intellectual output...“investigating, developing and providing awareness about innovative lesson...

22

Upload: others

Post on 05-Jun-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Intellectual Output...“Investigating, Developing And Providing Awareness About Innovative Lesson Syllabus Implemented in Cyber Security Technologies in Information Technologies”
Page 2: Intellectual Output...“Investigating, Developing And Providing Awareness About Innovative Lesson Syllabus Implemented in Cyber Security Technologies in Information Technologies”

“Investigating, Developing And Providing

Awareness About Innovative Lesson

Syllabus Implemented in Cyber Security

Technologies in Information Technologies”

Intellectual Output – 3

“QR Code Table Related to Cyber Security”

COOPERATION FOR INNOVATION AND THE EXCHANGE OF GOOD PRACTICES

Strategic Partnerships for Vocational Education and Training

Project Number:2016-1-TR01-KA202-034434

This project has been funded with support from the European Commission. This publication reflects the views only of the author, and the Commission cannot be held responsible for any use which may be made of the information contained therein.

Page 3: Intellectual Output...“Investigating, Developing And Providing Awareness About Innovative Lesson Syllabus Implemented in Cyber Security Technologies in Information Technologies”

INTELLECTUAL OUTPUT – 3 Module-1 QR Codes Table

Number Subject Detail QR Code

1 Arp Protocol

Module-1 –Part - 1 Chapter: 1.6 Page: 11

Sample: 1.1.1 Linkhttps://youtu.be/_wtdPDKlzOY

2 Ping

Module-1 – Part -1 Chapter: 1.9.1 Page:14

Sample: 1.1.2 Link: https://youtu.be/a1f51Qn1AEs

3 Traceroute

Module-1 –Part -1 Chapter: 1.9.2 Page:15 Sample: 1.1.3 Link: https://youtu.be/WO24nHzCaS8

4 DNS Protocol

Module-1 –Part -1 Chapter: 1.11 Page:16 Sample : 1.1.4 Link: https://youtu.be/IzQblvH_eiE

5 Sniffing

Attacks

Module-1 – Part-1 Chapter: 2.15.1 Page:27 Sample:1.2.1 Link: https://youtu.be/UrAnR5tjeug

6 Vanilla Scan

Module-1 – Part -1 Chapter: 4.2.1 Page:45 Sample:1.4.1 Link: https://youtu.be/t4ytY7R4Ic8

7 SYN Scan

Module-1 – Part -1 Chapter: 4.2.1 Page:46 Sample:1.4.2 Link: https://youtu.be/D-n0ExnqwB4

8 XMAS and FIN Scan

Module-1 – Part -1 Chapter: 4.2.1 Page:46 Sample:1.4.3 Link: https://youtu.be/RtGR_ngGW4o

Page 4: Intellectual Output...“Investigating, Developing And Providing Awareness About Innovative Lesson Syllabus Implemented in Cyber Security Technologies in Information Technologies”

9 Vulnerability

Scanners

Module-1 – Part -1 Chapter: 4.2.3 Page:46 Sample:1.4.4 Link: https://www.scanmyserver.com/

10 IP Spoofing

Module-1- Part -1 Chapter: 4.3 Page:47 Sample:1.4.5 Link: https://youtu.be/CXF69ZOSJTU

11

Ping sweep

Module-1- Part -1 Chapter: 4.3 Page:47 Sample: 1.4 .6 Link: https://youtu.be/a1f51Qn1AEs

12

Network Attack –

Digital Attack Map

Module-1- Part -1 Chapter: 4.3 Page:48 Sample: 1.4.7 Link: goo.gl/NKqxG9

13 Network Attack -

Norsecorp

Module-1- Part -1 Chapter: 4.3 Page:48 Sample: 1.4.8 Link: http://map.norsecorp.com/

14 Network Attack -

Kaspersky

Module-1- Part -1 Chapter: 4.3 Page:48 Sample: 1.4.9 Link: https://cybermap.kaspersky.com/

15 Virtual Private

Networks

Module-1- Part -1 Chapter: 4.3 Page:52 Sample: 1.4.10 Link: https://youtu.be/CXF69ZOSJTU

