Tải bản đầy đủ (.docx) (3 trang)

Cybersecurity basic course for non technical users

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (76.9 KB, 3 trang )

CAPSTONE PROJECT REGISTER
Class:

Duration time: from …./…/2018 To

(*) Profession: <Software Engineer>

Specialty:

…/… /2018

<ES>

<IS>

<IA>

x
(*) Kinds of person make registers:

Lecturer

Students
x

1. Register information for supervisor (if have)
Full name

Phone

E-Mail



Title

Supervisor 1
Supervisor 2

2. Register information for students (if have)

Student 1

Full name

Student
code

Phone

Nguyen Tan
Danh

091850877
4


n

E-mail

Role in
Group


Student 2
Student 3
Student 4

3. Register content of Capstone Project
(*) 3.1. Capstone Project name:
English: Cybersecurity Basic Course for Non-Technical Users
Vietnamese: Khóa học cơ bản về An Ninh Mạng cho những người không chuyên về IT
Abbreviation:
- Cybersecurity Course
- Context:
11.14-BM/DH/HDCV/FU 1/0

Leader


+ Non- Technical users when use netwok computer to check mail, use internet banking,
access the website: often encountered risks such be attak. Hackers to send links to mail to steal
User name, password Email, credit card information, steal information on Web Server,… due to
users do not have basic knowledge of Cyber security.
Building the system provides following services:
To non-teachnical users have basic knowledge of Cyber security, suggent risks when using
network computer. Capstone project Building a Knowledge Base of Cybersecurity and Creating
Understanding through Practical Exercises. Through the lessons, users will have basic
knowledge about CyberSecurity
Simulator:
- VWS is composed of two phases:
+ Phases I: Building a Knowledge Base
• Cyber Introdution

• Cross Site Scripting
• SQL Injection
• Remote File Inclusion
+ Phases II: Creating Understanding through Practical Exercises is designed to allow
students to go through hands-on tutorials of three categories of exploits: Cross-Site Scripting,
SQL Injection, and Remote File Inclusion. Each of these lessons include an introduction and
information about the attack followed by a guided practical exercise that allows students to
conduct reconnaissance to determine if a system is vulnerable to the attack, and then to conduct
the exploit in a safe, air gapped network enviroment.
(*) 3.2. Main proposal content (including result and product)
a) Theory and practice (document):
Students use the software and curriculum of VWS is available as a free
download from on our website
Software artifacts include User Requirement, Software Requirement Specification,
Architecture Design, Detail Design, System Implementation and Testing Document,
Installation Guide, sources code, and deployable software packages.
-

Server side technique:
Net technology, Databsae, DNS, DHCP, Wireshare, Tools securiry, …

-

Client side technique:
Oracle Virtualbox, VMWare Workstation, HTML5, PHP,Java Script,…
Communication technique:
o Exchange information and transfer data in effective in networks

Research:
Advanced Cybersecurity, Design Cybersecurity Lessons, Software

VWS
b) Program:
11.14-BM/DH/HDCV/FU 1/0


-

Main functions:
Computer and Virtual machine applications for Non- technical users

c) Other products:
All of management functions of the system must be implemented to
support the operating system in best.
-. Papers

4. Other comment (propose all relative thing if have)
N/A
Supervisor (If have)
(Sign and full name)

Nguyễn Tấn Danh

11.14-BM/DH/HDCV/FU 1/0

HCM city, date 20/09/2018
On behalf of Registers
(Sign and full name)




×