This is a short graduate course providing an introduction to the areas of crime, espionage and conflicts in cyberspace. The material is used for the “Cybercrime, Cyberespionage, and Cyberwar” course currently taught in the Master in Cybersecurity at UC3M.
The course provides a gentle, not very technical introduction to several contemporary security and privacy topics, including
The main goal of the course is to provide students who approach cybersecurity with little-to-none previous backgound with a socio-techno-economic perspective of current security and privacy phenomena in the Internet, how we got here, and what might be done about it.
The treatment of some topis might be too superficial for some audiences and a few key topics are certainly missing, but this is a short (6 weeks) course and there is no room for more.
The material can be extended with some extra effort to make up for these limitations.
For each topic (see the syllabus below), this repository contains a contents file providing:
There is also a set of slides used in class during the lectures.
Class recordings are not available yet.
The course is designed to be taught over a 6-week term, with two 1.5-hour sessions per week.
Each module is covered in one week, plus time off class for self-study and work on assignments.
The last week is used to review contents and explore other topics and directions from here.
The assessment activitites include:
Week | Module | Assessment activitities |
---|---|---|
1 | Hostilities in Cyberspace | |
2 | Cybercrime and its Underground Economy (I) | |
3 | Cybercrime and its Underground Economy (II) | Quizz 1 (Modules 1 and 2) |
4 | Vulnerabilities, Exploits, and their Market | |
5 | Privacy and Surveillance | |
6 | Course Wrap Up | Quizz 2 (Modules 3 and 4) Workbook |
Kali Linux 2024.4, the final release of 2024, brings a wide range of updates and…
This Go program applies a lifetime patch to PowerShell to disable ETW (Event Tracing for…
GPOHunter is a comprehensive tool designed to analyze and identify security misconfigurations in Active Directory…
Across small-to-medium enterprises (SMEs) and managed service providers (MSPs), the top priority for cybersecurity leaders…
The free and open-source security platform SecHub, provides a central API to test software with…
Don't worry if there are any bugs in the tool, we will try to fix…