | Network Security |
Firewall | Firewall |
IDS and IPS | IDS and IPS |
Blockchain | Blockchain |
OSINT | OSINT |
Threat Intelligence 1 | Threat Intelligence 1 |
Threat Intelligence 2 | Threat Intelligence 2 |
Ransomware | Ransomware |
Format String | Format String |
OWASP Methodology | OWASP Methodology |
Vulnerability Assessment 1 | Vulnerability Assessment 1 |
Vulnerability Assessment 2 | Vulnerability Assessment 2 |
Vulnerability Assessment 3 | Vulnerability Assessment 3 |
Vulnerability Assessment e Penetration Testing | Vulnerability Assessment e Penetration Testing |
Software Security | Software Security |
Exploitation and Mitigation | Exploitation and Mitigation |
Esercitazione Penetartion Testing | Esercitazione Penetartion Testing |
Nessus report | Nessus report |
Nmap | Nmap |
Snort | Snort |
Ida pro | Ida pro |
Arachini and ZAP | Arachini and ZAP |
Ip Security | Ip Security |