Class modality

This course teaches the fundamentals of cybersecurity through practical, hands-on experience in both attacking and defending. Students will perform penetration tests and learn to counter real attacks, alternating between offensive and defensive classes. Topics covered include reconnaissance, scanning, exploitation, privilege escalation, lateral movement, exfiltration, malware, network security forensics, binary reversing, log analysis, intrusion detection systems, honeypots, and basics of machine learning for security. By the end of the semester, students will be prepared for junior penetration tester roles or to continue as cybersecurity researchers and practitioners.

This course consists of weekly 3-hour blocks which combine both theory and practical exercises. Students can attend the tutorials in person in room KN:E-107 or online via the live stream and Matrix communication platform.

Registration

Online enrollment for the class can be done through Eventbrite.

Communication channels

In case you need to contact the teachers, there are two options:

  1. Contact us via class Matrix platform (Credentials are sent upon registration)
  2. In very rare cases, if you really need it, you can send an email to ALL the teachers via 13136-bsy [at] fel.cvut.cz (this way, any of them can answer). But please chat us in Matrix first to all of us.

What are participants provided with?

  • Detailed coursebook per class with commands and tools used
  • Access to a chat platform to interact and ask questions
  • Live video stream and recordings of each lecture
  • Cyber Range environment where to practice what is taught during class

What do participants need for the classes?

  • Computer to take the class and participate in hands-on exercise
  • Good internet connection to access the class material and labs
  • Docker installed to run a local Cyber Range
  • Local Cyberrange insntalled (see Cyber Range)

Passing requirements

  • You have to be registered in Eventbrite to participate in the course.
  • For participants registered in the free version of the course, there are no weekly assignments or exams. You can get a “Note of Completion” if you demonstrate class completion at the end of the course.
  • To verify completion of the course, students are required to participate in at least 12 out of 14 lessons. The method of verification is introduced in the first lesson

Cyber Range

To follow the class exercises and exercises, you need to use our Cyber Range locally in your computer. It is a local, docker-based environment where you can safely practice both attacking and defensive techniques shown in the course. You MUST have it installed and working for the first class. So install it and try it now!

Code of Conduct

Be respectful of all others in the class. No mistreatment or aggressive behavior will be tolerated in the class, chat, or online video chat. Speak to everyone with respect, understanding, and empathy. Students not respecting this code will be banned from the course and any future course.

Completion of the course

Participants who fulfill the requirements will receive a Note of Completion issued by the Stratosphere Laboratory. If you are seeking official Certificate of Completion issued by the Czech Technical University (Certificate is accepted across the EU), see the [professional version] of this course.