Course Outline

Week Date Class Content and Descriptions
1 4-Sep-15 Basic Concept on IT Security
(Lecture): 3 hours briefing on CyberSecurity practices, Access Control, Authentication, IT Security Principles and Risk Analysis, Threats and Vulnerabilities

(Lab): Setup of ESXi server and walk through of vSphere client and VM environment
2 11-Sep-15 Network Basics
(Lecture): Network basis, Network architecture and security architecture, DNS, LAN and WiFi Security

(Lab): nmap scanning, DNS info searching, nessus usage, WiFi setup demo, Wiresharks
3 18-Sep-15 Network Hacking
(Lecture): Network attack, scanning, sniffing, vulnerability scanning, Denial of Service attacks, malware and virus

(Lab): Setup web application environment including DB, web server, ftp server, DNS server and launch nessus and vulnerability scanning
4 25-Sep-15 Network Infrastructure Secure Design
(Lecture): Network defense mechanism, Firewall, IDS, Anti-DDoS

(Lab): Launch Exploits, Setup Firewall, IDS, honeypot and Snort
5 2-Oct-15 Network Encryption
(Lecture): Encryption basics, PKI, SSL TLS, Secure Protocol, Heartbleed and POODLE

(Lab): WiFi analysis and cracking, SSL/TLS traffic analysis
6 9-Oct-15 Web Application Programming
(Lecture): PHP, Javascript, SQL query and web authentication

(Lab): web protocol, HTML, CSS, implement web application with PHP and Javascript,. Connect PHP web site to MySQL database, Setup web authentication system
7 16-Oct-15 Mobile Application Programming
(Lecture): mobile application architecture and life cycle, android programming concept

(Lab): Develop of android apps with mobile languages, coding app logic with Java and PHP web site
8 23-Oct-15 Web Application Hacking
(Lecture): OWASP top 3/10 attack methods including SQL injection, XSS, CSRF

(Lab): injection attack, Cross-site scripting and CSRF attack
9 30-Oct-15 Web and Mobile Application Hacking
(Lecture): Other OWASP top 7/10 attack methods, securing methods, mobile security issues

(Lab): attack on web application authentication, session management, web OS hardening metod and cracking of android application
10 6-Nov-15 Application Security
(Lecture): Application security threats, Secure programming life cycle, Buffer Overflow, Application firewall, secure code review and security assessment concept

(Lab) Buffer Overflow code development
11 13-Nov-15 Practical Examination
12 20-Nov-15 Incident Response and Computer Forensics
(Lecture): Incident Response, Computer Crime, Forensics Investigation and Compliance

(Lab): Log analysis and attack tracing
HomeWork presentation
13 27-Nov-15 Advanced Topics on Security
(Lecture): Physical security, management and operation security, Cloud Computing Security

(Lab): Actual cloud computing setup (e.g. AWS)

Course intended learning outcomes


On successful completion of this course, students are expected to be able to:
(1) Understand the current security threat and future trend of IT security industry
(2) Design and develop web application with security features
(3) Incorporate best security practices in application developments (such as ISO 27000 series, OWASP Top 10 risks)
(4) Apply Information security governance and risk management to real life scenario
(5) Perform auditing of information systems
(6) Set up ethical hacking and security testing/assessment tools
(7) Launch web application application penetration test