Skip to Content
Personal Insights

Cyber Security – a shared responsibility – be Cyber-secured in 30 Hours

We are hearing a new buzz word ‘Cybersecurity’ during this Pandemic time; in this blog we will talk about learning materials on Cybersecurity and knowledge required about the topic.

First of all thanks to Hasso Plattner Institute for Digital Engineering gGmbH (HPI), Professor Dr. Christoph Meinel and his team for the wonderful course on the topic which made us aware more about Cybersecurity in the internet.

With the technology improving every day, number of smart/IoT devices which connects to internet has increased progressively. Internet has become one of the basic needs in addition to Food, Clothing and Shelter.

Lacking in Knowledge and awareness – many times we are not aware about the security and features of internet devices / software products which we use in day-to-day and ways to protect us from Cyber-attacks.

Cybersecurity Basics – Exam’ which covers questions from courses

  • Confidential Communication in the Internet
  • Digital Identities
  • Cyberthreats by Malware

Details of the course can be found in – https://open.hpi.de/courses/cybersec-exam-4
Below are the list of topics and study time for each topic

Course Topics Covered Study Time
Confidential Communication in the Internet
  • Potential for Damage
  • Security Goals
  • Cryptography
  • Traditional Symmetric Procedures
  • Data Encryption Standard
  • Advanced Encryption Standard
  • Hash-Functions
  • Asymmetrical Procedures
  • Cryptographic Protocols
  • Attacks on Cryptographic Protocols
  • Encryption
  • Hybrid Encryption
  • Digital Signature
  • Feasible Digital Signatures
  • Trust-Problem
  • Trust-Model
  • Public Key Infrastructure
  • Digital Certificates
  • Certificate Standards
  • PKIs in the Internet
  • Crypto patents and standards
  • Crypto-Products
  • GPG
9 Hours
Digital Identities
  • What is a Digital Identity?
  • Identity Management and Identity Provider
  • ID Provider Models: Isolated and Centralized
  • ID Provider Models: Decentralized and Federalized
  • Authentication Methods: Knowledge, Ownership, Biometrics, Behavior
  • Secure Communication with Kerberos
  • Secure Authentication with OpenID Connect
  • Authentication by Digital Signatures with Public Key Infrastructures
  • FIDO
  • Data Collection of Online Services
  • Identity Theft − Attacks on Digital Identity
  • Identity Theft − Social Engineering Attacks on Users
  • Identity Theft − Social Engineering Attacks on Providers
  • Password Security − Authentification usings Passwords
  • Password protected Accounts − Weak Passwords
  • Attacks on Passwords: Guessing, Cracking, Sniffing
  • Password Length and its Importance
  • Strong Passwords
  • Password Manager
  • One−Time Passwords
9 Hours
Cyberthreats by Malware
  • Introduction: Cyberthreats by Malware
  • Internet – a Popular Target
  • Nowaday’s Internet
  • Attackers and their Motivation
  • Most Common Attacks
  • Malware
  • Malware: Its Way to your Computer
  • Technical Failures
  • Human Factors
  • Short History of Cybercrime
  • Virus, Worm, Trojan
  • Botnets
  • Rootkits and Backdoors
  • Adware and Spyware
  • Scareware and Rogueware
  • Ransomware
  • Keylogger
  • Emotet
  • Carberp
  • Protective Measures
9 Hours

 

After spending 27 Hours of study + 2 Hours of exam has made a big impact in day-to-day things by being cyber secured in every aspect professionally and personally.

“The five most efficient cyber defenders are: Anticipation, Education, Detection, Reaction and  Resilience. Do remember: “Cybersecurity is much more than an IT topic.”
– Stéphane Nappo

 

References:

https://open.hpi.de/courses/cybersec-exam-4

https://open.hpi.de/courses/confidentialcommunication2021

https://open.hpi.de/courses/identities2021

https://open.hpi.de/courses/malware2021

Be the first to leave a comment
You must be Logged on to comment or reply to a post.