- Introduction
- State of the art
- Analysis
- Actions
- Unit summary
- Introduction
- Detection
- Analysis
- General protections
- Unit summary
- Introduction
- Good practices
- Risk management and mitigating factors
- Threats and vulnerabilities
- Unit summary
- Introduction
- Definition and objectives
- Regulations
- Cybersecurity Management Systems
- Unit summary
- Introduction
- Security plan
- Safe development
- Cases
- Unit summary
- Introduction
- Identity management
- Authentication
- Authentication schemes
- Unit summary
- Introduction
- Threat models
- Assessment
- Risks
- Unit summary
- Introduction
- Management
- Active storage
- Passive storage
- Unit summary
- Introduction
- Types of social media
- Social media concepts
- Social media security
- Unit summary
- Introduction
- Social media threats
- Mitigating mechanisms
- Security tools
- Unit summary
- Introduction
- DOXING techniques
- SOCINT techniques
- Tools
- Unit summary
- Introduction
- Infoxication
- Information analysis
- Fake news detection techniques
- Unit summary
- Introduction
- Malware definition and types
- Static and dynamic analysis
- Terminology
- Unit summary
- Introduction
- Viruses and worms
- Trojans
- Spyware and Phising
- Unit summary
- Introduction
- Rootkits
- Ransomware
- Other types
- Unit summary
- Introduction
- Metasploit architecture
- Exploits
- Payloads
- Unit summary
- Introduction
- Principle of cryptography
- Classic algorithms (I)
- Classic algorithms (II)
- Enigma
- Introduction
- Principles of symmetric encryption
- Symmetric key algorithms
- Other symmetric algorithms
- Unit summary
- Introduction
- Asymmetric key algorithm
- Hash function and collisions
- Digital signature
- Unit summary
- Digital certificates
- Digital signature
- Tools and applications (I)
- Tools and applications (II)
- The future of cryptography
- Introduction
- Principle of cryptography
- Classic algorithms (I)
- Classic algorithms (II)
- Enigma
- Introduction
- Principles of symmetric encryption
- Symmetric key algorithms
- Other symmetric algorithms
- Unit summary
- Introduction
- Asymmetric key algorithm
- Hash function and collisions
- Digital signature
- Unit summary
- Digital certificates
- Digital signature
- Tools and applications (I)
- Tools and applications (II)
- The future of cryptography
- Introduction
- HTTP and HTTPS protocols
- Domains and DNS
- Servers
- Ports and other protocols
- Types of web threats
- Targets (I)
- Targets (II)
- Targets (III)
- Targets (IV)
- Introduction
- Cross-Site Scripting (XSS)
- SQL Injection
- Loss of authentication
- Other vulnerabilities
- Secure server
- Apache (I) Security
- Apache (II) Security
- NGINX
- Other measures
- What is Osint?
- Introduction to Osint
- Goals and levels
- Osint investigation methodology
- Social engineering
- Introduction to search engines
- Google search
- General search engines
- Other search engines
- Metasearch engines
- Specialized search engines
- Regular expressions
- Osint tools
- References
- Dark web
- Osint investgation
- Osint Workflow (I)
- Osint Workflow (II)
- Workflow Examples
- Automation and references
- Introduction to the Internet of Things (IoT)
- History of IoT
- SWOT analysis on IoT
- Areas and sectors
- IoT security and privacy
- Introduction to IoT architecture
- Layer models
- Specific architectures
- OpenFog
- IoT development
- IoT and Big Data
- IoT applications
- Analytics
- IoT analytics applications
- Data aggregation and integration
- Sensors
- Inter-sensor communication protocols, controllers, and interfaces
- Communication protocols
- Attacks and preventive measures
- Tools and case studies


