Cybersecurity Fundamentals: Information Assurance Fundamentals, Basic Cryptography, Symmetric Encryption, Public Key Encryption, The Domain Name System (DNS), Firewalls.AI, AI for cybersecurity and cybersecurity for AI .AI systems’ support to cybersecurity .AI malicious uses
Attacker Techniques and Motivations: How Hackers Cover Their Track, Tunneling Techniques, Fraud Techniques: Phishing, Smishing, Vishing, and Mobile Malicious Code, Rogue Antivirus, Click Fraud. Threat Infrastructure: Botnets, Fast-Flux , Advanced Fast-Flux.
Exploitation: Techniques to Gain a Foothold: Stack-Based Buffer Overflows, Stacks on Stacks, Crossing the Line, Protecting against Stack-Based Buffer Overflows. SQL Injection: Protecting against SQL Injection, Conclusion. Malicious PDF Files: PDF File Format, Creating Malicious PDF Files, Reducing the Risks of Malicious PDF Files
Web Exploit Tools: Features for Hiding, Commercial Web Exploit Tools and Services Updates, Statistics, and Administration, Proliferation of Web Exploit Tools Despite Protections, DoS Conditions, Brute Force and Dictionary Attacks, Cross-Site Scripting (XSS) , Social Engineering. DNS Amplification attacks
Defense and Analysis Techniques: Memory Forensics, Honeypots, Malicious Code Naming, Automated Malicious Code Analysis Systems: Passive Analysis, Active Analysis ,Physical or Virtual Machines. Intrusion Detection Systems