16 Whois

Module-1- Part -2 Chapter: 2.4 Page:15 Sample: 1.8.1 Link: https://youtu.be/Hq2xHdxoxD0

17 Regional

Module-1- Part -2 Chapter: 2.4 Page:16 Sample: 1.8.2 Link: https://youtu.be/h1-0ock1_Zw

Page 5: Intellectual Output...“Investigating, Developing And Providing Awareness About Innovative Lesson Syllabus Implemented in Cyber Security Technologies in Information Technologies”

18 Netcraft

Module-1- Part -2 Chapter: 2.4 Page:18 Sample: 1.8.3 Link: https://youtu.be/7oShhW9F2iA

19

Google Parameter

Search Example

Module-1- Part -2 Chapter: 2.4 Page:19 Sample: 1.8.4 Link: https://youtu.be/myQcnym6ZDM

20 Google Hacking

Database

Module-1- Part -2 Chapter: 2.4 Page:21 Sample: 1.8.5 Link: https://youtu.be/vztKUkBfqR0

21 Serversniff.net

Module-1- Part -2 Chapter: 2.5 Page:23 Sample: 1.8.6 Link: https://youtu.be/ZA4Uks2zepk

22 Hackertarget.

com

Module-1- Part -2 Chapter: 2.5 Page:23 Sample: 1.8.7 Link: https://youtu.be/IwVtXuCxCKQ

23 Wafw00f

Module-1- Part -2 Chapter: 2.6 Page:26 Sample: 1.8.8 Link: https://youtu.be/oE2poO9QOA0

24

Mx Record and Port

Information Query

Module-1- Part -2 Chapter: 2.6 Page:27 Sample: 1.8.9 Link: https://youtu.be/dSSSnwZ2UHk

25 Nmap

Command

Module-1- Part -2 Chapter: 2.9 Page:30 Sample: 1.8.10 Link: https://youtu.be/ZapO7BCbTuw

26 Zenmap

Module-1- Part -2 Chapter: 2.10.1 Page:31 Sample: 1.8.11 Link: https://youtu.be/1fIcHHPCTPg

Page 6: Intellectual Output...“Investigating, Developing And Providing Awareness About Innovative Lesson Syllabus Implemented in Cyber Security Technologies in Information Technologies”

27 nmap – Sp

Module-1- Part -2 Chapter: 2.10.2 Page:33 Sample: 1.8.12 Link: https://youtu.be/DZzIcvCIquY

28 nmap – v

Module-1- Part -2 Chapter: 2.10.2 Page:33 Sample: 1.8.13 Link: https://youtu.be/wX9KCkZoPyY

29 nmap – sV

Module-1- Part -2 Chapter: 2.10.2 Page:34 Sample: 1.8.14 Link: https://youtu.be/JWFVbZP7ZVw

30 nmap – O

Module-1- Part -2 Chapter: 2.10.2 Page:35 Sample: 1.8.15 Link: https://youtu.be/QAvNW6fCCfc

31 Nmap -p -O -sV Parameter

Module-1- Part -2 Chapter: 2.10.2 Page:35 Sample: 1.8.16 Link: https://youtu.be/4YQd4naywtM

32 Nmap Top

Ports

Module-1- Part -2 Chapter: 2.10.2 Page:35 Sample: 1.8.17 Link: https://youtu.be/acF1xxqDAUg

33 Nmap File Writting

Module-1- Part -2 Chapter: 2.10.2 Page:36 Sample: 1.8.18 Link: https://youtu.be/TwfR-CV858Y

34 Cat Command

Module-1- Part -2 Chapter: 2.10.2 Page:36 Sample: 1.8.19 Link: https://youtu.be/ivIBoQViVpw

Page 7: Intellectual Output...“Investigating, Developing And Providing Awareness About Innovative Lesson Syllabus Implemented in Cyber Security Technologies in Information Technologies”

INTELLECTUAL OUTPUT – 3 Module-2 QR Codes Table

Number Subject Detail QR Code

1

How Mobility is Changing the Way We Live, Work, Play, and

Learn

Module-2 –Block - 1 https://www.youtube.com/watch?v=7c949LI9ZNs

Ref: Cisco network academy, Cisco and the New Normal

2

SATA vs SAS hard drives what’s the difference?

