Skip to content

Instantly share code, notes, and snippets.

@0rdinal
Last active January 14, 2021 18:33
Show Gist options
  • Save 0rdinal/d96bb37cc050fee81092c2c5a79959d9 to your computer and use it in GitHub Desktop.
Save 0rdinal/d96bb37cc050fee81092c2c5a79959d9 to your computer and use it in GitHub Desktop.
Y1:
Robust Software Development:
* algorithm analysis - A LEVEL & Development of my own software
* programming concepts - A LEVEL & Development of my own software
* data structures - A LEVEL & F4MP Project
* software development methods - A LEVEL
* group development - F4MP Project
Systems Systems & Architecture:
* assembly language analysis - Online Challenges (Cyber Discovery, Immersive Labs) & F4MP Project
* architecture of a processor - A Level
* compare system abstractions to reality - A Level & Physics (limited knowledge)
Discrete Structures (Primitive Data Structs):
* model real world problems - A Level
Networks, Communication & Cyber Defence:
* principles of networks & protocol layers - A LEVEL
* TCP/IP Layer / OSI Model - A LEVEL & F4MP & Personal Projects & BTEC IT
* TCP/UDP Protocols - A LEVEL
* Network hardware (switches, routers...) - A LEVEL
Operating Systems in Cyber:
* Operation of an OS - A LEVEL & Personal knowledge and research (youtube)
* Memory & File management - Personal knowledge
* Algorithms & Data structures used in OS - LIMITED/NONE
* Security & Protection Mechanisms - LIMITED/NONE
* Concurrency - Personal Projects (discord bots)
Information Risk Management:
* Regulations & their consequences - Immersive Labs
* Identification & Assessment of risk - Immersive Labs
* Economical application of mitigations - Immersive Labs
* Systematicly addressing threats - Immersive Labs
* International Standards - LIMITED/NONE
* Risk Assessment & Accreditation - Immersive Labs
* Security policies - Immersive Labs
Y2:
Software Engineering in Cyber Content:
* Software engineering process - F4MP MOD & A Level
* Concepts & Principles of above - A Level
* project management - F4MP MOD (A LOT)
* design, verification, evolution - Limited F4MP
* Reliable & Secure Software development - LIMITED/NONE
Programming Lanaguages for Cyber Security:
* Developing small programs - LONG TERM EXPERIENCE IN PYTHON
* Evaluate different paradigms - LIMITED
* OOP, Functional & Event-driven programming - LIMITED
* compiler analysis - NO KNOWLEDGE HERE AT ALL
Human Behaviours:
* Human-Computer relationship - Personal Experience
* User centred design - LIMITED
* Human factors in security - Personal Research
Implementing Secure Systems:
* Human and Technological Trust - Personal Projects in Python (django)
* Token systems - Personal Projects in Python (django)
* Design secure systems architecture - LIMITED/NONE
* Cryptographic techniques - LIMITED
Information Management:
* Apply security concepts - SOME experience from personal projects
* User requirements/brief - BTEC & A level Project
* Databases (Normalisation, Relational) - A LEVEL
* Access control - NONE
Information Security Management:
* Policy and Audit process - NONE
* Legal & Regulatory requirements - A Level (LIMITED)
Y3:
Low-level Tools & Techniques:
* Static & Dynamic Analysis - F4MP Project & Cyber Discovery
* Network Traffic Analysis - Cyber Discovery & Others
* Code obfuscation identification - NONE
* Handling potential malware - NONE
* Machine Code - F4MP & Cyber Discover & Others and A LEVEL
* REVERSE ENGINEERING - F4MP & Cyber Discovery & Immersive Labs
* De-Obfuscation - NONE
Data Science, Algorithms & Complexity:
* Algorithm evaluation - A Level
* Time complexity (Big O notation?) - A level
Operational Security:
* Anticipate negative actions (intentional or otherwise) - NONE
* Evaluate vulnerabilities by probing - Cyber Discovery
* Manage resources in response to threat - NONE
* Cryptography - Cyber Discovery (LIMITED)
* Network, System & Application security - LIMITED
* vulnerability assessment - SOME (Cyber Discovery)
* robust systems - LIMITED/NONE
Incident Response Management:
* Formulation of Incident Response Plan - NONE
* Post response evaluation - NONE
* Investigate footprints & other artefacts - LIMITED (PCAP ANALYSIS)
* Report findings to non-specialists - NONE
PREPARATION FOR DEGREE:
* - Knowledge limited in this but mention anyway
A Level - {Software Development, Programming Concepts, Systems Architecture, Networks & Protocol Layers, Algorithms & Complexity, Hardware Architecture}
F4MP Project - {Collaborative Development, Networking, Project Management, *Development Cycle, *Reverse Engineering}
Courses & Challenges - {Binary Analysis, Forensics, Reverse Engineering, Static & Dynamic Analysis, Ethical Hacking, Cryptography, *Risk Management}
Misc Projects - {Software Development, Concurrency, Networking, *Human Behaviour}
Articles, YouTube etc - {Operating Systems, Ethical Hacking, Software Development, Networking, *Information Management}
ASPECTS OF THE COURSE YOU ANTICIPATE BEING MOST CHALLENGING
1 ) Learning C. Lots of experience in high level (Python), limited in low level. Steep Learning Curve. No OOP
2 ) Reverse Engineering. Very steep learning curve, many pitfalls. Can take hours.
ASPECTS OF THE COURSE YOU ANTICIPATE BEING MOST FULFILLING
1 ) Reverse Engineering - Absolutely love the challenge, great feeling once done. Loved it from experience
2 ) Collaborative Development - Getting into flow with others on a central project is incredibly fulfilling. Love "throwing stuff at the wall and seeing what sticks"
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment