SUBMIT
CRITICAL INFORMATION
INFRASTRUCTURE CYBER 
RESILIENCE
SERGEY 
GORDEYCHIK

We offer innovative university degrees taught in English by industry leaders from around the world, aimed at giving our students meaningful and creatively satisfying top-level professional futures. We think the future is bright if you make it so.

Combinatorics and graph theory lay at the heart of discrete mathematics and computer science. In the course, we begin with a brief review of the fundamentals of combinatorics---counting, permutations, binomial coefficients, and the pigeonhole principle---and then devote most of the course to the fundamentals of graph theory. We cover the most common definitions and ideas of graph theory, proving important theorems and introducing important algorithms, but mostly aiming to simply establish the common language of discrete mathematics and computer science.

Sergey Gordeychik is Product Director for Cyber Network Defense at DarkMatter. Before moving to DarkMatter, Sergey gained a wealth of practical experience in the cybersecurity industry. In particular, being Deputy CTO at Kaspersky Lab he was responsible for establishing the vision and leading the technological development for threat intelligence, cyber threat hunting, security assessment, incident response and vulnerability research. As CTO at Positive Technologies he led the development of Gartner recognized enterprise security products such as MaxPatorl, PT Application Inspector and PT Application Firewall.

Sergey is director and script writer of Positive Hack Days Forum, largest and most influent cybersecurity event in Eastern Europe. From 2012 he is leading SCADA StrangeLove industrial cybersecurity research team.  Sergey has developed a number of training courses, including "Wireless Networks Security" and "Security Assessment of Web Applications," published several dozens of articles in various titles and a book called "Wireless Networks Security".

He is a popular speaker on internationals security conferences such as S4, CCC, CodeBlue, Area41, POC, Zeronighs. MCSE since NT 4.0, MCT, MVP: Enterprise Security R & D, CWNA, CISSP.

An understanding of Critical Information Infrastructure components, purposes, deployments, significant drivers, 
and constraints

• An understanding threats and vulnerabilities in Critical Information Infrastructure

• Practical experience in security assessment and incident response in financial, telecom and industrial environment

• Industrial-specific governance, risk assessment and compliance models

SKILLS:

- Information Security

- Penetration Testing

- Vulnerability Management

- Vulnerability Assessment

- Web Application Security 

- PCI DSS


ABOUT SERGEY
HARBOUR.SPACE 
WHAT YOU WILL LEARN
RESERVE MY SPOT

DATE: 9 - 27 Jul, 2018 

DURATION: 3 Weeks

LECTURES: 3 Hours per day

LANGUAGE: English

LOCATION: Barcelona, Harbour.Space Campus

COURSE TYPE: Offline

HARBOUR.SPACE UNIVERSITY

RESERVE MY SPOT

DATE: 9 Jul - 27 Jul, 2018

DURATION: 3 Weeks

LECTURES: 3 Hours per day

LANGUAGE: English

LOCATION: Barcelona, Harbour.Space Campus

COURSE TYPE: Offline

All rights reserved. 2018

Harbour.Space University
Tech Heart
COURSE OUTLINE
SHOW MORE

Session 1

Critical Information Infrastructure
Cyber Resilience

 What is Critical Information Infrastructure?
 Regulatory compliance (EU)
 Overview of state-level Cyber Resilience and  Critical Information Infrastructure
Protection initiatives

Session 4

Mobile terminals

• Baseband, phones
• Modems, Femtocell, SIM cards
• Security assessment and intrusion detection

Session 3

Telecom Signaling

• SS7, Diameter
• Signaling attacks

Session 2

Telecommunications

 Telecom network internals
 Network security issues
 SDN and SD WAN security
 Cases and incidents

CRITICAL INFORMATION
INFRASTRUCTURE CYBER RESILIENCE

BIBLIOGRAPHY

The module covers various aspects of cybersecurity and cyber resilience of mobile and telecommunication networks, financial institutions and industrial systems.

During this course we will learn cybersecurity in various aspects: from analyzing risks and the requirements of international and industry standards to vulnerability research in incident response in ICS/SCADA, ATM and SS7 telecom networks.

The course is delivered by an expert who have a wealth of practical experience and member of the SCADA StrangeLove team who have participated in dozens of security assessment and incident response projects devoted to analyzing the security of systems in various sectors of the industry.

The module covers various aspects of cybersecurity and cyber resilience of mobile and telecommunication networks, financial institutions and industrial systems.

During this course we will learn cybersecurity in various aspects: from analyzing risks and the requirements of international and industry standards to vulnerability research in incident response in ICS/SCADA, ATM and SS7 telecom networks.

The course is delivered by an expert who have a wealth of practical experience and member of the SCADA StrangeLove team who have participated in dozens of security assessment and incident response projects devoted to analyzing the security of systems in various, 

sectors of the industry. 

Fix the following errors:
Hide