Cyber security

CCC : Cyberspace Under Siege – Understanding Crime, Espionage, And Conflict

This is a short graduate course providing an introduction to the areas of crime, espionage and conflicts in cyberspace. The material is used for the “Cybercrime, Cyberespionage, and Cyberwar” course currently taught in the Master in Cybersecurity at UC3M.

The course provides a gentle, not very technical introduction to several contemporary security and privacy topics, including

  • some bits of history,
  • opponents and the current cyberthreat landscape,
  • the underground economy of cybercrime,
  • vulnerabilities, exploits and their markets, and
  • privacy and surveillance –including commercial surveillance–, and
  • state-sponsored cyberoperations.

The main goal of the course is to provide students who approach cybersecurity with little-to-none previous backgound with a socio-techno-economic perspective of current security and privacy phenomena in the Internet, how we got here, and what might be done about it.

The treatment of some topis might be too superficial for some audiences and a few key topics are certainly missing, but this is a short (6 weeks) course and there is no room for more.

The material can be extended with some extra effort to make up for these limitations.

Contents Of This Repository

For each topic (see the syllabus below), this repository contains a contents file providing:

  • a description of the contents covered in the topic,
  • a list of core readings,
  • a list of questions, problems, and learning activities, and
  • a list of supplementary readings for those who want to go a bit deeper into the subject.

There is also a set of slides used in class during the lectures.

Class recordings are not available yet.

Syllabus

Schedule And Assessment

The course is designed to be taught over a 6-week term, with two 1.5-hour sessions per week.

Each module is covered in one week, plus time off class for self-study and work on assignments.

The last week is used to review contents and explore other topics and directions from here.

The assessment activitites include:

  • Two quizzes spaced throughout the term (weeks 3 and 6). All quizzes are closed book and closed notes. Access to the Internet via any device is not allowed. Grading: 20% each.
  • A workbook handed in the last day with solutions to 4 activities chosen from those available across all modules. Grading: 40%
WeekModuleAssessment activitities
1Hostilities in Cyberspace
2Cybercrime and its Underground Economy (I)
3Cybercrime and its Underground Economy (II)Quizz 1 (Modules 1 and 2)
4Vulnerabilities, Exploits, and their Market
5Privacy and Surveillance
6Course Wrap UpQuizz 2 (Modules 3 and 4)
Workbook
Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

Starship : Revolutionizing Terminal Experiences Across Shells

Starship is a powerful, minimal, and highly customizable cross-shell prompt designed to enhance the terminal…

16 hours ago

Lemmy : A Decentralized Link Aggregator And Forum For The Fediverse

Lemmy is an innovative, open-source platform designed for link aggregation and discussion, providing a decentralized…

16 hours ago

Massive UX Improvements, Custom Disassemblers, And MSVC Support In ImHex v1.37.0

The latest release of ImHex v1.37.0 introduces a host of exciting features and improvements, enhancing…

18 hours ago

Ghauri : A Powerful SQL Injection Detection And Exploitation Tool

Ghauri is a cutting-edge, cross-platform tool designed to automate the detection and exploitation of SQL…

21 hours ago

Writing Tools : Revolutionizing The Art Of Writing

Writing tools have become indispensable for individuals looking to enhance their writing efficiency, accuracy, and…

21 hours ago

PatchWerk : A Tool For Cleaning NTDLL Syscall Stubs

PatchWerk is a proof-of-concept (PoC) tool designed to clean NTDLL syscall stubs by patching syscall…

2 days ago