2019 Attack and Defense on Cybersecurity I

Font size  SML

Register update notification mail Add to favorite lecture list
Academic unit or major
School of Computing
Instructor(s)
Ueda Kengo  Sugaya Mitsuyoshi    Tanaka Keisuke 
Course component(s)
Lecture / Exercise
Day/Period(Room No.)
Wed5-8(W834)  
Group
-
Course number
XCO.T475
Credits
2
Academic year
2019
Offered quarter
2Q
Syllabus updated
2019/4/2
Lecture notes updated
-
Language used
Japanese
Access Index

Course description and aims

Cybersecurity is important for our daily lives including various types of activities. There is a growing demand for students who can be researchers and engineers capable of understanding cybersecurity.
In order to satisfy this demand, Tokyo Tech has launched Progressive Graduate Minor in Cybersecurity in April, 2016. We design the curriculum of Progressive Graduate Minor in Cybersecurity in collaboration with NRI as the core, also with Rakuten, NTT, AIST, and NISC. The following six courses are organized in School of Computing: Foundation of Cybersecurity (1Q, 2-0-0), Theory of Cryptography for Cybersecurity (3Q, 2-0-0), Cybersecurity Governance (3Q, 1-1-0), Attack and Defense on Cybersecurity I (2Q, 1-1-0), Attack and Defense on Cybersecurity II (3Q, 1-1-0), and Attack and Defense on Cybersecurity III (4Q, 1-1-0).
This course is one of the core courses in this minor. Students will learn the essential elements of Information technology and information security which should be considered in system/network development and operation. The goal of this course is that the students can get practical knowledge and skills about information security through many hands-on exercises related to security tools.

Student learning outcomes

By the end of this course, students will be able:
1) to understand computer security, and
2) to explain the important security elements and the countermeasures.

Keywords

information security, computer network

Competencies that will be developed

Intercultural skills Communication skills Specialist skills Critical thinking skills Practical and/or problem-solving skills

Class flow

The class offers a standard-type of lecture and also hands-on exercise related to the topic.

Course schedule/Required learning

  Course schedule Required learning
Class 1 Orientation, Internet and Information Security Overview Understand the notions of the Internet and information security.
Class 2 Internet and Network 1 (Internet Structure, IP address, DNS) Understand the structure of the Internet.
Class 3 Internet and Network 2 (TCP/IP Protocol and Its Analysis) Understand the TCP/IP Protocol.
Class 4 Internet and Network 3 (Routing, NAT, VLAN, Firewall, VPN) Understand routing, NAT, VLAN, Firewall, and VPN.
Class 5 OS Structure 1 (Windows OS and Security Function) Understand Windows OS and security function.
Class 6 OS Structure 2 (UNIX/Linux OS and Security Function) Understand UNIX/Linux OS and security function.
Class 7 Services Structure 1 (Port Number, Web Services, Mail Services) Understand web services and mail services.
Class 8 Services Structure 2 (FTP, TELNET/SSH, Other Services) Understand FTP and TELNET/SSH.
Class 9 Application (OS Native Application, Web Application, Mobile Application) Understand applications.
Class 10 Database (Variety of Database, Database Development, SQL Injection and Its Countermeasures) Understand database.
Class 11 Information Security Fundamentals 1 (Threat/Vulnerability/Risk, Identification/Authentication/Authorization) Understand the notions of Threat/Vulnerability/Risk.
Class 12 Information Security Fundamentals 2 (Target of Attacks, Malware, Backup) Understand targets of attacks.
Class 13 Cryptography (Encryption Concept, Cryptosystem, Authentication System, PKI) Understand crypto systems and authentication systems.
Class 14 Security Operation (Security Incident, Incident Handling, Intrusion Detection) Understand security incidents.
Class 15 Secure Development (Buffer Overflow, Cross Site Scripting and countermeasures against them) Understand cross site scripting.

Textbook(s)

None.

Reference books, course materials, etc.

Secure Eggs Series “IT + Security Fundamentals” (NRI SecureTechnologies)

Assessment criteria and methods

The evaluation consists of two exams as homework assignments during the course. Instructors also give exercises in the classes.

Related courses

  • XCO.T473 : Foundation of Cybersecurity
  • XCO.T474 : Theory of Cryptography for Cybersecurity
  • XCO.T478 : Cybersecurity Governance
  • XCO.T476 : Attack and Defense on Cybersecurity II
  • XCO.T477 : Attack and Defense on Cybersecurity III

Prerequisites (i.e., required knowledge, skills, courses, etc.)

None. However, the knowledge on the basic notions of computer science can help students to understand the contents of the course smoothly.

Contact information (e-mail and phone)    Notice : Please replace from "[at]" to "@"(half-width character).

keisuke[at]is.titech.ac.jp

Office hours

Appointment by e-mail is required.

Page Top