Last active
January 14, 2021 18:33
-
-
Save 0rdinal/d96bb37cc050fee81092c2c5a79959d9 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Y1: | |
Robust Software Development: | |
* algorithm analysis - A LEVEL & Development of my own software | |
* programming concepts - A LEVEL & Development of my own software | |
* data structures - A LEVEL & F4MP Project | |
* software development methods - A LEVEL | |
* group development - F4MP Project | |
Systems Systems & Architecture: | |
* assembly language analysis - Online Challenges (Cyber Discovery, Immersive Labs) & F4MP Project | |
* architecture of a processor - A Level | |
* compare system abstractions to reality - A Level & Physics (limited knowledge) | |
Discrete Structures (Primitive Data Structs): | |
* model real world problems - A Level | |
Networks, Communication & Cyber Defence: | |
* principles of networks & protocol layers - A LEVEL | |
* TCP/IP Layer / OSI Model - A LEVEL & F4MP & Personal Projects & BTEC IT | |
* TCP/UDP Protocols - A LEVEL | |
* Network hardware (switches, routers...) - A LEVEL | |
Operating Systems in Cyber: | |
* Operation of an OS - A LEVEL & Personal knowledge and research (youtube) | |
* Memory & File management - Personal knowledge | |
* Algorithms & Data structures used in OS - LIMITED/NONE | |
* Security & Protection Mechanisms - LIMITED/NONE | |
* Concurrency - Personal Projects (discord bots) | |
Information Risk Management: | |
* Regulations & their consequences - Immersive Labs | |
* Identification & Assessment of risk - Immersive Labs | |
* Economical application of mitigations - Immersive Labs | |
* Systematicly addressing threats - Immersive Labs | |
* International Standards - LIMITED/NONE | |
* Risk Assessment & Accreditation - Immersive Labs | |
* Security policies - Immersive Labs | |
Y2: | |
Software Engineering in Cyber Content: | |
* Software engineering process - F4MP MOD & A Level | |
* Concepts & Principles of above - A Level | |
* project management - F4MP MOD (A LOT) | |
* design, verification, evolution - Limited F4MP | |
* Reliable & Secure Software development - LIMITED/NONE | |
Programming Lanaguages for Cyber Security: | |
* Developing small programs - LONG TERM EXPERIENCE IN PYTHON | |
* Evaluate different paradigms - LIMITED | |
* OOP, Functional & Event-driven programming - LIMITED | |
* compiler analysis - NO KNOWLEDGE HERE AT ALL | |
Human Behaviours: | |
* Human-Computer relationship - Personal Experience | |
* User centred design - LIMITED | |
* Human factors in security - Personal Research | |
Implementing Secure Systems: | |
* Human and Technological Trust - Personal Projects in Python (django) | |
* Token systems - Personal Projects in Python (django) | |
* Design secure systems architecture - LIMITED/NONE | |
* Cryptographic techniques - LIMITED | |
Information Management: | |
* Apply security concepts - SOME experience from personal projects | |
* User requirements/brief - BTEC & A level Project | |
* Databases (Normalisation, Relational) - A LEVEL | |
* Access control - NONE | |
Information Security Management: | |
* Policy and Audit process - NONE | |
* Legal & Regulatory requirements - A Level (LIMITED) | |
Y3: | |
Low-level Tools & Techniques: | |
* Static & Dynamic Analysis - F4MP Project & Cyber Discovery | |
* Network Traffic Analysis - Cyber Discovery & Others | |
* Code obfuscation identification - NONE | |
* Handling potential malware - NONE | |
* Machine Code - F4MP & Cyber Discover & Others and A LEVEL | |
* REVERSE ENGINEERING - F4MP & Cyber Discovery & Immersive Labs | |
* De-Obfuscation - NONE | |
Data Science, Algorithms & Complexity: | |
* Algorithm evaluation - A Level | |
* Time complexity (Big O notation?) - A level | |
Operational Security: | |
* Anticipate negative actions (intentional or otherwise) - NONE | |
* Evaluate vulnerabilities by probing - Cyber Discovery | |
* Manage resources in response to threat - NONE | |
* Cryptography - Cyber Discovery (LIMITED) | |
* Network, System & Application security - LIMITED | |
* vulnerability assessment - SOME (Cyber Discovery) | |
* robust systems - LIMITED/NONE | |
Incident Response Management: | |
* Formulation of Incident Response Plan - NONE | |
* Post response evaluation - NONE | |
* Investigate footprints & other artefacts - LIMITED (PCAP ANALYSIS) | |
* Report findings to non-specialists - NONE | |
PREPARATION FOR DEGREE: | |
* - Knowledge limited in this but mention anyway | |
A Level - {Software Development, Programming Concepts, Systems Architecture, Networks & Protocol Layers, Algorithms & Complexity, Hardware Architecture} | |
F4MP Project - {Collaborative Development, Networking, Project Management, *Development Cycle, *Reverse Engineering} | |
Courses & Challenges - {Binary Analysis, Forensics, Reverse Engineering, Static & Dynamic Analysis, Ethical Hacking, Cryptography, *Risk Management} | |
Misc Projects - {Software Development, Concurrency, Networking, *Human Behaviour} | |
Articles, YouTube etc - {Operating Systems, Ethical Hacking, Software Development, Networking, *Information Management} | |
ASPECTS OF THE COURSE YOU ANTICIPATE BEING MOST CHALLENGING | |
1 ) Learning C. Lots of experience in high level (Python), limited in low level. Steep Learning Curve. No OOP | |
2 ) Reverse Engineering. Very steep learning curve, many pitfalls. Can take hours. | |
ASPECTS OF THE COURSE YOU ANTICIPATE BEING MOST FULFILLING | |
1 ) Reverse Engineering - Absolutely love the challenge, great feeling once done. Loved it from experience | |
2 ) Collaborative Development - Getting into flow with others on a central project is incredibly fulfilling. Love "throwing stuff at the wall and seeing what sticks" |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment