Protect the Future with Inteli's Postgraduate Diploma in CyberSecurity
In Inteli's Postgraduate Diploma in Cyber Security, you become a security expert, ready to tackle the industry's most complex challenges. Our program combines cutting-edge theory with advanced practice, preparing you to mitigate threats and lead cyber security projects.
Try the Open Classroom
Come and experience the course before you even become a student. During these classes, find out what it's like to study with the best professionals and take part in dynamics that explore digital protection techniques and strategies. The Open Class is your opportunity to get to know our innovative methodology, interact with teachers and ask questions about the program.
Become the expert the market needs. Sign up now and become part of the cybersecurity elite.
Class dates
Date:
19/11 | Tuesday
Mode:
Online Class
Schedule:
from 7pm to 9pm
Business Drivers, Requirements and Architectural Views
In this first Open Class, we'll cover how a good understanding of the Business domain drives architectural decisions, and what factors we should take into account to make an architecture that meets both functional and non-functional requirements (security is included in the latter category), also considering the criticality of the requirements from the Business perspective. One highlight is to show how architectural views can be used to highlight software assets and possible segregation, with a view to control and protection approaches for logical and physical business assets.
In this second Open Class, we will present architectural tactics to support non-functional requirements (availability, security, scalability) with the details of some case studies. The tactics should connect architectural decisions in terms of business rules, data, transactions and infrastructure layers involving communication networks, servers and operating systems. Methods of evaluating and monitoring systems to support continuous system improvement will also be covered.
In this course, we will have 100% hands-on activities, focusing on network practices that guarantee stability in system communication, avoiding attack loopholes, such as social engineering by a fake technician. Among the activities we will see:
UTP-CAT cable crimping with a focus on information security and crimping quality, discussing good practices for building a secure LAN;
Calculation of Radio Frequency signal power in dBm, with analysis of signal quality and study of possible attacks when signal jammers appear;
Satellite antenna alignment using the calculation made in the previous activity. We will discuss signal quality and provide important satellite communication tips for obtaining a robust signal and mitigating system failures against possible security vulnerabilities.
In this meeting, we will calculate the IP network mapping with CIDR for the local notebooks and then the LAN network, we will incorporate an ESP32 into the WiFi network and simulate DoS and DDoS attacks on an ESP32. In addition, we will simulate a phishing attack on a website hosted on the ESP32.