Admission requirements
Admission only after intake, see website of the Cyber Security Academy.
Description
exploring what cyberspace entails: first explorations in conceptualising cyberspace, its working, cyber risks, and cyber security challenges
introduction to fundamental concepts that are central to understanding and reasoning about cyberspace, cyber security and related risks (with assignments)
learning by doing: practical demonstrations and exercises related to cyber attack and defense
lectures on the basic working and governance of ITC systems (including the Internet)
lectures and exercises on (cyber) risk management (assessment & mitigation) approaches
lectures “the human factor” of cyber security ((motives of the) people in the role of attacker, defender and that of end-user) Including: the rule of law; cyber economics; cyber terrorism; and organizing cyber security in organisations
critical infrastructures and critical information infrastructures and their interdependencies
In conclusion the course covers the following:
(common) conceptualisations of cyberspace, cyber risks, cyber security challenges
use a few basic intelligence, attack and defense tools in a lab environment
apply a chosen cyber risk assessment or mitigation approach onto a new case study
Course objectives
Participants have:
basic knowledge & understanding of what cyberspace entails (the world of "cyber activities"), the various sub-domains, the interwoven nature of virtual and real worlds (including cyber-physical systems), and related cyber security challenges
basic knowledge & understanding of how Internet works, the use and abuse of the Internet and the dependency on IT services in critical infrastructures, how society in all kinds of sub-domains has become (highly) dependent on IT services
basic knowledge of the governance of the Internet and involved stakeholders
Participants are able to:
identify various cyber risks (intentional and unintentional) and what impact they result into (e.g. legal, economical and, political impact)
(qualitatively) reason about the relations cyber threats-incidents-risks and possible counter measures to reduce existing cyber risks to accepted levels (bowtie thinking)
use a few basic intelligence, attack and defense tools in a lab environment (including the working of these tools and the possible consequences of their application)
apply a chosen cyber risk assessment or mitigation approach onto a new case study
Timetable
7 days from 9.30 until 17.00
Thursday February 1, 2018
Friday February 2, 2018
Friday February 9, 2018
Friday February 16, 2018
Friday February 23, 2018
Friday March 9, 2018
Friday March 16, 2018
Mode of instruction
Lectures, seminars, exercises, and class discussions.
Lecturers: Prof.dr. Jan van den Berg, Dr. Bibi van den Berg, Prof.dr. Dennis Broeders, Prof.dr. Michel van Eeten, Prof.dr. Edwin Bakker, and others
Course Load
5 EC
Assessment method
assignments (60%), written exam (40%)
No compensation is possible for assignments of 30% or more.
Blackboard
Yes, for posting slides of lectures, relevant literature and assignments
Reading list
Compulsory literature and literature for further consultation will be announced via Blackboard
Registration
No registration is required for lectures and exams.
Contact
Prof.dr. Jan van den Berg Drs. Mireille Snels, programme manager
Remarks
For more information see website of the Cyber Security Academy.