cyberattack simulations 2100-CB-M-D4SYCA
The course aims to familiarize students with various categories of cyberattacks and enable them to acquire practical skills in conducting security tests. Key topics covered in the course include:
1. **Categories of Cyberattacks**: Students will learn about different types of attacks, such as phishing, ransomware, and DDoS, to understand their mechanisms and impacts.
2. **Ethical Hacking**: Participants will explore the ethical aspects of hacking and the role of ethical hackers in ensuring the security of IT systems.
3. **Kill Chain Model**: The Kill Chain model, which outlines the stages of an attack from reconnaissance to exploitation and maintaining access, will be introduced.
4. **Building a Virtual Environment**: Students will learn to create controlled virtual environments for attack simulations and security testing.
5. **Kali Linux Basics**: The course will cover the installation, configuration, and usage of tools available in the Kali Linux operating system, a popular distribution for penetration testers.
6. **Conducting Attacks in a Controlled Environment**: Students will have the opportunity to carry out practical attack simulations to understand their operation and consequences.
7. **Security Testing**: Participants will learn various security testing techniques, such as vulnerability scanning, log analysis, and web application auditing.
The objective of the course is to equip students with the ability to identify potential threats to IT systems and mitigate them using appropriate tools and techniques. Through hands-on exercises and projects, students will have the opportunity to develop their skills in cybersecurity.
Term 2024L:
The course aims to familiarize students with various categories of cyberattacks and enable them to acquire practical skills in conducting security tests. Key topics covered in the course include: |
Mode
Prerequisites (description)
Course coordinators
Learning outcomes
Upon completing the course, the student will have knowledge of various categories of cyberattacks and the ethical aspects of hacking.
They will be able to apply the Kill Chain model to analyze attacks and take appropriate defensive actions. The student will have the skills to build virtual environments, configure tools such as Kali Linux, and conduct controlled attacks and security tests.
Additionally, they will be capable of basic network scanning, exploiting web application vulnerabilities, analyzing security test results, and reporting threats. The learning outcome is the student’s ability to identify cyber threats and take actions to protect IT systems against them.
Assessment criteria
The final grade is determined based on the total points earned from the workshops (0 to 40).
The grading scale is as follows:
- If the total points > 50%, then grade = 3 (satisfactory);
- If the total points > 60%, then grade = 3,5 (satisfactory plus);
- If the total points > 70%, then grade = 4 (good);
- If the total points > 80%, then grade = 4,5 (good plus);
- If the total points > 90%, then grade = 5 (very good);
- Otherwise, the grade = 2 (unsatisfactory).
Practical placement
not applicable
Bibliography
1. "Bezpieczeństwo informacyjne. Nowe wyzwania" – Krzysztof Liderman
2. "Testowanie penetracyjne aplikacji webowych" - Andrzej Dyjak, Dawid Czagan
3. "Kali Linux. Testy bezpieczeństwa, testy penetracyjne i etyczne hakowanie" - Ric Messier
4. "Etyczny haking. Praktyczne wprowadzenie do hakingu” - Daniel Graham
5. "Bezpieczeństwo sieci komputerowych. Praktyczne przykłady i ćwiczenia w symulatorze Cisco Packet Tracer " - Jerzy Kluczewski
6. Literaturę stanowi także dokumentacja do wykorzystywanych narzędzi oraz ogólnie dostępne kanały informacyjne nt. bezpieczeństwa systemów.
Term 2024L:
1. "Bezpieczeństwo informacyjne. Nowe wyzwania" – Krzysztof Liderman |
Additional information
Additional information (registration calendar, class conductors, localization and schedules of classes), might be available in the USOSweb system: