Addresses intrusion detection and response systems and measures to build a secure infrastructure for assessing, monitoring, and preventing. The main aim of this lab is to equip the TG with the skills and knowledge to detect and respond to cyber security breaches by taking into account some of the following topics: Novel sources and types of cyber-attacks in Industry 4.0, Attack techniques tools, Vulnerability scanning tools, Anti-malware, anti-virus and firewall software, Threat modeling, Security attack pathologies, Prevention of Data Leak, and Securing the Supply Chain.
This website uses cookies to improve your experience. Necessary cookies ensure the smooth performance of the website and are definitely employed when the website is being used. Cookies from third parties are only activated for tracking purposes when you click on “Accept”. Read our Privacy Policy for more information about what we do with your data and how to manage cookies.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.