DLE Course-1: “Cyber Security”



Module Descriptor

Cyber Security -2019

Main goal of this course is to introduce the principles of Cyber Security. The main purpose of this course is to give a holistic view of the cyber security so that the student is better prepared moving forward with the rest of the more focused subjects.


  • Digital Certificate will be delivered to successful Candidates.
  • Top 10 performer will receive award 100 Euro each.

Learning Outcomes

Upon completion of this course, students will be able to do the followings:

LO1Communicate  knowledge  of  the  conceptsmodels  and  terms commonly used in the area of Cyber security.

LO2. Understand the basic concepts and scientific thinking in Cyber Security.

Learning Resources


  • Introduction to Cyber Security –  https://www.coursera.org/specializations/intro-cyber-security

Text Books:

  • Matt Bishop, Introduction to Computer Security, Addison Wesley, 2005
  • Charles P. Pfleeger, Shari Lawrence Pfleeger, Security in Computing, Prentice Hall, 2007
  • Introduction to Computer Security, Goodrich & Tamassia [G&T]
  • The Craft of System Security, Smith & Marchesini [Craft]

Other Resources:

  • Computer Systems Security- https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-858-computer-systems-security-fall-2014/
  • Network and Computer Security – https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-857-network-and-computer-security-spring-2014/



Syllabus/Lesson Plan


Week Topic(s)Hours
1Introduction to Cybersecurity
• Concept of Cyberspace, Cybercrime, Cyberwar and Cybersecurity
• Concept of Integrity, Confidentiality and Availability
• Other Cybersecurity functionalities
• The People Involved (Amateurs, Crackers, Criminals, Regular users)
• Cybersecurity protection methods (Cryptography Controls, Software and Hardware Controls, Laws and Policies, Physical Controls)
2Software Security
• Concept of Attack, Vulnerability, Control, Problems, Threat and Risks
• Categories of Attacks and Threats
• Security concern (Hardware, Software, Storage media, Data, Memory, People, Organizations, Communications)
• Software Vulnerabilities and Exploits
• Introduction to Malware
• Lifecycle of Virus and Bots
3Web Security
• Web Basics
• Security Requirements (Authenticity, Integrity, Confidentiality, Availability and non-repudiation)
• History of Web Security Protocols
• Overview of TLS Protocol
• Concept of Public key Infrastructure • Attacks on TLS
4Web Application Security
• Most Common Web Application Attacks
• OWASP Top 10
• Input Validation
• Authentication and Session Management
• Access Controls
• Injection
• Protection Methodologies
5Privacy in the Cyberspace
• Legal and Illegal Threats
• Recent Privacy Issues
• Tracking Problems
• Data Collection and Sharing
• Privacy Enhancement Tools
6Open Source Intelligence
• Concept of Open Source Intelligence
• Privacy in Social Networks
• Privacy in Cryptocurrencies
• Information Searching Tools
• Human Aspects
7Introduction to network security

• Basic Attack Types
• Authentication Methodologies and Protocols
• Types of Firewalls (packet filter, stateful and application level)
• Intrusion Detection and Prevention Systems
8Network Security Protocol and Standard
• DNSSec