SECURITY ANALYSIS OF
NETWORKED OBJECTS 
YAROSLAV
RABOVOLYUK

We offer innovative university degrees taught in English by industry leaders from around the world, aimed at giving our students meaningful and creatively satisfying top-level professional futures. We think the future is bright if you make it so.

Combinatorics and graph theory lay at the heart of discrete mathematics and computer science. In the course, we begin with a brief review of the fundamentals of combinatorics---counting, permutations, binomial coefficients, and the pigeonhole principle---and then devote most of the course to the fundamentals of graph theory. We cover the most common definitions and ideas of graph theory, proving important theorems and introducing important algorithms, but mostly aiming to simply establish the common language of discrete mathematics and computer science.

Yaroslav has more than 20 years of experience in the field of computer science. During his career he was in the roles of system administrator, software developer, system architect, and for the last 10 years, security researcher/analyst. Right now he is working as a CTO of his own company, focused mainly on cybersecurity, among other fields. Such experience allows him to orient his course on practical problems of the real world, keeping information up-to-date.

Research/Academic Interests:
Cybersecurity in general, Cryptography, Artificial intelligence, Data analysis.

• You will learn basic stages of security analysis and risk modelling

• You will learn to use many tools and techniques, not only for security, but for many other tasks as well

• You will get a chance to make some destructive actions in a controlled environment, this will gives you a better understanding of common attacks, their consequences and how to protect your system from them

• At the end of the course, you will have a solid background of practical knowledge about security

SKILLS:

- Information Security

- Unix

- Bash

- MySQL

- Shell Scripting

- Python

ABOUT YAROSLAV
HARBOUR.SPACE 
WHAT YOU WILL LEARN
RESERVE MY SPOT

DATE: 29 Jan - 16 Feb, 2018 

DURATION: 3 Weeks

LECTURES: 3 Hours per day

LANGUAGE: English

LOCATION: Barcelona, Harbour.Space Campus

COURSE TYPE: Offline

HARBOUR.SPACE UNIVERSITY

RESERVE MY SPOT

DATE:  29 Jan - 16 Feb, 2018

DURATION: 3 Weeks

LECTURES: 3 Hours per day

LANGUAGE: English

LOCATION: Barcelona, Harbour.Space Campus

COURSE TYPE: Offline

All rights reserved. 2018

Harbour.Space University
Tech Heart
COURSE OUTLINE
SHOW MORE

Session 1

Course introduction

Session 4

Web application security

General

Session 3

Security analysis

Active probe stage

Session 2

Security analysis: Recon stage

 Assignment 1

SECURITY ANALYSIS OF
NETWORKED OBJECTS 

BIBLIOGRAPHY

The module covers various techniques of network and application security analysis. Apart from the straightforward approach, when we try to achieve maximum security of our system, we will take an opposite route: learn how security problems can be identified and used by motivated people. During this course we will learn how to find and exploit common vulnerabilities, how model risks of networked applications work and use it to plan and prioritise our countermeasures. This course is very practice-oriented, all assignments are based on real-life scenarios, and all the techniques discussed may be used not only for security analysis, but to deal with many other problems.