CYBER SECURITY SPECIALIZATION. Dr. Andreas Peter Services, Cyber Security, and Safety Group

Similar documents
Certified Cyber Security Analyst VS-1160

Research Topics in the National Cyber Security Research Agenda

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Unit 3 Cyber security

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Computer Security and Investigations

FORBIDDEN - Ethical Hacking Workshop Duration

EIT ICT Labs MASTER SCHOOL. Specialisations

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

UCL MSc in Information Security. Dr Emiliano De Cristofaro MSc Course Director 2015/16

A Systems Engineering Approach to Developing Cyber Security Professionals

SICSA* Scottish Informatics and Computer Science Alliance. Cyber Security in Scottish Universities

Loophole+ with Ethical Hacking and Penetration Testing

What is Really Needed to Secure the Internet of Things?

ATTPS Publication: Trustworthy ICT Taxonomy

Security + Certification (ITSY 1076) Syllabus

Bellevue University Cybersecurity Programs & Courses

The Next Generation of Security Leaders

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Microsoft s cybersecurity commitment

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Computer Forensics introduction part A

I m visualizing large datasets to generate

How To Become A Computer Scientist

Minnesota State Community and Technical College Detroit Lakes Campus

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

Detailed Description about course module wise:

Common Data Breach Threats Facing Financial Institutions

The Information Security Problem

Challenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG All rights reserved

Project 2020: Preparing Your Organization for Future Cyber Threats Today

NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS. Division: Applied Science (AS) Liberal Arts (LA) Workforce Development (WD)

Transfer Course Conversion to Columbia College Equivalencies

CYBERTRON NETWORK SOLUTIONS

Master s Programme in ICT Innovation

MSc Cyber Security UKPASS P Course 1 Year Full-Time, 2-3 Years Part-Time

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

USF Graduate Catalog SECTION 23.

CYBER SECURITY TRAINING SAFE AND SECURE

Master of Science in Information Systems & Security Management. Courses Descriptions

Certified Secure Computer User

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop.

Security & SMEs. An Introduction by Jan Gessin. Introduction to the problem

Introduction to Cyber Security / Information Security

A Cyber Security Integrator s perspective and approach

Hackers are here. Where are you?

Jort Kollerie SonicWALL

PRESENTATION TO THE UNIVERSITY SYSTEM OF MARYLAND S BOARD OF REGENTS

Technology Crime Services

Korea s experience of massive DDoS attacks from Botnet

Introduction to MSc Program in Operations Management & Logistics

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

Computer Information Science xxx

Hackers are here. Where are you?

Web Application Attacks and Countermeasures: Case Studies from Financial Systems

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

Department of Information Systems and Cyber Security

Certified Cyber Security Analyst VS-1160

Cyber Security and Privacy

Student Tech Security Training. ITS Security Office

EC-Council. Program Brochure. EC-Council. Page 1

INFORMATION SECURITY FOR YOUR AGENCY

KEY STEPS FOLLOWING A DATA BREACH

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Welcome to Distributed Systems Engineering

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

Collateral Effects of Cyberwar

Appendix 2: Intended learning outcomes of the Bachelor IBA

Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective

Cybersecurity: Thailand s and ASEAN s priorities. Soranun Jiwasurat

3 day Workshop on Cyber Security & Ethical Hacking

Computer Security Literacy

ICT Barriers, High Tech Crime, and Police

Transcription:

1 CYBER SECURITY SPECIALIZATION Dr. Andreas Peter Services, Cyber Security, and Safety Group

2 CYBER SECURITY Why Cyber Security? Our world increasingly becomes digital and connected Cyber Security is BIG news: check the papers today Cyber Security is a BIG issue: 10% of our PCs are hijacked Cyber Security is BIG business: Patch Tuesday Graduates are in high demand!

3 CYBER SECURITY Two Choices 3TU Cyber Security Specialization - High Tech, Human Touch : Cyber Security Technology in context: Social, Psychological, Economical, and Legal - Industrial integration: courses, summer school, (optional) internships EIT ICT Labs 1 Master on Security & Privacy - Double Degree (1 st or 2 nd year at an EU partner university) - 1 st year: technical basics, 2 nd year: specialization - Innovation & Entrepreneurship (I&E) basics 1 European Institute of Innovation & Technology

4 3TU CYBER SECURITY SPECIALIZATION Cyber Security (Overview) Assessment of cyber risks and the design & implementation of countermeasures Three important Cyber Security measures Prevention: for example using firewalls and awareness campaigns Detection: for example using intrusion detection tools and data analytics Recovery: for example using incident response methods and backups Cyber risk management: balancing the three measures to reach states of acceptable risk levels in various cyber domains. Multidisciplinary Computer science core: for example cryptography, formal methods, secure software engineering, and machine learning Supporting disciplines: for example law, economics, criminology, management, and psychology

5 3TU CYBER SECURITY SPECIALIZATION Example (technical): Cyber Attacks What are cyber attacks and how do they work (e.g., hacking)? How can we prevent (e.g., firewalls), detect (e.g., data analytics), and recover from (e.g., backups) such attacks?

6 3TU CYBER SECURITY SPECIALIZATION Example (technical): Cyber Attacks Attackers become more and more powerful, e.g., governments! Edward Snowden

7 3TU CYBER SECURITY SPECIALIZATION Example (socio-technical): Phishing What is phishing and how does it work (e.g., persuasion techniques)? How can we protect against it (e.g., awareness campaigns)?

