This course provides an overview of the evolving field of cybersecurity, with an introduction to cybersecurity standards and law.
El curso pretende alcanzar los siguientes objetivos:
- Realizar una aproximación general al concepto, la historia y los tipos de redes sociales que existen.
- Aproximación jurídica al concepto de red social y las complejidades que la normativa actual plantea ante los retos de los usuarios en las redes sociales.
- Familiarizar al usuario acerca del concepto de privacidad y como manejar la misma en las principales redes sociales.
- Familiarizar al usuario con el concepto de propiedad intelectual, así como con los márgenes y límites a su ejercicio.
Learn about the inner workings of cryptographic primitives and how to apply this knowledge in real-world applications!
The Internet is a computer network that millions of people use every day. Understand the design strategies used to solve computer networking problems while you learn how the Internet works.
This course provides you with opportunities to integrate and apply your information security knowledge.
Learn to defend and protect vital company information using the latest technology and defense strategies. Analyze internal and external threats to proactively prevent information attacks. Gain experience by solving real-world problems and leave the class equipped to establish and oversee information security.
Wild, wild web: Is the Internet a lawless no man’s land? Based on the recent public debate on data protection and massive privacy infringements, this course will explore the connection between cyber security and international human rights.
In this course, you'll learn what every citizen should know about the security risks--and future potential — of electronic voting and Internet voting.
What is the Internet? How was it created? How does it work?
Learn about traditional and mobile malware, the security threats they represent, state-of-the-art analysis and detection techniques, and the underground ecosystem that drives such a profitable but illegal business.
A survey of more advanced stack-based memory corruption bugs (e.g. stack overflow), and how they lead to conditions that allow attackers to execute arbitrary code. The class also covers exploit mitigation technologies found in Microsoft Windows and how attackers bypass these techniques.
This class discusses stealth malware techniques used on Windows. Rootkits are a type of stealth malware that try to hide their presence, and this class shows the data structures they manipulate to achieve this.
An introduction to Trusted Computing concepts, and a detailed look at what the Trusted Platform Module (TPM) can (and can't) do.
This class provides a distilled understanding of some OS mechanisms such as memory management, segmentation, paging, interrupts, and port IO. This knowledge is directly relevant for the future Rootkits and Advanced x86: Virtualization with Intel VT-x classes.
Intel processors have been a major force in personal computing for more than 30 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation.
This class provides an introduction to the ARM architecture and assembly language.
A survey of basic stack and heap-based memory corruption bugs (e.g. stack overflow), and how they lead to conditions that allow attackers to execute arbitrary code.
A very detailed dive into how binary executable formats work. In particular the PE format used by Windows.
A class on general reverse engineering methodology, applicable to malicious and non-malicious programs. Heavily focuses on the use of IDA Pro for aiding reverse engineering.