SECURITY ANALYSIS OF NETWORKED OBJECTS
YAROSLAV RABOVOLYUK
We offer innovative university degrees taught in English by industry leaders from around the world, aimed at giving our students meaningful and creatively satisfying top-level professional futures. We think the future is bright if you make it so.
Combinatorics and graph theory lay at the heart of discrete mathematics and computer science. In the course, we begin with a brief review of the fundamentals of combinatorics---counting, permutations, binomial coefficients, and the pigeonhole principle---and then devote most of the course to the fundamentals of graph theory. We cover the most common definitions and ideas of graph theory, proving important theorems and introducing important algorithms, but mostly aiming to simply establish the common language of discrete mathematics and computer science.
Yaroslav has more than 20 years of experience in the field of computer science. During his career he was in the roles of system administrator, software developer, system architect, and for the last 10 years, security researcher/analyst. Right now he is working as a CTO of his own company, focused mainly on cybersecurity, among other fields. Such experience allows him to orient his course on practical problems of the real world, keeping information up-to-date.
Research/Academic Interests:
Cybersecurity in general, Cryptography, Artificial intelligence, Data analysis.
• You will learn basic stages of security analysis and risk modelling
• You will learn to use many tools and techniques, not only for security, but for many other tasks as well
• You will get a chance to make some destructive actions in a controlled environment, this will gives you a better understanding of common attacks, their consequences and how to protect your system from them
• At the end of the course, you will have a solid background of practical knowledge about security
SKILLS:
- Information Security
- Unix
- Bash
- MySQL
- Shell Scripting
- Python
ABOUT YAROSLAV
HARBOUR.SPACE
WHAT YOU WILL LEARN
DATE: 29 Jan - 16 Feb, 2018
DURATION: 3 Weeks
LECTURES: 3 Hours per day
LANGUAGE: English
LOCATION: Barcelona, Harbour.Space Campus
COURSE TYPE: Offline
HARBOUR.SPACE UNIVERSITY
DATE: 29 Jan - 16 Feb, 2018
DURATION: 3 Weeks
LECTURES: 3 Hours per day
LANGUAGE: English
LOCATION: Barcelona, Harbour.Space Campus
COURSE TYPE: Offline
All rights reserved. 2018
COURSE OUTLINE
Session 1
Course introduction
Session 4
Web application security
General
Session 3
Security analysis
Active probe stage
Session 2
Security analysis: Recon stage
Assignment 1
BIBLIOGRAPHY
The module covers various techniques of network and application security analysis. Apart from the straightforward approach, when we try to achieve maximum security of our system, we will take an opposite route: learn how security problems can be identified and used by motivated people. During this course we will learn how to find and exploit common vulnerabilities, how model risks of networked applications work and use it to plan and prioritise our countermeasures. This course is very practice-oriented, all assignments are based on real-life scenarios, and all the techniques discussed may be used not only for security analysis, but to deal with many other problems.