Module-2 –Block - 1 https://www.youtube.com/watch?v=zriUU5SuKOw&t=84s Ref: “SATA vs SAS Hard Drives Whats the Difference?” YouTube, YouTube, 8 Oct. 2013, www.youtube.com/watch?v=zriUU5SuKOw&t=84s.

3

Introduction to TCP/IP

Module-2 –Block - 2 https://www.youtube.com/watch?v=b9HafRqtVWc

Ref: lamonml. “Introduction to TCP/IP.” YouTube, YouTube, 11 Nov. 2015,

4

Computer Networks LANs and

WANs

Module-2 –Block - 2 https://www.youtube.com/watch?v=IxO4WQzdOfA

Ref: ahardinjr. “Computer Networks LANs and WANs.” YouTube, YouTube, 11 Sept. 2015, www.youtube.com/watch?v=IxO4WQzdOfA.

5

Hub, Switch or Router? Network Devices

Explained

Module-2 –Block - 2 https://www.youtube.com/watch?v=Ofjsh_E4HFY

Ref: PieterExplainsTech. “Hub, Switch or Router? Network Devices Explained.” YouTube, YouTube, 30 Jan. 2014,

6

Thin and Thick Clients

Module-2 –Block - 3

https://www.youtube.com/watch?v=Ay-uDaLV1NI

Ref: “Thin and Thick Clients.” YouTube, YouTube, 21 July 2016, www.youtube.com/watch?v=Ay-uDaLV1NI.

Page 8: Intellectual Output...“Investigating, Developing And Providing Awareness About Innovative Lesson Syllabus Implemented in Cyber Security Technologies in Information Technologies”

7

IP Addresses and

Subnetting

Module-2 –Block - 3

https://www.youtube.com/watch?v=rs39FWDhzDs

Ref: thenetworkingdoctors. “IP Addresses and Subnetting.” YouTube, YouTube, 30 Jan. 2012, www.youtube.com/watch?v=rs39FWDhzDs.

8

HP Elitebook Revolve Tablet

First Look

Module-2 –Block - 3

https://www.youtube.com/watch?v=ruAS3oKwnKU

Ref: notebooks. “HP Elitebook Revolve Tablet First Look.” YouTube, YouTube, 4 Dec. 2012, www.youtube.com/watch?v=ruAS3oKwnKU.

Page 9: Intellectual Output...“Investigating, Developing And Providing Awareness About Innovative Lesson Syllabus Implemented in Cyber Security Technologies in Information Technologies”

INTELLECTUAL OUTPUT – 3 Module-3 QR Codes Table

Number Subject Detail QR Code

1 Wireless Security:

Introduction

Module 3 Chapter:1 Page: 4 Issue: IEEE 802.11 Link: https://en.wikipedia.org/wiki/IEEE_802.11

2 CSMA/CA

Module 3 Chapter:1 Page: 5 Issue: Carrier-sense multiple access with collision avoidance Link: https://en.wikipedia.org/wiki/Carrier-sense_multiple_access_with_collision_avoidance

3 Types of wireless attacks

Module 3 Chapter:1 Page: 11 Issue: : Wireless security Link: https://en.wikipedia.org/wiki/Wireless_security

4 Firewalls:

Introduction

Module 3 Chapter:2 Page: 4 Issue: Firewall Link: https://en.wikipedia.org/wiki/Firewall_(computing)

5 Application

gateway firewalls

Module 3 Chapter:2 Page: 6 Issue: Application-level gateway Link: https://en.wikipedia.org/wiki/Application-level_gateway

6

Network Address Translation (NAT)

Module 3 Chapter:2 Page: 9 Issue: Network address translation Link: https://en.wikipedia.org/wiki/Network_address_translation

7 Firewall rules

Module 3 Chapter:3 Page: 10 Issue: Interaction with Other Firewall Rules Link: https://docs.microsoft.com/en-us/sql/sql-server/install/configure-the-windows-firewall-to-allow-sql-server-access?view=sql-server-2017#BKMK_other_rules

