Addresses intrusion detection and response systems and measures to build a secure infrastructure for assessing, monitoring, and preventing. The main aim of this lab is to equip the TG with the skills and knowledge to detect and respond to cyber security breaches by taking into account some of the following topics: Novel sources and types of cyber-attacks in Industry 4.0, Attack techniques tools, Vulnerability scanning tools, Anti-malware, anti-virus and firewall software, Threat modeling, Security attack pathologies, Prevention of Data Leak, and Securing the Supply Chain.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.