|
|
|
||
Living and working online means leaving a digital footprint. In this course, students will learn how to secure their work, data and privacy in the digital world. The course will introduce knowledge that governments, hackers, IT-professionals and corporations may use against media professionals. The course will also discuss ways how to mitigate the most common digital threats, such as KRACK, Heartbleed, SCAM and Social Engineering attacks. Poslední úprava: Miessler Jan, Mgr. (21.01.2022)
|
|
||
Course instructor: Alexander Weber The course is aimed at professional communicators: reporters, public relations strategists, political communicators, communications managers and directors, brand influencers, press spokespeople – anyone whose job requires them to protect intellectual property, ideas, designs, and concepts, or the integrity of communications between them and their partners, clients or sources. It is a practical course focusing on defending privacy and protecting clients, sources, publications and investigations without prior advanced IT knowledge. Overall Learning Objectives and Assessment · Identify threats and risks in a fast-changing digital environment · Assess, and reduce their social, digital and personal footprints · Describe the basic structure of the connected networks (Internet, WWAN, LAN, 2G/3G/4G/5G) and understand its inherent design flaws, including the vulnerability of the cloud, the layers of the Internet, ISP data collection, service providers, devices, credential verification, digital certificates. · Challenges of travelling abroad with sensitive information or with aim to collect sensitive information · Describe the laws governing search, seizure, access, and communications interception and apply that knowledge to protect their own and others’ information in different legislations in Europe, Asia and the Americas · Use encrypted communication, TOR, VPNs, secure document systems, 1.1.1.1. to protect their own and others’ information. · Analyze information risks in communication scenarios and create strategies to minimize, mitigate or eliminate those risks The course content may be adjusted to address current events and developments in the field. Poslední úprava: Miessler Jan, Mgr. (04.02.2022)
|
|
||
Full Disclosure (continuous mailing list) https://seclists.org/fulldisclosure/ GILES, Matt & SNOWDEN, Edward (2016) The Internet is broken. Popular Science HADNAGY, Christopher (2018), Social Engineering: The Science of Human Hacking, 2nd Edition. Wiley MIESSLER, Daniel (continuous blog) https://danielmiessler.com/ MITNICK, Kevin (2018), The Art of Invisibility. Back Bay Books SCHNEIER, Bruce (2018) Klick here to kill everybody. W. W. Norton & Company SCHNEIER, Bruce (2019) We have root. Wiley SCHNEIER, Bruce (continuous blog) https://www.schneier.com/ Poslední úprava: Miessler Jan, Mgr. (21.01.2022)
|
|
||
The course will be taught as a seminar. Poslední úprava: Miessler Jan, Mgr. (21.01.2022)
|
|
||||||||||||||||||
Breakdown of Grades
Grading Scale A: 91-100, B: 81-90, C: 71-80, D: 61-70, E: 51-60, Fail: <51 Active participation, submitting at least 4 of the 6 assignments, at least 6 of the 10 quizzes, and the final exam is required to pass the course. Poslední úprava: Miessler Jan, Mgr. (21.01.2022)
|