Page 10: Intellectual Output...“Investigating, Developing And Providing Awareness About Innovative Lesson Syllabus Implemented in Cyber Security Technologies in Information Technologies”

8 IDS

Module 3 Chapter:3 Page: 12 Issue: IDS/IPS Link: https://www.snort.org/

9 Incident

Response Procedures

Module 3 Chapter:4 Page: 6 Issue: NIST Special Publication 800-61 Revision 2 Link: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf

Page 11: Intellectual Output...“Investigating, Developing And Providing Awareness About Innovative Lesson Syllabus Implemented in Cyber Security Technologies in Information Technologies”

INTELLECTUAL OUTPUT – 3 Module-4 QR Codes Table

Number Subject Detail QR Code

1

Network Security Layers:

Introduction

Module 4 Chapter:1 Page: 3 Issue: More Info: Layered security (techopedia.com). Link: https://www.techopedia.com/definition/4005/layered-security

2

Network Security Layers:

Introduction

Module 4 Chapter:1 Page: 4 Issue: More Info: Defence In-Depth (SANS Institute). Link: https://www.sans.org/security-resources/glossary-of-terms/.

3

Network Security Layers:

Introduction

Module 4 Chapter:1 Page: 4 Issue: More Info: Defence In-Depth (techopedia.com) Link:https://www.techopedia.com/definition/16509/defense-in-depth.

4

Network Security Layers:

Introduction

Module 4 Chapter:1 Page: 5 Issue: More Info: Multi-layer Defence In-Depth approach (SANS). Link:https://www.sans.org/reading-room/whitepapers/protocols/applying-osi-layer-network-model-information-security-1309

5 Mantraps

Module 4 Chapter:1 Page: 6 Issue: More Info: Mantrap tailgating prevented (newtonsecurityinc.com). Link: https://youtu.be/g2SRmwyzLtY

6 Mantraps

Module 4 Chapter:1 Page:7 Issue: More Info: Security interlock control system (recorduk.co.uk). Link: https://www.youtube.com/watch?v=C7K7PhuZSkU

Page 12: Intellectual Output...“Investigating, Developing And Providing Awareness About Innovative Lesson Syllabus Implemented in Cyber Security Technologies in Information Technologies”

7 Alarm

Module 4 Chapter:1 Page:12 Issue: Practice: Windows login notification Link: https://youtu.be/drZYb8yooYQ

8 Linux Security Components

Module 4 Chapter:2 Page:4 Issue: More info: Linux and the GNU System (GNU Operating system) Link: Linux and the GNU System (http://www.gnu.org/gnu/linux-and-gnu.en.html)

9 Linux Security Components

Module 4 Chapter:2 Page:5 Issue: More info: What is GNU/Linux? Link: https://www.debian.org/releases/jessie/amd64/ch01s02.html.en

10 Basic Unix

security

Module 4 Chapter:2 Page:5 Issue: More info: GNU Manifesto Link: http://www.gnu.org/gnu/manifesto.en.html

11

Permissions

Module 4 Chapter:2 Page:7 Issue: More info: “Introduction to Linux” (tldp.org) Link: http://www.tldp.org/LDP/intro-linux/html/sect_03_04.html

12 Software

management

Module 4 Chapter:2 Page:8 Issue: Practise: Software management Link: https://youtu.be/mhdtFid7GXg

13 Passwords

Module 4 Chapter:2 Page:10 Issue: More info: Normal UNIX authentication (debian.org) Link: https://www.debian.org/doc/manuals/debian-reference/ch04.en.html#_normal_unix_authentication

14 Passwords

Module 4 Chapter:2 Page:10 Issue: Practise: Passwords Link: https://youtu.be/k3IIV7BZS6g

Page 13: Intellectual Output...“Investigating, Developing And Providing Awareness About Innovative Lesson Syllabus Implemented in Cyber Security Technologies in Information Technologies”

