Learning objectives
This course lays out the basic concepts and knowledge for those entering for the
first time in the world of Cyber Security.
The objective of the course is to provide the basic and advanced knowledge of Cyber Security, from theory to practice to understand the threats that can happen every day from the personal sphere to National Security.
The Course also has practical applications during classes.
Prerequisites
None.
All students even with different backgrounds can participate in this course.
Course unit content
Information Security.
Terminology, Statistics, Yesterday's Threats of Today and Future, A Little History: from Hacking to Cybercrime .
. from Cyber Espionage to Information Warfare.
Case Studies.
OSINT - Introduction to OSINT
Who uses OSINT and why
Categories of Intelligence
Open Source Intelligence Fundamentals
Course Introduction
Understanding OSINT
Goals of OSINT Collection
Diving into Collecting
Taking Excellent Notes
Determining Your Threat Profile
Setting up an OSINT Platform
Effective Habits and Process
Leveraging Search Engines
Gathering, Searching, and Analyzing OSINT
Data Analysis Challenges
Harvesting Web
Data, File Metadata Analysis
OSINT Frameworks
What and where you can look for
Engines, services and other places
Search Engines: The Basic
Google Dorks
Social Networks, Relations, Entourages, and all the Rest
Virtual Communities
Cyber Threat Intelligence
What is CTI
Threat Hunting Activities
Undercover Investigation in the Dark Web
Digital and Mobile Forensics
Computer Forensics lab, basics of File System and commands. Difference between the various ways of performing forensic acquisitions of Personal Computers.
Computer Forensics Lab, basics of Mobile Forensics, knowledge of Cellebrite Ufed 4PC tools.
Computer Forensics Lab, knowledge of paid (AXIOM) and open (AutoPsy) tools.
Key concepts of Digital Forensics.
The importance of Digital Forensics today.
The different phases of D.F.:
Identification
Acquisition and Retention
Analysis
Evaluation and presentation
Full programme
see the content part
Bibliography
http://www.opensourceintelligence.eu/ric/doc/INSCOM%20OSINT%20HB.pdf
http://www.opensourceintelligence.eu/ric/doc/The%20Extreme%20Searcher%27s%20Internet%20Handbook.pdf
http://www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB436/docs/EBB-005.pdf
http://www.phibetaiota.net/wp-content/uploads/2009/07/OSINT-2ool-Kit-OnThe-Go-Bag-O-Tradecraft.pdf
http://www.oss.net/dynamaster/file_archive/030201/ca5fb66734f540fbb4f8f6ef759b258c/NATO%20OSINT%20Handbook%20v1.2%20-%20Jan%202002.pdf
http://verificationhandbook.com/
https://i-intelligence.eu/uploads/public-documents/OSINT_Handbook_2020.pdf
http://uobrep.openrepository.com/uobrep/bitstream/10547/326231/1/hewling.pdf
http://www.cftt.nist.gov/disk_imaging.htm
https://www.academia.edu/7768658/Actionable_Evidence_in_the_Wake_of_Anti-Forensics_on_Windows_8_Systems
http://ac.els-cdn.com/S1877050914012113/1-s2.0-S1877050914012113-main.pdf?_tid=fb848980-7551-11e4-8648-00000aacb35e&acdnat=1416995750_8ff475d9db450e5724b169e154496169
https://www.guidancesoftware.com/products/Pages/tableau/products/duplicators.aspx
http://www.cftt.nist.gov/tool_catalog/index.php
https://digital-forensics.sans.org/summit-archives/2012/practical-use-of-cryptographic-hashes-in-forensic-investigations.pdf
http://www.ltr-data.se/opencode.html/#ImDisk
http://www.forensicsoft.com/index.php
http://www.e-evidence.info/
http://www.forensicswiki.org/
http://www.forensicfocus.com/
http://www.opensourceforensics.org/
http://www.nirsoft.net
http://www.tzworks.net
http://redwolfcomputerforensics.com
http://www.mitec.cz
http://www.woanware.co.uk
http://www.sysinternals.com
http://www.passwordforensics.com
http://verificationhandbook.com/book/
http://www.phibetaiota.net/wp-content/uploads/2014/01/Ben-Benavides-Social-Web-Sites-A-Guide.pdf
http://www.phibetaiota.net/2014/01/ben-benavides-exploring-social-media-web-sites-a-guide-for-the-open-source-analyst/
http://www.onstrat.com/osint/
site://www.css.ethz.ch osint
http://demosthenes.info/blog/670/The-Face-Of-Lorem-Ipsum-Profile-Generators-And-Random-User-Images
http://it.fakenamegenerator.com/gen-male-it-it.php
http://www.datafakegenerator.com/generador.php
http://simitator.com/generator/facebook
http://www.phibetaiota.net/wp-content/uploads/2013/07/2013-07-11-OSINT-2ool-Kit-On-The-Go-Bag-O-Tradecraft.pdf
http://www.wikihow.com/Reveal-a-Fake-Facebook-Account
http://www.difesaonline.it/index.php/it/15-notizie/approfondimenti/280-la-demodoxalogia-l-osint-open-source-intelligence-italiana
http://rr.reuser.biz/
https://twitter.com/OSINTCenter
http://inteltechniques.com/links.html
Teaching methods
Lessons in theory, practice, workshops
Assessment methods and criteria
Practical classroom exercises and home exercises on the topics explained from time to time.
Other information
- - -
2030 agenda goals for sustainable development
- - -