Master's in Cybersecurity: Practical Network Defense
36 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is one of the skills that students will acquire after completing this course?

  • Ability to develop network attacks
  • Ability to implement network hardening
  • Ability to prepare presentations related to specific scientific topics (correct)
  • Ability to develop network traffic analysis software

What is a topic covered in this course?

  • Database management
  • Artificial intelligence
  • Network monitoring (correct)
  • Cloud computing

What is NOT a part of the assignments in this course?

  • Writing a research paper (correct)
  • Implementing a network defense system
  • Developing a network policy
  • Reporting on the implementation

What is the purpose of the assignments in this course?

<p>To fulfill a pre-requisite for accessing the written exam (B)</p> Signup and view all the answers

What is a type of network defense topic covered in this course?

<p>Perimeter networks (DMZs)/Proxy Servers (C)</p> Signup and view all the answers

What is the structure of the classes in this course?

<p>Theoretical concepts presented mainly during classroom hours, practical activity during lab hours (B)</p> Signup and view all the answers

What is the main objective of the Hack the Box website?

<p>To offer Capture the Flag (CTF) challenges and cybersecurity exercises (C)</p> Signup and view all the answers

What should you do if you can't understand some self-assessment questions?

<p>Check your prerequisites (A)</p> Signup and view all the answers

How do you enroll in the Hack the Box team?

<p>Register on the website and join the Telegram group (B)</p> Signup and view all the answers

What is the purpose of the self-assessment?

<p>To evaluate your understanding of the course material (D)</p> Signup and view all the answers

Who can contribute to the suggested resources for the course?

<p>Any student in the class (B)</p> Signup and view all the answers

What is the purpose of the 'Hack the Box' Telegram group?

<p>To collaborate on CTF challenges (A)</p> Signup and view all the answers

What can you do if you understand the self-assessment questions but can't remember the answers?

<p>Check your notes and textbook (C)</p> Signup and view all the answers

What is the feedback policy for the course?

<p>Feedback is always welcome (B)</p> Signup and view all the answers

What is the primary focus of the Practical Network Defense course?

<p>Practical application of computer network security concepts (B)</p> Signup and view all the answers

What is one of the main objectives of the course?

<p>To apply a security policy (D)</p> Signup and view all the answers

What is one of the skills that students will develop in the course?

<p>Selecting the appropriate firewall rules to protect a network (A)</p> Signup and view all the answers

What is the lecturer's primary area of research interest?

<p>Computer network security (D)</p> Signup and view all the answers

What is the code to join the class in Google Classroom?

<p>mumait2 (C)</p> Signup and view all the answers

What is the schedule for the course on Thursdays?

<p>12-15, Tiburtina Labs (lab XV) (C)</p> Signup and view all the answers

What is the total number of CFUs for the course?

<p>6 CFUs (B)</p> Signup and view all the answers

What is one of the abilities that students will develop in the course?

<p>Making the most appropriate design choices to implement a 'defense in depth' strategy (D)</p> Signup and view all the answers

What is the framework used for experimenting computer networking in the lab activities?

<p>Kathará (formerly known as netkit) (D)</p> Signup and view all the answers

What is required to be done before attending the lab activities?

<p>Download the virtual machine (D)</p> Signup and view all the answers

What is the minimum number of mandatory assignments required to pass the exam?

<p>3 (A)</p> Signup and view all the answers

What is the purpose of the assignments in the course?

<p>To apply techniques and tools introduced during the classes (C)</p> Signup and view all the answers

What is the maximum increment to the final grade of the written exam that can be achieved through assignments?

<p>+3 points (D)</p> Signup and view all the answers

What is the validity period of a written exam?

<p>1 year (D)</p> Signup and view all the answers

What is the optional exam format for students with a written exam >= 27?

<p>Oral exam (A)</p> Signup and view all the answers

What is the main textbook used in the course?

<p>Introduction to Computer Networks and Cybersecurity (C)</p> Signup and view all the answers

What is the expected outcome of completing the course?