15 Limiting root

access

Module 4 Chapter:2 Page:10 Issue: Practise: Limiting root access Link: https://youtu.be/kSBxN2oAr1I

16 Setting login, process and

memory limits

Module 4 Chapter:2 Page:11 Issue: Practise: Setting login, process and memory limits Link: https://youtu.be/jtCCbZCVbZc

17 Configuring

SSH

Module 4 Chapter:2 Page:12 Issue: More info: ssh command manpages (debian.org) Link: https://manpages.debian.org/stretch/openssh-client/ssh.1.en.html

18 Configuring

SSH

Module 4 Chapter:2 Page:12 Issue: More info: The ssh configuration file manapges (debian.org) Link: https://manpages.debian.org/stretch/openssh-client/ssh_config.5.en.html

19 GPG

encryption

Module 4 Chapter:2 Page:13 Issue: Practise: GPG encryption Link: https://youtu.be/OiPAi8QkCB8

20

FHS (File System

Hierarchy Standard)

Module 4 Chapter:2 Page:13 Issue: More info: Filesystem Hierarchy Standard (FHS Link: : http://www.pathname.com/fhs/

21

Linux files used to manage network functions

Module 4 Chapter:2 Page:18 Issue: More info: Linux Debian basic network infrastructure (debian.org) Link: https://www.debian.org/doc/manuals/debian-reference/ch05.en.html#_the_basic_network_infrastructure

22

EFS

(Encrypting

File System)

Module 4 Chapter:2 Page:20 Issue: More info: cipher.exe utility on Windows environment (technet.microsoft.com

Page 14: Intellectual Output...“Investigating, Developing And Providing Awareness About Innovative Lesson Syllabus Implemented in Cyber Security Technologies in Information Technologies”

Link: https://technet.microsoft.com/en-us/library/cc771346(v=ws.11).aspx

23

BitLocker

Drive

Encryption

Module 4 Chapter:2 Page:20 Issue: More info: Bitlocker (technet.microsoft.com) Link: https://technet.microsoft.com/en-us/library/hh831713(v=ws.11).aspx

24 BitLocker

Drive Encryption

Module 4 Chapter:2 Page:20 Issue: More info: BitLocker Drive Encryption Overview (technet.microsoft.com) Link: https://technet.microsoft.com/en-us/library/cc732774(v=ws.11).aspx

25 UAC (User Account Control)

Module 4 Chapter:2 Page:22 Issue: More info: User Account Control overview (Microsoft) Link: https://technet.microsoft.com/en-us/library/jj574089(v=ws.11).aspx

26 UAC (User Account Control)

Module 4 Chapter:2 Page:22 Issue: Practise: User Account Control Step-by-Step Guide (Microsoft) Link:

27 Active

directory

Module 4 Chapter:2 Page:23 Issue: More info: Rights Management Services (AD RMS) (technet.microsoft.com) Link: https://technet.microsoft.com/library/hh831364

28

Windows server

authentication methods

Module 4 Chapter:2 Page:26 Issue: More info: Windows authentication methods (technet.microsoft.com) Link: https://technet.microsoft.com/en-us/library/hh831472(v=ws.11).aspx#Anchor_1

29 NTLM

authentication

Module 4 Chapter:2 Page:27 Issue: More info: NTLM Authentication protocol (msdn.microsoft.com) Link: https://msdn.microsoft.com/en-us/library/cc236621.aspx

Page 15: Intellectual Output...“Investigating, Developing And Providing Awareness About Innovative Lesson Syllabus Implemented in Cyber Security Technologies in Information Technologies”

30 Kerberos

authentication

Module 4 Chapter:2 Page:28 Issue: More info: Microsoft Kerberos (msdn.microsoft.com) Link: https://msdn.microsoft.com/en-us/library/windows/desktop/aa378747(v=vs.85).aspx.

