Program syllabus
Basics of Information Security
Assurance
- Vulnerability Assessment
- Penetration Testing
- Patch Management/Asset Inventory
- Certifications & Standards for Security
Authentication
Malware & Malware Analysis
- Malware Classification
- Virus/Worm
- Botnet
- Poli/Metamorphic
- Ransomware
- Fileless
- Malware Analysis: Methods & Tool chain
- Threat Intelligence
- Yara
- Machine Learning & Malware Analysis
Web App Security - OWASP Top 10
- SQL Injection
- Session Management
- XML Injection
Code Security
- Buffer Overflow
- Integer Overflow
- Race Condition
- Format String
- SPECTRE
Network Security
- Intrusion & Attacks Classification
- Network Design for security
- Firewall
- IDS/IPS
- SIEM
- (D)DOS
- iptables
- snort
- nmap
- hping
Basic Cryptography
Blockchain
Course slides
| Slide title | Slide |
|---|---|
| Introduzione 1 | Introduzione 1 |
| Assurance | Assurance |
| Authentication | Authentication |
| Introduzione 2 | Introduzione 2 |
| CVE | CVE |
| Risk Assessment and Security Testing | Risk Assessment and Security Testing |
| Social Engineering 1 | Social Engineering 1 |
| Social Engineering 2 | Social Engineering 2 |
| Social Engineering 3 | Social Engineering 3 |
| Lezione Malware 1 | Lezione Malware 1 |
| Lezione Malware 2 | Lezione Malware 2 |
| Malware Analysis | Malware Analysis |
| Lezione Malware Analysis 1 | Lezione Malware Analysis 1 |
| Lezione Malware Analysis 2 | Lezione Malware Analysis 2 |
| Lezione Malware Analysis 3 | Lezione Malware Analysis 3 |
| Lezione Malware Analysis 4 | Lezione Malware Analysis 4 |
| Polimorfico | Polimorfico |
| Metamorphic engine 1 | Metamorphic engine 1 |
| Metamorphic engine 2 | Metamorphic engine 2 |
| Metamorphic engine 3 | Metamorphic engine 3 |
| Botnet | Botnet |
| Lezione Botnet | Lezione Botnet |
| Mirai-Botnet | Mirai-Botnet |
| Yara | Yara |
| Session Management | Session Management |
| SQL Injection | SQL Injection |
| SQL Injection 2 | SQL Injection 2 |
| SQL Injection Lab | SQL Injection Lab |
| XML Injection | XML Injection |
| Buffer Overflow | Buffer Overflow |
| Basic Cryptography | Basic Cryptography |
| Lezione Crittografia 1 | Lezione Crittografia 1 |
| Lezione Crittografia 2 | Lezione Crittografia 2 |
| Lezione Crittografia 3 | Lezione Crittografia 3 |
| Lezione Crittografia 4 | Lezione Crittografia 4 |
| Message Authentication | Message Authentication |
| DDoS | DDoS |
| Network Security | Network Security |
| Firewall | Firewall |
| IDS and IPS | IDS and IPS |
| Blockchain | Blockchain |
| OSINT | OSINT |
| Threat Intelligence 1 | Threat Intelligence 1 |
| Threat Intelligence 2 | Threat Intelligence 2 |
| Ransomware | Ransomware |
| Format String | Format String |
| OWASP Methodology | OWASP Methodology |
| Vulnerability Assessment 1 | Vulnerability Assessment 1 |
| Vulnerability Assessment 2 | Vulnerability Assessment 2 |
| Vulnerability Assessment 3 | Vulnerability Assessment 3 |
| Vulnerability Assessment e Penetration Testing | Vulnerability Assessment e Penetration Testing |
| Software Security | Software Security |
| Exploitation and Mitigation | Exploitation and Mitigation |
| Esercitazione Penetartion Testing | Esercitazione Penetartion Testing |
| Nessus report | Nessus report |
| Nmap | Nmap |
| Snort | Snort |
| Ida pro | Ida pro |
| Arachini and ZAP | Arachini and ZAP |
| Ip Security | Ip Security |