- Ir. Ridho Surya Kusuma, S.T., M.Kom., CSA.
- Cybersecurity
- Computer Science
- Hello, Let me introduce myself...
- [email protected]
Cybersecurity: Blue Team
USM
Introduction
Welcome to Cybersecurity Essentials! This course focuses on essential principles and techniques for defending against cyber threats, with a specific emphasis on the blue team perspective. Throughout the semester, we'll cover topics such as threat detection, incident response, and network security. By the end, you'll have the skills needed to effectively protect digital systems as part of a defensive team. Let's get started!.
Learning Goals
The course “Cybersecurity: Blue Team” is to help participants understand the basics of cybersecurity and recognize important terms, detect and respond to threats effectively. Participants will learn network monitoring techniques, vulnerability management, and configuring systems to be secure. In addition, they will understand wireless communication security, web application security, and the use of tools such as Wireshark, OpenVAS, and Metasploit. The course also emphasizes the importance of the human role in security, including how to address social engineering threats. With these skills, participants are expected to be able to work collaboratively in blue teams to protect systems from cyber threats.
Course Operation Period
Period : December 1, 2024 ~ January 2, 2025
Course Level
Intermediate
Prerequisites
To complete this course successfully, you should have:
1. Basic understanding of computer networks and systems
2. Familiarity with operating systems such as Windows, Linux, and macOS
3. Knowledge of fundamental cybersecurity pricinples and terminology
4. Python
5. Personal Computer or Laptop
Evaluation Standard
Item | Title | Score(Rate) | Implementing Week | Method | Remarks |
---|---|---|---|---|---|
Assignment | Network Mapping | 20 | Week 3 | Multiple Choice | Basic Tools, Nmap, Wireshark, and OSSEC |
Discussion | Wireshark Logs | 15 | Week 5 | Q and A | Network Log Analysist |
Midterm | Midterm Exam | 25 | Week 7 | Multiple Choice | Theory Exam |
Final Exam | Final Project | 40 | Week 14 | Multiple Choice and Case Study | Theory and Practice Lab |
Total | 100 |
Summary of Curriculum
Topics and activities | Content name and URL | Remarks |
---|---|---|
Fundamental Networking | Introduction to basic safety tools | |
Troubleshooting Microsoft Windows | Learn troubleshooting tools | |
Network Mapping and Vulnerability | Using NMap and OpenVAS | |
Monitoring dengan OSSEC | Network log monitoring | |
Wireshark untuk Log Analysis | Understand protocols and log analysis | |
Web Application Security | Securing web applications | |
Metasploit dan Patch Management | Vulnerability evaluation and patching |
Textbook & References
Cybersecurity Blue Team Toolkit, Nadean H. Tanner, 2019
Professor Information
T.A. Information
- Putra Nanda Kurniawan, S.T.
- Teaching Assistant
- Computer Science
- Hello, Let me introduce myself...
- [email protected]
How to provide assistance for learners
What does this course cover specifically?
You can learn about The course “Cybersecurity: Blue Team” covers practical skills in defending systems against cyber threats, including: Basic Network and Security Tools, Windows Troubleshooting, Network Mapping, Vulnerability Management, Monitoring using OSSEC, Wireless Communication Security, Wireshark for Logs, Web Application Security, Patch Management, Metasploit Usage, and 8th OSI Layer Security (human aspect). This course focuses on threat detection and response from a blue team perspective.
Do you have a separate course textbook?
Yes, this course uses the recommended textbook, the Cybersecurity Blue Team Toolkit. This book can be accessed through the following link.