THREAT2023 Summer School Schedule
Proposed Summer School Program
Detailed schedule will be made availible soon.
Registration, Opening and Welcome
Session One
Embarking on a Digital Odyssey: Exploring Cybersecurity
Introduction of delegates, lecturers, Overview, aims and objectives Introduction to cybersecurity, principles and core concepts Understanding risk: threats, vulnerabilities, and impacts Network infrastructure basics Securing the Network
Networking Break
Session Two
Behind Enemy Lines: Tactics and Motivations of Modern Cyber Threat Actors
Organised Cybercrime (A Technical Analysis) Social engineering, Ransomware and other forms of malware Emerging Threats and Attack Vectors, APTs and targeted attacks Cybersecurity Awareness Cloud computing models and related security issues
Lunch
Session Three
Cracking the Code: Delving into the Intriguing World of Classical Cryptography
Introduction to Classical Cryptography DES, 3DES, PKI, Digital Signatures RSA, ECDSA, Blockchain
Recap day one and preview of the day ahead
Session Four
Steering the Cyber Ship: Navigating the Challenges of Effective Cybersecurity Management
Identification, Authentication and Access Control Cybersecurity Response Plans (Incidence, Disaster Recovery) Security Information and Event Management (SIEM) systems Cybersecurity frameworks, Building an Organisational Cybersecurity Strategy and Business Case
Networking Break
Session Five
Guardians of the Digital Realm: Mastering Privacy and Data Protection in the Information Age
POPIA, GDPR, Regional frameworks, CERTS, Cross-border regulations, Challenges in legislating cybersecurity
Lunch
Session Six
Mysterious Destinations: An Exclusive Cybersecurity Site Visit
A visit is planned to a major IT installation in Cape Town. The visit will conclude with a sponsored cocktail party.
Recap day two and preview of the day ahead
Session Seven
Fortifying the Digital Frontier: Exploring AI-Powered Cybersecurity Strategies
AI and Machine Learning Basics applied to Threat Detection and Prevention, Anomaly Detection. Using Natural Language Processing for Phishing Detection Implementing AI-driven, risk-based authentication methods that dynamically adjust security measures based on user behaviour and contextual factors. AI and Privacy Concerns: Discussing the ethical implications and potential risks associated with using AI technologies for cybersecurity, and how to address privacy concerns. The role of AI in securing the metaverse, autonomous blockchain applications
Lunch
Session Eight
Quantum Leaps in Cybersecurity: Unravelling the Potential of Quantum Computing for Next-Generation Defence