Master's in Cybersecurity: Practical Network Defense
36 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is one of the skills that students will acquire after completing this course?

  • Ability to develop network attacks
  • Ability to implement network hardening
  • Ability to prepare presentations related to specific scientific topics (correct)
  • Ability to develop network traffic analysis software
  • What is a topic covered in this course?

  • Database management
  • Artificial intelligence
  • Network monitoring (correct)
  • Cloud computing
  • What is NOT a part of the assignments in this course?

  • Writing a research paper (correct)
  • Implementing a network defense system
  • Developing a network policy
  • Reporting on the implementation
  • What is the purpose of the assignments in this course?

    <p>To fulfill a pre-requisite for accessing the written exam</p> Signup and view all the answers

    What is a type of network defense topic covered in this course?

    <p>Perimeter networks (DMZs)/Proxy Servers</p> Signup and view all the answers

    What is the structure of the classes in this course?

    <p>Theoretical concepts presented mainly during classroom hours, practical activity during lab hours</p> Signup and view all the answers

    What is the main objective of the Hack the Box website?

    <p>To offer Capture the Flag (CTF) challenges and cybersecurity exercises</p> Signup and view all the answers

    What should you do if you can't understand some self-assessment questions?

    <p>Check your prerequisites</p> Signup and view all the answers

    How do you enroll in the Hack the Box team?

    <p>Register on the website and join the Telegram group</p> Signup and view all the answers

    What is the purpose of the self-assessment?

    <p>To evaluate your understanding of the course material</p> Signup and view all the answers

    Who can contribute to the suggested resources for the course?

    <p>Any student in the class</p> Signup and view all the answers

    What is the purpose of the 'Hack the Box' Telegram group?

    <p>To collaborate on CTF challenges</p> Signup and view all the answers

    What can you do if you understand the self-assessment questions but can't remember the answers?

    <p>Check your notes and textbook</p> Signup and view all the answers

    What is the feedback policy for the course?

    <p>Feedback is always welcome</p> Signup and view all the answers

    What is the primary focus of the Practical Network Defense course?

    <p>Practical application of computer network security concepts</p> Signup and view all the answers

    What is one of the main objectives of the course?

    <p>To apply a security policy</p> Signup and view all the answers

    What is one of the skills that students will develop in the course?

    <p>Selecting the appropriate firewall rules to protect a network</p> Signup and view all the answers

    What is the lecturer's primary area of research interest?

    <p>Computer network security</p> Signup and view all the answers

    What is the code to join the class in Google Classroom?

    <p>mumait2</p> Signup and view all the answers

    What is the schedule for the course on Thursdays?

    <p>12-15, Tiburtina Labs (lab XV)</p> Signup and view all the answers

    What is the total number of CFUs for the course?

    <p>6 CFUs</p> Signup and view all the answers

    What is one of the abilities that students will develop in the course?

    <p>Making the most appropriate design choices to implement a 'defense in depth' strategy</p> Signup and view all the answers

    What is the framework used for experimenting computer networking in the lab activities?

    <p>Kathará (formerly known as netkit)</p> Signup and view all the answers

    What is required to be done before attending the lab activities?

    <p>Download the virtual machine</p> Signup and view all the answers

    What is the minimum number of mandatory assignments required to pass the exam?

    <p>3</p> Signup and view all the answers

    What is the purpose of the assignments in the course?

    <p>To apply techniques and tools introduced during the classes</p> Signup and view all the answers

    What is the maximum increment to the final grade of the written exam that can be achieved through assignments?

    <p>+3 points</p> Signup and view all the answers

    What is the validity period of a written exam?

    <p>1 year</p> Signup and view all the answers

    What is the optional exam format for students with a written exam >= 27?

    <p>Oral exam</p> Signup and view all the answers

    What is the main textbook used in the course?

    <p>Introduction to Computer Networks and Cybersecurity</p> Signup and view all the answers

    What is the expected outcome of completing the course?

    <p>To fill the gap in knowledge and catch up</p> Signup and view all the answers

    What is the purpose of the self-assessment exercises?

