0% found this document useful (0 votes)
18 views14 pages

TECH2400 Week 06 Workshop

The document outlines the curriculum for a Cyber Security workshop at Kaplan Business School, detailing subject learning outcomes and a weekly schedule covering various topics such as risk management, network security, and incident response. It includes hands-on activities for firewall configuration and VPN setup, emphasizing practical skills in cyber security. The workshop aims to clarify concepts from previous weeks and prepare students for assessments.

Uploaded by

Warisha Safdar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views14 pages

TECH2400 Week 06 Workshop

The document outlines the curriculum for a Cyber Security workshop at Kaplan Business School, detailing subject learning outcomes and a weekly schedule covering various topics such as risk management, network security, and incident response. It includes hands-on activities for firewall configuration and VPN setup, emphasizing practical skills in cyber security. The workshop aims to clarify concepts from previous weeks and prepare students for assessments.

Uploaded by

Warisha Safdar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

TECH2400

Cyber Security

Workshop 6
Study Success Week
COMMONWEALTH OF AUSTRALIA
Copyright Regulations 1969

WARNING

This material has been reproduced and communicated to you by or on behalf of


Kaplan Business School pursuant to Part VB of the Copyright Act 1968 (the Act).

The material in this communication may be subject to copyright under the Act.
Any further reproduction or communication of this material by you may be the
subject of copyright protection under the Act.

Do not remove this notice.


Subject Learning Outcomes
Explain the terminology associated with cyber
LO1: security.

Explain the vulnerabilities and threats pertaining to


LO2: the IT infrastructure of organisations.

Analyse risk mitigation strategies that address


LO3: cyber security vulnerabilities and threats.

Describe privacy, legal, ethical and security issues


LO4: and solutions related to the IT infrastructure and
use of technologies in organisations.
Weekly Schedule
Week Topic
Week 1 Introduction and Cyber Security Foundations

Week 2 Cyber Threat Landscape

Week 3 Risk Management in Cyber Security

Week 4 Cryptography Basics and Network Fundamentals Review

Week 5 Network Security Fundamentals

Week 6 Study Success Week

Week 7 Access Control and Authentication

Week 8 Ethics and Legal Aspects of Cyber Security

Week 9 Incident Response and Management (Part 1)

Week 10 Incident Response and Management (Part 2)

Week 11 Introduction to Secure Software Development

Week 12 In-Class Assessment


Weekly Schedule
Week Topic
Week 1 Introduction and Cyber Security Foundations

Week 2 Cyber Threat Landscape

Week 3 Risk Management in Cyber Security

Week 4 Cryptography Basics and Network Fundamentals Review

Week 5 Network Security Fundamentals

Week 6 Study Success Week

Week 7 Access Control and Authentication

Week 8 Ethics and Legal Aspects of Cyber Security

Week 9 Incident Response and Management (Part 1)

Week 10 Incident Response and Management (Part 2)

Week 11 Introduction to Secure Software Development

Week 12 In-Class Assessment


What to expect from this workshop
- Opportunity to clarify concepts from Weeks 1-5
- More hands-on firewall configuration activities to
prepare for Assessment 2
Weeks 1-2 Recap
Week Topic
Week 1 Introduction and Cyber Security Foundations
- What is cyber security
- Careers in cyber security
- CIA Triad
- Common protocols
- Nmap & Wireshark
Week 2 Cyber Threat Landscape
- Cyber threats
- Payloads, Vectors, and Indicators of Compromise (IoCs)
- Common cyber attacks and IOCs on Wireshark
Weeks 3-4 Recap
Week Topic
Week 3 Risk Management in Cyber Security
- Basics of risk management
- Assessing cyber maturity
- Key risk management frameworks
- Conducting a risk assessment
- Risk in the Australian Context
Week 4 Cryptography Basics and Network Fundamentals Review
- What is Cryptography?
- Cryptography types
- OpenSSL cryptography activities
- Review of IP addresses, defaul gateways, subnets, routing, and
packet structures
Week 5 Recap
Week Topic
Week 5 Network Security Fundamentals
- Firewall Rules & Policies
- Attacks & Threats
- VPN Basics
- Logs & Monitoring
- Hands-on with pfSense
o Limit traffic to https
o Restrict SSH access
o Block specific websites
o Content filtering with pfBlockerNG
Week 6
Continue to explore network security and firewall
configuration via pfSense.

Today's activities: Complete in groups of 3-4 students

1) Set up VLAN
o Segment network by groups for access control

2) Set up VPN
o Allow remote users to securely access internal
resources
Activity 1: Linux Mint Installation
Instructions:
1) Go to IT Hub on myKBS
2) Open the Linux Mint installation guide
3) Follow the steps to correctly install and configure Linux
Mint on your laptops.
Activity 2: VLAN Configuration
A company wants to separate employee and guest Wi-Fi for
security and performance reasons. Employees should have
access to internal company resources, while guests should
only have internet access.

Instructions:
1) Identify what you need to configure in pfSense to
separate Employee and Guest networks
2) Use generative AI to guide your setup (Hint: ask about
VLANs in pfSense and best practices for access control)
3) Set up VLANs for Employee and Guest Wi-Fi
Activity 3: VPN Configuration
A company hires contractors who need secure remote
access to internal resources. Instead of exposing these
resources to the internet, the company wants to set up a VPN
so contractors can connect securely.

Instructions:
1) Identify what you need to configure in pfSense to allow
secure VPN access for contractors
2) Use generative AI to find out how to set up a VPN in
pfSense and best practices for securing remote access.
3) Set up VPN for contractor access
Next Week

Week 7: Access Control and Authentication

- Access control models


- Access control principles
- Authentication mechanisms
- Implementing MFA

You might also like