Giter Site home page Giter Site logo

ccc's Introduction

Crime, Conflicts and Espionage in Cyberspace

CC BY-NC-SA 4.0

This is a short graduate course providing an introduction to the areas of crime, espionage and conflicts in cyberspace. The material is used for the "Cybercrime, Cyberespionage, and Cyberwar" course currently taught in the Master in Cybersecurity at UC3M.

The course provides a gentle, not very technical introduction to several contemporary security and privacy topics, including

  • some bits of history,
  • opponents and the current cyberthreat landscape,
  • the underground economy of cybercrime,
  • vulnerabilities, exploits and their markets,
  • privacy and surveillance --including commercial surveillance--, and
  • state-sponsored cyberoperations.

The main goal of the course is to provide students who approach cybersecurity with little-to-none previous backgound with a socio-techno-economic perspective of current security and privacy phenomena in the Internet, how we got here, and what might be done about it. The treatment of some topis might be too superficial for some audiences and a few key topics are certainly missing, but this is a short (6 weeks) course and there is no room for more. The material can be extended with some extra effort to make up for these limitations.

Contents of this Repository

For each topic (see the syllabus below), this repository contains a contents file providing:

  • a description of the contents covered in the topic,
  • a list of core readings,
  • a list of questions, problems, and learning activities, and
  • a list of supplementary readings for those who want to go a bit deeper into the subject.

There is also a set of slides used in class during the lectures.

Class recordings are not available yet.

Syllabus

Schedule and Assessment

The course is designed to be taught over a 6-week term, with two 1.5-hour sessions per week. Each module is covered in one week, plus time off class for self-study and work on assignments. The last week is used to review contents and explore other topics and directions from here.

The assessment activitites include:

  • Three quizzes spaced throughout the term (weeks 2, 4, and 6). All quizzes are closed book and closed notes. Access to the Internet via any device is not allowed. Grading: 20% each.
  • A workbook handed in the last day with solutions to 4 activities chosen from those available across all modules. Grading: 40%
Week Module Assessment activitities
1 Hostilities in Cyberspace
2 Cybercrime and its Underground Economy Quizz 1 (Module 1)
3 Vulnerabilities, Exploits, and their Market
4 Privacy and Surveillance Quizz 2 (Modules 2 and 3)
5 Cyberoperations
6 Course Wrap Up Quizz 3 (Modules 4 and 5)
Workbook

License

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

CC BY-NC-SA 4.0

Contact

Feedback is welcome. Please contact me for any comments, questions or suggestions on this material.

ccc's People

Contributors

0xjet avatar luismerino avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.