    <p>To familiarize students with Linux CLI and tools</p> Signup and view all the answers

    What is the recommended approach to the course?

    <p>Don't get discouraged and try to fill the gap in knowledge</p> Signup and view all the answers

    What is the purpose of the bonus reference to http://overthewire.org/wargames/bandit/bandit0.html?

    <p>To help students learn Linux CLI and tools</p> Signup and view all the answers

    What is the recommended goal for students using the bonus reference?

    <p>To learn as much as possible from each level</p> Signup and view all the answers

    What is the significance of taking notes while using the bonus reference?

    <p>Taking notes helps students remember passwords and how they were obtained</p> Signup and view all the answers

    Study Notes

    Course Introduction

    • The course is Practical Network Defense, a part of the Master's degree in Cybersecurity at Sapienza Università di Roma, academic year 2023-24.
    • The lecturer is Angelo Spognardi, an associate professor at the Department of Informatics (Dipartimento di Informatica).
    • The lecturer's contact information: tel: 06 4925 5164, email: [email protected], and website: https://angelospognardi.site.uniroma1.it.

    Practical Info

    • Student hours are available on request by email, and meetings will be held in the lecturer's office (G29, v.le Regina Elena, 295, Edificio G).
    • Research interests of the lecturer include computer network security, security in social networks, ML and AI in cybersecurity, privacy, applied cryptography, operating systems, and programming.

    Course Website and Schedule

    • The course website is https://sites.google.com/di.uniroma1.it/practical-network-defense.
    • The course has 6 CFUs, and students are required to join the class in Google Classroom using the code "mumait2" and their @studenti.uniroma1.it account.
    • The schedule includes Thursday classes from 12-15 pm at Tiburtina Labs (lab XV) and Friday classes from 11-13 am at Aula 3, v.le Castro Laurenziano 7a.

    Objectives

    • The course aims to teach students methods and tools for protecting computer networks.
    • Students will learn to apply practical concepts, including protocols in networked computer systems, security mechanisms, and intrusion detection.
    • By the end of the course, students will be able to monitor traffic, apply security policies, perform network scans, and select appropriate firewall rules and protection mechanisms.

    Topics Covered

    • Network monitoring and traffic analysis
    • Network attacks (e.g., session hijacking, man-in-the-middle)
    • Minimizing exposure (attack surface and vectors)
    • Network hardening and policy development
    • Defense in depth and perimeter networks (DMZs)/Proxy Servers
    • Implementing firewalls and virtual private networks (VPNs)
    • Implementing IDS/IPS and network access control

    Class Structure and Assignments

    • Theoretical concepts will be presented in classroom hours, with practical activities during lab hours.
    • Some topics will have assignments with two parts: an implementing part in the virtual lab environment and a reporting part.
    • Assignments are part of the exam and are a prerequisite for accessing the written exam.

    Tools and Resources

    • The course will use Kathará (formerly known as netkit), a container-based framework for experimenting with computer networking.
    • A virtual machine will be provided for students, and access to the virtual infrastructure (ACME co.) will be granted.
    • Recommended textbooks include "Introduction to Computer Networks and Cybersecurity" by Chwan-Hwa (John) Wu and J.David Irwin.

    Exam and Assessment

    • The exam consists of 3/4 mandatory assignments and a full written exam.
    • Optional oral exams are available for students with a written exam score of 27 or higher.
    • Assignments are evaluated as A, B, or C, and provide an increment to the final grade of the written exam (up to +3 points).

    Feedback and Self-Assessment

    • Feedback is always welcome, and students are encouraged to share suggestions and resources.
    • Self-assessment questions are provided to help students identify areas where they need to improve.
    • The self-assessment questions cover topics such as Linux, network security, and cryptography.

    Bonus Reference

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Course introduction to Practical Network Defense for Master's degree students in Cybersecurity (2023-2024) at Sapienza Università di Roma.

    More Like This

    Use Quizgecko on...
    Browser
    Browser