Program syllabus

Basics of Information Security

Assurance

  • Vulnerability Assessment
  • Penetration Testing
  • Patch Management/Asset Inventory
  • Certifications & Standards for Security

Authentication

Malware & Malware Analysis

  • Malware Classification
  • Virus/Worm
  • Botnet
  • Poli/Metamorphic
  • Ransomware
  • Fileless
  • Malware Analysis: Methods & Tool chain
  • Threat Intelligence
  • Yara
  • Machine Learning & Malware Analysis

Web App Security - OWASP Top 10

  • SQL Injection
  • Session Management
  • XML Injection

Code Security

  • Buffer Overflow
  • Integer Overflow
  • Race Condition
  • Format String
  • SPECTRE

Network Security

  • Intrusion & Attacks Classification
  • Network Design for security
  • Firewall
  • IDS/IPS
  • SIEM
  • (D)DOS
  • iptables
  • snort
  • nmap
  • hping

Basic Cryptography

Blockchain

Course slides

Slide title Slide
Introduzione 1 Introduzione 1
Assurance Assurance
Authentication Authentication
Introduzione 2 Introduzione 2
CVE CVE
Risk Assessment and Security Testing Risk Assessment and Security Testing
Social Engineering 1 Social Engineering 1
Social Engineering 2 Social Engineering 2
Social Engineering 3 Social Engineering 3
Lezione Malware 1 Lezione Malware 1
Lezione Malware 2 Lezione Malware 2
Malware Analysis Malware Analysis
Lezione Malware Analysis 1 Lezione Malware Analysis 1
Lezione Malware Analysis 2 Lezione Malware Analysis 2
Lezione Malware Analysis 3 Lezione Malware Analysis 3
Lezione Malware Analysis 4 Lezione Malware Analysis 4
Polimorfico Polimorfico
Metamorphic engine 1 Metamorphic engine 1
Metamorphic engine 2 Metamorphic engine 2
Metamorphic engine 3 Metamorphic engine 3
Botnet Botnet
Lezione Botnet Lezione Botnet
Mirai-Botnet Mirai-Botnet
Yara Yara
Session Management Session Management
SQL Injection SQL Injection
SQL Injection 2 SQL Injection 2
SQL Injection Lab SQL Injection Lab
XML Injection XML Injection
Buffer Overflow Buffer Overflow
Basic Cryptography Basic Cryptography
Lezione Crittografia 1 Lezione Crittografia 1
Lezione Crittografia 2 Lezione Crittografia 2
Lezione Crittografia 3 Lezione Crittografia 3
Lezione Crittografia 4 Lezione Crittografia 4
Message Authentication Message Authentication
DDoS DDoS
Network Security Network Security
Firewall Firewall
IDS and IPS IDS and IPS
Blockchain Blockchain
OSINT OSINT
Threat Intelligence 1 Threat Intelligence 1
Threat Intelligence 2 Threat Intelligence 2
Ransomware Ransomware
Format String Format String
OWASP Methodology OWASP Methodology
Vulnerability Assessment 1 Vulnerability Assessment 1
Vulnerability Assessment 2 Vulnerability Assessment 2
Vulnerability Assessment 3 Vulnerability Assessment 3
Vulnerability Assessment e Penetration Testing Vulnerability Assessment e Penetration Testing
Software Security Software Security
Exploitation and Mitigation Exploitation and Mitigation
Esercitazione Penetartion Testing Esercitazione Penetartion Testing
Nessus report Nessus report
Nmap Nmap
Snort Snort
Ida pro Ida pro
Arachini and ZAP Arachini and ZAP
Ip Security Ip Security