31 Security

Configuration Wizard (SCW)

Module 4 Chapter:2 Page: 30 Issue: More info: Server Hardening - Windows Server 2012 (Microsoft Security TechCenter) Link: https://technet.microsoft.com/en-us/security/jj720323.aspx

32 Security

Configuration Wizard (SCW)

Module 4 Chapter:2 Page:30 Issue: More info: Windows Security Configuration Wizard (technet.microsoft.com) Link: https://technet.microsoft.com/en-us/library/cc754997.aspx

33 Secedit and

security templates

Module 4 Chapter:2 Page:32 Issue: More info: secedit utility (technet.microsoft.com) Link: https://technet.microsoft.com/library/hh875548.aspx

34 GPUpdate

Module 4 Chapter:2 Page:33 Issue: More info: Gpupdate utility (technet.microsoft.com) Link: https://technet.microsoft.com/en-us/library/bb490983.aspx

35 Group Policy

troubleshooting

Module 4 Chapter:2 Page:34 Issue: More info: Gpresult utility (technet.microsoft.com) Link: https://technet.microsoft.com/en-us/library/cc733160.aspx

36 AppLocker

Module 4 Chapter:2 Page:34 Issue: More info: Administer Software Restriction Policies (SRP) Link: https://technet.microsoft.com/en-us/library/hh994606.aspx

Page 16: Intellectual Output...“Investigating, Developing And Providing Awareness About Innovative Lesson Syllabus Implemented in Cyber Security Technologies in Information Technologies”

37 VLAN

Module 4 Chapter:3 Page:6 Issue: More info: Understanding and Configuring VLANs – Overview of VLANs (Cisco) Link: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-2/25ew/configuration/guide/conf/vlans.html#wp1020364

38 802.1x

Module 4 Chapter:3 Page:9 Issue: More info: Implementation IEEE 802.1x for Wired Networks (SANS) Link: https://www.sans.org/reading-room/whitepapers/access/implementing-ieee-8021x-wired-networks-34520

39 Software failures

Module 4 Chapter:4 Page:5 Issue: More info: Murphy’s law (Wikipedia) Link: https://en.wikipedia.org/wiki/Murphy%27s_law

40

Software Quality

Assurance (SQA)

Module 4 Chapter:4 Page:8 Issue: More info: What is Software Quality Assurance? (Dr. Linda H. Rosenberg – NASA) Link: http://static1.1.sqspcdn.com/static/f/702523/9339442/1289318061700/200205-Rosenberg.pdf?token=fvXptKFsZM%2BSstvUEn5PKoL5S2I%3D

41 Computerised

SCM tools

Module 4 Chapter:4 Page:12 Issue: More info: 828-2012 IEEE Standard for Configuration Management in Systems and Software Engineering. 2012. (IEEE Xplore Digital Library) Link: http://ieeexplore.ieee.org/document/6170935/?reload=true

42 Computerised

SCM tools

Module 4 Chapter:4 Page:12 Issue: More info: Software Configuration Management Link: https://www.youtube.com/watch?v=AaHaLjuzUm8

Page 17: Intellectual Output...“Investigating, Developing And Providing Awareness About Innovative Lesson Syllabus Implemented in Cyber Security Technologies in Information Technologies”

43 RSA algorithm

Module 4 Chapter:5 Page:7 Issue: More info: RSA Operation (Wikipedia) Link: https://simple.wikipedia.org/wiki/RSA_(algorithm)#Operation

44 Securing the e-

mail process

Module 4 Chapter:5 Page:10 Issue: More info: Announcement of the European Court of Human Rights about the Article 8 of the Convention Link: http://www.echr.coe.int/Documents/Press_Q_A_Barbulescu_ENG.PDF

45 Database

encryption

Module 4 Chapter:6 Page:13 Issue: More info: Hack of the credit firm Equifax in 2017 (New York Times) Link: https://www.nytimes.com/2017/09/14/business/equifax-hack-what-we-know.html

46 Database

encryption

Module 4 Chapter:6 Page: 13 Issue: More info: Hack of the credit firm Equifax in 2017 (The Guardian) Link: https://www.theguardian.com/technology/2017/sep/19/equifax-credit-firm-march-breach-massive-may-hack-customers

47 Database

encryption

Module 4 Chapter:6 Page:13 Issue: More info: Hack of the credit firm Equifax in 2017 (BBC) Link: http://www.bbc.com/news/business-41575188

