• University of Global Village(UGV)
  • |
  • Iversity part of Springer Nature

Cybersecurity of Critical Infrastructures

Cybersecurity of Critical Infrastructures


Module II: Cyber Security for Critical Infrastructure.

Brief Course Contents:

After attending the course, the participants:

  • Security Administration & Planning.
  • Auditing.
  • Monitoring & Analysis.
  • Risk, Response & Recovery.
  • Control & Countermeasures
  • Security in Hardware Platforms
  • AI/ML in Cyber-Security
  • Legal Issues
  • Miscellaneous

Prerequisites:

•Module I: Networking for Cyber-Security

Or

Intermediate knowledge about networking and communication.

•Fundamental knowledge about various attacks and exploits.

•Cryptography .

Detailed Course Contents:

• Security Administration & Planning :

(a). Security Policies (b). Business Continuity Plan (BCP) (c). Business Impact Analysis (d). Disaster Recovery & Emergency Response Plans (e). Restoration Planning (f). Drills & Exercises (g). Alternative Locations

• Auditing:

(a). Audit Logs (b). Security Audits (c). Configuration Management (d). Change Management

•. Monitoring & Analysis :

(a). Intrusion Detection Systems (IDSs) (b). Intrusion Prevention System (c). Detection Methods (d). Analyzing Results (e). Security Information & Event Management (SIEM) (f). Vulnerability Assessments (g). Penetration Testing

• Risk, Response & Recovery :

(a). What is Risk? (b). Risk Model (c). Threat Sources & Events Identification (d). Understanding Vulnerabilities (e). Understanding Impact (f). Risk Management & Assessments (g). Responding (h). Containment, Eradication & Recovery (i). Aftermath

• Control & Countermeasures:

(a). Cost-Benefit Analysis (b). Security Controls Life Cycle (c). Control Goals (d). Different Classes of Controls (e). Some Basic Controls (f). Backups

• Security in Hardware Platforms:

(a). SoC Life Cycle (b). Hardware Trust vs Hardware Security (c). Hardware Attacks (d). Hardware Security Techniques

• AI/ML in Cyber-Security:

(a). Machine Learning Fundamentals (b). Applications in Cyber-Security

• Legal Issues:

(a). Computer Forensics (b). Phases of Computer Forensics Investigation (c). Guidelines & Principles for Forensic Evidence (d). Computer Abuse & Cyber Crime (e). Privacy Issues

• Miscellaneous :

(a). Social Engineering (b). Malware Identification (c). Methods for Malware Delivery (d). Countermeasures Overview (e). Antivirus (f). Signature Based Detection (g). Heuristic Based Detection (h). Staying Aware of Cyber Threats (i). Spam Filters (j). Content Filtering Appliances (k). Whitelisting & Blacklisting (l). Conducting Security Awareness & Training Exercises