<p>To fill the gap in knowledge and catch up (D)</p> Signup and view all the answers

What is the purpose of the self-assessment exercises?

<p>To familiarize students with Linux CLI and tools (C)</p> Signup and view all the answers

What is the recommended approach to the course?

<p>Don't get discouraged and try to fill the gap in knowledge (C)</p> Signup and view all the answers

What is the purpose of the bonus reference to http://overthewire.org/wargames/bandit/bandit0.html?

<p>To help students learn Linux CLI and tools (D)</p> Signup and view all the answers

What is the recommended goal for students using the bonus reference?

<p>To learn as much as possible from each level (B)</p> Signup and view all the answers

What is the significance of taking notes while using the bonus reference?

<p>Taking notes helps students remember passwords and how they were obtained (A)</p> Signup and view all the answers

Study Notes

Course Introduction

  • The course is Practical Network Defense, a part of the Master's degree in Cybersecurity at Sapienza Università di Roma, academic year 2023-24.
  • The lecturer is Angelo Spognardi, an associate professor at the Department of Informatics (Dipartimento di Informatica).
  • The lecturer's contact information: tel: 06 4925 5164, email: [email protected], and website: https://angelospognardi.site.uniroma1.it.

Practical Info

  • Student hours are available on request by email, and meetings will be held in the lecturer's office (G29, v.le Regina Elena, 295, Edificio G).
  • Research interests of the lecturer include computer network security, security in social networks, ML and AI in cybersecurity, privacy, applied cryptography, operating systems, and programming.

Course Website and Schedule

  • The course website is https://sites.google.com/di.uniroma1.it/practical-network-defense.
  • The course has 6 CFUs, and students are required to join the class in Google Classroom using the code "mumait2" and their @studenti.uniroma1.it account.
  • The schedule includes Thursday classes from 12-15 pm at Tiburtina Labs (lab XV) and Friday classes from 11-13 am at Aula 3, v.le Castro Laurenziano 7a.

Objectives

  • The course aims to teach students methods and tools for protecting computer networks.
  • Students will learn to apply practical concepts, including protocols in networked computer systems, security mechanisms, and intrusion detection.
  • By the end of the course, students will be able to monitor traffic, apply security policies, perform network scans, and select appropriate firewall rules and protection mechanisms.

Topics Covered

  • Network monitoring and traffic analysis
  • Network attacks (e.g., session hijacking, man-in-the-middle)
  • Minimizing exposure (attack surface and vectors)
  • Network hardening and policy development
  • Defense in depth and perimeter networks (DMZs)/Proxy Servers
  • Implementing firewalls and virtual private networks (VPNs)
  • Implementing IDS/IPS and network access control

Class Structure and Assignments

  • Theoretical concepts will be presented in classroom hours, with practical activities during lab hours.
  • Some topics will have assignments with two parts: an implementing part in the virtual lab environment and a reporting part.
  • Assignments are part of the exam and are a prerequisite for accessing the written exam.

Tools and Resources

  • The course will use Kathará (formerly known as netkit), a container-based framework for experimenting with computer networking.
  • A virtual machine will be provided for students, and access to the virtual infrastructure (ACME co.) will be granted.
  • Recommended textbooks include "Introduction to Computer Networks and Cybersecurity" by Chwan-Hwa (John) Wu and J.David Irwin.

Exam and Assessment

  • The exam consists of 3/4 mandatory assignments and a full written exam.
  • Optional oral exams are available for students with a written exam score of 27 or higher.
  • Assignments are evaluated as A, B, or C, and provide an increment to the final grade of the written exam (up to +3 points).

Feedback and Self-Assessment

  • Feedback is always welcome, and students are encouraged to share suggestions and resources.
  • Self-assessment questions are provided to help students identify areas where they need to improve.
  • The self-assessment questions cover topics such as Linux, network security, and cryptography.

Bonus Reference

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Course introduction to Practical Network Defense for Master's degree students in Cybersecurity (2023-2024) at Sapienza Università di Roma.

More Like This

Use Quizgecko on...
Browser
Browser