48 Database

encryption

Module 4 Chapter:6 Page:13 Issue: More info: Hack of the credit firm Equifax in 2017 (Databreaches.net) Link: https://www.databreaches.net/equifax-umm-actually-hackers-stole-records-of-15-2-million-brits-not-400000/

49 Database

encryption

Module 4 Chapter:6 Page:15 Issue: More info: Security Stored Data Using Transparent Data Encryption (Microsoft)

Page 18: Intellectual Output...“Investigating, Developing And Providing Awareness About Innovative Lesson Syllabus Implemented in Cyber Security Technologies in Information Technologies”

Link: https://technet.microsoft.com/en-us/library/bb934049(v=sql.110).aspx

50 Database

encryption

Module 4 Chapter:6 Page:15 Issue: More info: Security Stored Data Using Transparent Data Encryption (Oracle) Link: https://docs.oracle.com/cd/E11882_01/network.112/e40393/asotrans.htm#ASOAG600

Page 19: Intellectual Output...“Investigating, Developing And Providing Awareness About Innovative Lesson Syllabus Implemented in Cyber Security Technologies in Information Technologies”

INTELLECTUAL OUTPUT – 3 Module-5 QR Codes Table

Number Subject Detail QR Code

1

Introduction to Cloud

Computing

Module 5

Chapter 1, page 5

What is Cloud Computing

https://www.youtube.com/watch?v=uYGQcmZUTaw

2

Cloud Computing Essential

characteristics

Module 5

Chapter 1, page 7

Cloud Computing fundamentals

https://www.youtube.com/watch?v=uroryFU78gM

3

Cloud Computing

Service models

Module 5

Chapter 1, page 9

Cloud Computing Service models

https://www.youtube.com/watch?v=36zducUX16w

4

Cloud Computing deployment

models

Module 5

Chapter 1, page 13

Cloud Computing deployment models

https://www.youtube.com/watch?v=3WIJ4axzFlU

5

Cloud Computing

Security

Module 5

Chapter 2, page 15

Cloud Cumputing Security

https://www.youtube.com/watch?v=L-cC-JjYos0

6

Cloud Computing

Security

Module 5

Chapter 3, page 22

Security issues in Cloud Computing

https://www.youtube.com/watch?v=wI84CjHMKhk

7

Cloud Computing

management plane

Module 5

Chapter 4, page 26

What is Management Plane?

https://www.youtube.com/watch?v=YC-8vmf5ibk

Page 20: Intellectual Output...“Investigating, Developing And Providing Awareness About Innovative Lesson Syllabus Implemented in Cyber Security Technologies in Information Technologies”

8

Management plane and Business

Continuity

Module 5

Chapter 4, page 29

Business continuity in the Age of Cloud

https://www.youtube.com/watch?v=GH5B5HjUN6E

9

Cloud Computing

Infrastructure Security

Module 5

Chapter 5, page 31

Introduction to Infrastructure Security

https://www.youtube.com/watch?v=jaL2t934DN0

10

Cloud Infrastructure Virtualisation

Module 5

Chapter 5, page 31

Introduction to Virtualisation

https://www.youtube.com/watch?v=HFQdbOY8Ams

11

Immutable Infrastructure

Module 5

Chapter 5, page 39

Introduction to Immutable Infrastructure

https://www.youtube.com/watch?v=Ogtt2bETNZM

12 Security of

Cloud Storage

Module 5

Chapter 5, page 43

Issues in Cloud Storage Security

https://www.youtube.com/watch?v=55jdSe7Ro68

13

Virtualisation and

Containers

Module 5

Chapter 6, page 44

Containers Explained

https://www.youtube.com/watch?v=eLmUlR_1DMI

Page 21: Intellectual Output...“Investigating, Developing And Providing Awareness About Innovative Lesson Syllabus Implemented in Cyber Security Technologies in Information Technologies”
Page 22: Intellectual Output...“Investigating, Developing And Providing Awareness About Innovative Lesson Syllabus Implemented in Cyber Security Technologies in Information Technologies”

Please visit project web site and download this QRs

www.cybersecurityplus.org