8 3TU CYBER SECURITY SPECIALIZATION Example (socio-technical): Phishing Bank Percentage of Phishing ING 41% Rabobank 26% SNS 21% ABN Amro 8% PayPal 4% Targeted phishing on banks as reported to Fraudehelpdesk.nl. In total (Oct 2014): 8850 Phishing becomes more and more sophisticated, e.g., targeted attacks!

9 3TU CYBER SECURITY SPECIALIZATION Combines Cyber Security expertise of the 3 TUs Basic (core) courses (5 EC each, [TL] = tele-lectured) UT Network Security [TL] Cybercrime Science [TL] Computer Ethics Machine Learning Joint elective courses (5 EC each, all tele-lectured [TL]): Biometrics Secure Data Management Privacy-Enhancing Technologies TUD [TL] Security and Cryptography [TL] Software Security (TU/e) [TL] Cyber Risk Management [TL] Cyber Data Analytics Economics of Security Principles of Data Protection (TU/e) Software Testing and Reverse Engineering Local elective courses (5 EC each): Cyber Security Management [TL] Security Verification [TL] ES and SCADA Security and Survivability [TL] E-Law [TL] Quantum Cryptography Applied Security Analysis Hacking Lab Off-site Summer School (1.5 EC) where students solve a real cyber security problem Required is a minimum of 20 EC of core courses + Computer Ethics (5 EC)! Otherwise, free choices! Courses that are not listed can also be attended ( program mentor)

10 3TU CYBER SECURITY SPECIALIZATION Sample Timetable Year 1 (60 EC) Year 2 (60 EC) Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Cyber Risk Management Security and Cryptography Machine Learning Software Security Computer Ethics Cyber Security Management Cyber Crime Science Network Security Principles of Data Protection Cyber Data Analytics Privacy Enhancing Technologies E-Law Integration Week (1.5 EC) Economics of Security Secure Data Management Embedded System and SCADA Security and Survivability Introduction to Biometrics Research Topics Paper (10 EC) Final Degree Project (30 EC) Individual timetables ( program mentor: Pieter Hartel) Individual Final Degree Projects (socio-/purely technical, optional internship) Students can start in September or in February Bold = core course Italic = socio-technical

11 EIT ICT LABS SECURITY & PRIVACY MASTER Overview Double Degree Master (1 st or 2 nd year at an EU partner university) Entry year: technical basics; exit year: specialization Innovation & Entrepreneurship (I&E) basics Mandatory Internship Partner Universities Entry + Exit: Cyber Security: High Tech, Human Touch Applied Security Exit Only: System Security Information Security and Privacy Advanced Cryptography

12 EIT ICT LABS SECURITY & PRIVACY MASTER Entry Year Mandatory courses (5 EC each) Network Security Security and Cryptography Privacy Enhancing Technologies I&E Business Development Lab (7 EC) Software Security Cyber Risk Management I&E High Tech Marketing Elective courses (5 EC each): Biometrics Secure Data Management Cyber Security Management Security Verification ES and SCADA Security and Survivability Applied Security Analysis Hacking Lab Summer School on Security & Privacy after 1 st year (3-6 EC) Exit Year (Specialization: Cyber Security High Tech, Human Touch) Mandatory courses (5 EC each) Embedded System and SCADA Security and Survivability Computer Ethics Elective courses (5 EC each): Economics of Security Principles of Data Protection Software Testing and Reverse Engineering Quantum Cryptography E-Law Cyber Data Analytics Biometrics Secure Data Management Cyber Security Management Security Verification

13 EIT ICT LABS SECURITY & PRIVACY MASTER Sample Timetable (1 st year OR 2 nd year at UT) Year 1 (60 EC) Year 2 (60 EC) EIT Summer School Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Cyber Risk Management Security and Cryptography I&E High Tech Marketing Software Security I&E Business Dev Lab (7 EC) Embedded System and SCADA Security and Survivability Network Security Cyber Crime Science Principles of Data Protection Privacy Enhancing Technologies E-Law (3-6 EC) Economics of Security Secure Data Management Embedded System and SCADA Security and Survivability Computer Ethics Research Topics + I&E Minor Thesis (10 EC) Final Degree Project (30 EC) Mandatory Internship Individual timetables ( program mentor: Pieter Hartel) ( program coordinator: Andreas Peter) Individual Final Degree Projects (socio-/purely technical) Bold = mandatory Italic = I&E part

14 FINAL DEGREE PROJECTS Examples (technical): C&C botnet detection over SSL (at Security Matters) Drone Security (at KPMG) Detecting botnets using file system indicators (at NHTCU of Dutch police) Examples (socio-technical): The Impact of Cyber Security on SMEs (at Bicore) Secure and privacy-preserving national eid systems with Attribute-based credential technologies (at NXP) Cognitive Cryptography: Planting a Password into a Person s Brain without Him Having Any Conscious Knowledge of the Password (local)

15 CYBER SECURITY GRADUATES Typical job titles of graduates would be: Computer and network security specialist Developer Digital expert police Entrepreneur and security consultant Entrepreneur and developer Ethical hacker Information security advisor Lead engineer Management consultant PhD student Researcher IT-innovations Security & privacy consultant Security analyst Senior analyst and test consultant Software engineer Teacher Technical consultant

16 SECURITY MASTER Interested? http://www.utwente.nl/en/education/master/ 3TU Cyber Security Specialization http://www.3tu.nl/cybsec/en/course-program/ EIT ICT Labs Master on Security & Privacy http://www.masterschool.eitictlabs.eu/programmes/sap/