Ementa/Descrição: |
This course covers foundation knowledge and essential skills in all security domains in the cyber world - information security, systems security, network security, mobile security, physical security, ethics and laws, related technologies, defense, and mitigation techniques use in protecting businesses.
Content:
1) Introduction to Cybersecurity: Describe the characteristics of criminals and experts in the
cybersecurity world.
2) The Cybersecurity Cube: Describe how the principles of confidentiality, integrity, and availability
as they relate to data states and cybersecurity countermeasures.
3) Cybersecurity Threats, Vulnerabilities and Attacks: Describe cyber criminals' tactics, techniques and
procedures.
4) The Art of Protecting Secrets: Describe how technologies, products and procedures are used to
protect confidentiality.
5) The Art of Ensuring Integrity: Describe how technologies, products and procedures are used to
ensure integrity.
6) The Five Nines Concept: Describe how technologies, products, and procedures provide high
availability.
7) Protecting a Cybersecurity Domain: Explain how cybersecurity professionals use technologies,
processes and procedures to defend all components of the network.
8) Case studies in Cybersecurity.
Upon completion of the course, students will be able to perform the following tasks:
Describe the characteristics of criminals and experts in the cybersecurity world.
Describe how the principles of confidentiality, integrity, and availability as they relate to data states and cybersecurity countermeasures.
Describe the tactics, techniques and procedures used by cybercriminals.
Describe how technologies, products and procedures are used to protect confidentiality.
Describe how technologies, products and procedures are used to ensure integrity.
Describe how technologies, products and procedures provide high availability.
Explain how cybersecurity professionals use technologies, processes and procedures to defend all components of the net. |
Referências: |
1. VACCA, John R. "Computer and Information Security Handbook". 2nd Edition. Newnes,
2012. 1200 pages. ISBN 0123946123, 9780123946126.
2. KIM, David and SOLOMON, Michael G. "Fundamentals of Information Systems Security".
Jones & Bartlett Publishers, 2016. 548 pages. ISBN
128411645X, 9781284116458.
3. Information Security and Cryptology ICISC 2006: 9th International Conference, Busan,
Korea, November 30 - December 1, 2006, Proceedings, Volume 4296 de Lecture Notes in
Computer Science Security and Cryptology. Min Surp Rhee, Byoungcheon Lee. Springer, 2006.
ISBN 3540491147, 9783540491149.
4. SKOPIK, Florian and SMITH, Paul Dr."Smart Grid Security: Innovative Solutions for a
Modernized Grid". Syngress, 2015. 324 pages. ISBN 0128023546, 9780128023549.5. ANDERSON, Ross. Security Engineering: A Guide to Building Dependable Distributed
Systems. Wiley; 3rd edition (December 22, 2020). 1232 pages. ISBN-10: 1119642787. ISBN-
13: 978-1119642787.
6. SYNGRESS. "Cisco Security Professional's Guide to Secure Intrusion Detection
Systems". ITPro collection, Elsevier, 2003. 656 pages. ISBN 0080476546, 9780080476544.
7. SING, Simon. The Code Book: The Science of Secrecy from Ancient Egypt to Quantum
Cryptography. Anchor; Reprint edition (August 29, 2000). 432 pages. ISBN-10 :
0385495323. ISBN-13 : 978-0385495325.
8. MEEUWISSE, Raef. Cybersecurity for Beginners. Cyber Simplicity Ltd; 2nd ed. edition
(March 14, 2017). 224 pages. ISBN-10: 1911452037. ISBN-13: 978-1911452034.
9. ERICKSON, Jon. Hacking: The Art of Exploitation. No Starch Press; 2nd edition (February
4, 2008). 488 pages. ISBN-10: 1593271441. ISBN-13: 978-1593271442.
10. CERRA, Allison. The Cybersecurity Playbook: How Every Leader and Employee Can
Contribute to a Culture of Security. Wiley, August 2019. 224 Pages. . ISBN: 978-1-119-
44213-4.
11. BROOKS, Charles J. et Al. Cybersecurity Essentials. Sybex; 1st edition (September 20,
2018). 784 pages. ISBN-10: 9781119362395. ISBN-13: 978-1119362395.
12. Kohnke , Anne et al. The Complete Guide to Cybersecurity Risks and Controls (Internal
Audit and IT Audit). 1st Edition. Auerbach; 1st edition (April 7, 2016). 342 pages. ISBN-10:
1498740545. ISBN-13: 978-1498740548.
13. HUBBARD, Douglas W. et al. How to Measure Anything in Cybersecurity Risk. Wiley; 1st
edition (July 25, 2016). 275 pages. ISBN-13: 978-1119085294. ISBN-10: 1119085292.
14. ZETTER, Kim. Countdown to Zero Day: Stuxnet and the Launch of the World's First
Digital Weapon. Crown; (September 1, 2015). 448 pages. ISBN-10: 9780770436193. ISBN-
13: 978-0770436193.
15. ACKERMAN, Pascal. Industrial Cybersecurity: Efficiently monitor the cybersecurity
posture of your ICS environment. Packt Publishing; 2nd ed. edition (October 7, 2021). 800
pages. ISBN-10: 1800202091. ISBN-13: 978-1800202092.
16. ACKERMAN, Pascal. Industrial Cybersecurity: Efficiently Secure Critical Infrastructure
Systems. Packt Publishing, 2017. 456 pages. ISBN 1788395158, 9781788395151.
17. PAAR, Christof. Understanding Cryptography: A Textbook for Students and
Practitioners. Springer; 2010th edition (November 8, 2014). 390 pages. ISBN-10:
3642446493. ISBN-13: 978-3642446498.
18. WARD, David and WOODERSON, Paul. "Introduction to Automotive Cybersecurity," in
Automotive Cybersecurity: An Introduction to ISO/SAE 21434 , SAE, 2021, pp.1-6.
19. SHAW, William T. Cybersecurity for SCADA Systems. PennWell Corporation, 2006. 562
pages. ISBN: 1593700687, 9781593700683.
20. KNAPP, Eric D. and SAMANI, Raj. Applied Cyber Security and the Smart Grid:
Implementing Security Controls into the Modern Power Infrastructure. Newnes, 2013.
224 pages. ISBN: 012404638X, 9780124046382.
21. LESZCZYNA, Rafał. Cybersecurity in the Electricity Sector: Managing Critical
Infrastructure. Springer Nature, 2019. 213 pages. ISBN: 3030195384, 9783030195380. |