Class modality

This course teaches the fundamentals of cybersecurity through practical, hands-on experience in both attacking and defending. Students will perform penetration tests and learn to counter real attacks, alternating between offensive and defensive classes. Topics covered include reconnaissance, scanning, exploitation, privilege escalation, lateral movement, exfiltration, malware, network security forensics, binary reversing, log analysis, intrusion detection systems, honeypots, and basics of machine learning for security. By the end of the semester, students will be prepared for junior penetration tester roles or to continue as cybersecurity researchers and practitioners.

This course consists of weekly 3-hour blocks which combine both theory and practical exercises. Students can attend the tutorials in person in room KN:E-107 or online via the live stream and Matrix communication platform.

Communication channels

In case you need to contact the teachers, there are two options:

  1. Contact us via class Matrix platform (Credentials are sent upon registration)
  2. In very rare cases, if you really need it, you can send an email to ALL the teachers via 13136-bsy [at] fel.cvut.cz (this way, any of them can answer). But please chat us in Matrix first to all of us.

Registration

Online enrollment for the paid version class can be done through Lifelong Learning Portal of Czech Technical University in Prague. The full price for the course is 50000CZK.

What are participants provided with?

  • Detailed coursebook per class with commands and tools used.
  • Access to a chat platform to interact and ask questions.
  • Live video stream and recordings of each lecture. -Cloud-based cyber range environment where to practice what is taught during the classes. We take care of the deployment and infrastructure for you.
  • Hands-on practical assignments to further learn about the concepts and techniques coverd in the classes.
  • Full-scale exam at the end of the course.
  • Official Certificate of Completion issued by the Czech Technical University in Prague (The micro-credential is valid and accepted across the European Union).

What do participants need for the classes?

  • Computer to take the class and participate in hands-on exercise
  • Good internet connection to access the class material and labs
  • SSH Client to access the cloud cyber range

Passing requirements

  • You have to be registered in Lifelong Learning Portal of Czech Technical University in Prague and paid the tuition fee to participate in the course.
  • Pass the Final Exam at the end of the Course

Cyber Range

As part of the paid version of the course, participants are provided with access to the cloud cyberrange. No installation or maintenance - we take care about it. It is a safe environment to environment where you can safely practice both attacking and defensive techniques shown in the course

Local Cyber range

If you want to run the cyberrange yourself, use our Cyber Range locally in your computer. It is a local, docker-based environment where you can safely practice both attacking and defensive techniques shown in the course.

Assignments

Several practical assignments are given during the course. Each assignment corresponds to a class and is designed to practice the content covered in the class. Each assignment is in the form of Capture the Flag and should be individually solved by submitting the flag to the course CTFd system.

  • Each participants is assigned a docker container in the class infrastructure at the beginning of the class.
  • Docker containers run Linux and contain all the tools needed during the course to solve all assignments.
  • All assignments are to be done in the containers unless stated otherwise.

Starting dates and hard deadline dates are listed in the following table:

AssignmentStarting DateDeadlinePoints
Asignment 1TBDTBD1
Asignment 2TBDTBD6
Asignment 3TBDTBD6
Asignment 4TBDTBD5
Asignment 5TBDTBD6
Asignment 6TBDTBD5
Asignment 7TBDTBD4
Asignment 8TBDTBD6
Asignment 9TBDTBD5
Asignment 10TBDTBD6

Assignment rules

You can NOT

  1. Attack others on the Internet from the docker we are giving you.
  2. Attack the assignment servers or CTFd servers
  3. Attack other servers and services in the university network (outside of the IP range given to you)
  4. Share your code or solution with other students

You CAN

  1. Attack the given docker from the Internet.
  2. Attack from the local docker network the dockers for other students (inside the local network)

Final Exam

The exam takes place during the exam period in January/February. It consists of both theoretical and practical taks which are related to the content of the class and assignments. Participants are required to collect at least 50 points (out of 100) to pass the exam.

Code of Conduct

Be respectful of all others in the class. No mistreatment or aggressive behavior will be tolerated in the class, chat, or online video chat. Speak to everyone with respect, understanding, and empathy. Students not respecting this code will be banned from the course and any future course.

Completion of the course

Participants who fulfill the requirements will receive an official Certificate of Completion issued by the Czech Technical University in Prague (The micro-credential is valid and accepted across the European Union)