Introduction to Cybersecurity

IntroSec
Abstract

Abstract

This course provides a comprehensive introduction to the fundamentals of cybersecurity, equipping students with the essential knowledge and skills to protect digital systems and information. Through seven focused lessons, the course covers the historical foundations of cybersecurity, modern techniques such as fuzzing and penetration testing, and key topics including cryptography, network security, malicious software, and phishing. Students will engage in practical exercises to identify vulnerabilities, secure systems, and respond to cyber threats. By the end of the course, participants will have a solid foundation in cybersecurity principles and practices, preparing them for further study or entry-level roles in the field..

Teaching and Learning Methods: Lectures and lab. sessions.

Course Policies: Attendance to the lab. sessions mandatory.

Bibliography

 

Bibliography

The course material is provided by the lecturer.

 A set of references to additional resources is also provided for students who would like to learn more about certain cybersecurity topics. 

Requirements

Prerequisites

Intermediate knowledge of the Python programming language.

Description

Structure of the awareness raising

Module 1 - History & Foundations(3hours)

  • Overview of the evolution of cybersecurity.
  • Key historical events and milestones in the field.
  • Fundamental concepts: confidentiality, integrity, availability.
  • Introduction to the cybersecurity threat landscape and defensive strategies.

Module 2 - Fuzzing(3hours)

  • Introduction to fuzzing as a software testing technique.
  • Types of fuzzing: black-box, white-box, and grey-box.
  • How fuzzing helps discover vulnerabilities.
  • Tools and techniques commonly used for fuzzing.

Module 3 - Cryptography(3hours)

  • Basics of cryptography: encryption, decryption, keys.
  • Symmetric vs. asymmetric cryptography.
  • Common algorithms: AES, RSA, and hashing functions (SHA, MD5).
  • Real-world applications of cryptography (e.g., HTTPS, email encryption).

Module 4 - Network Security (3 hours)

Module 5 - Malicious Software (3 hours)

Module 6 - Penetration Testing (3 hours)

Module 7 - Phishing (3 hours)

  • Fundamentals of securing networks: firewalls, VPNs, IDS/IPS.
  • Common network vulnerabilities and threats.
  • Basics of secure network design and segmentation.
  • Overview of Wi-Fi security and best practices.

    • Types of malware: viruses, worms, ransomware, trojans.
    • How malware spreads and impacts systems.
    • Techniques for detecting and removing malware.
    • Overview of modern anti-malware tools and solutions.
    • Adversary Modeling
    • The pen testing lifecycle
    • Common tools: Metasploit and Nmap.
    • Legal and ethical considerations in pen testing.
    • Social engineering
    • Understanding phishing and its variations (spear-phishing, vishing, etc.).
    • Techniques used by attackers in phishing schemes.
    • Recognizing and mitigating phishing attempts.

Learning Outcomes:

  • Understand the Historical and Conceptual Foundations of Cybersecurity
  • Apply Fuzzing Techniques to Identify Vulnerabilities
  • Demonstrate Knowledge of Cryptographic Principles and Applications
  • Secure Network Systems Against Common Threats
  • Differentiate between types of malware and their behaviors.
  • Perform Basic Penetration Testing
  • Detect and Prevent Phishing Attacks

Nb hours: 21,00

Evaluation: In each of the 7 sessions, students are given a CTF (Capture The Flag) challenge, which they must solve and return in a maximum of 7days. Each challenge counts for 7/20of the final grade.

The final exam in the form of a multiple choice quiz counts for 13/20of the final grade.