2024 Faculty Courses School of Computing Major courses
Attack and Defense on Cybersecurity II
- Academic unit or major
- Major courses
- Instructor(s)
- Keisuke Tanaka / Yoshinari Fukumoto / / Yuta Yamate / Masahiro Ishii
- Class Format
- Lecture/Exercise (Face-to-face)
- Media-enhanced courses
- -
- Day of week/Period
(Classrooms) - Intensive
- Class
- -
- Course Code
- XCO.T476
- Number of credits
- 110
- Course offered
- 2024
- Offered quarter
- 2-3Q
- Syllabus updated
- Mar 14, 2025
- Language
- Japanese
Syllabus
Course overview and goals
Cybersecurity is important for our daily lives including various types of activities. There is a growing demand for students who can be researchers and engineers capable of understanding cybersecurity. In order to satisfy this demand, Tokyo Tech has launched Progressive Graduate Minor in Cybersecurity in April 2016. We design the curriculum of Progressive Graduate Minor in Cybersecurity in collaboration with NRI as the core, also with Rakuten, NTT, AIST, and NISC. The following six courses are organized in School of Computing: Foundation of Cybersecurity (1Q, 2-0-0), Theory of Cryptography for Cybersecurity (3Q, 2-0-0), Cybersecurity Governance (4Q, 1-1-0), Attack and Defense on Cybersecurity I (2Q, 1-1-0), Attack and Defense on Cybersecurity II (2-3Q, 1-1-0), and Attack and Defense on Cybersecurity III (4Q, 1-1-0).
This course is one of the core courses in this minor and focuses on web security and digital forensics, the most important elements of cybersecurity. For web security, the class covers vulnerabilities (e.g. SQL injection) and demonstration of offensive techniques in web application. For digital forensics, it covers the importance of artifact analysis and how to apply the techniques to security incident investigation. The students will acquire practical knowledge and skills from an attack and defense perspective in cybersecurity.
Course description and aims
By the end of this course, students will be able to understand:
1) Vulnerabilities, offensive techniques, and countermeasures for web security
2) Fundamentals of digital forensics and artifact analysis approaches
3) The tools used in web security and digital forensics
Keywords
cybersecurity, network, software, programming, web application, digital forensics, artifact
Competencies
- Specialist skills
- Intercultural skills
- Communication skills
- Critical thinking skills
- Practical and/or problem-solving skills
Class flow
The class offers a standard type and a hands-on exercise style of lecture.
Course schedule/Objectives
Course schedule | Objectives | |
---|---|---|
Class 1 | The overview of cybersecurity, and the review of pre-work. | Understand the core concepts of cybersecurity, web security, and digital forensics. |
Class 2 | Overview of web security | Understand the core concepts of of web security and OWASP Top 10. |
Class 3 | Hands-on web application vulnerability fundamentals (1) | Understand the core concepts of cross-site scripting vulnerabilities, attack techniques, and countermeasures. |
Class 4 | Hands-on web application vulnerability fundamentals (2) | Understand the core concepts of SQL injection, attack techniques, and countermeasures. |
Class 5 | Hands-on web application vulnerability fundamentals (3) | Understand the core concepts of vulnerabilities rel ated to authentication and authorization, attack techniques, and countermeasures. |
Class 6 | Practical exercise of web security | Understand the vulnerability assessment approach by testing web applications. |
Class 7 | Introduction of enterprise security | Understand security measures, implementation, and operation in a real world environment. |
Class 8 | Overview of digital forensics and artifacts | Understand the core concepts of digital forensics and artifacts. |
Class 9 | Insight and analysis into artifacts (1) | Understand the USN journal, which is an important artifact. |
Class 10 | Insight and analysis into artifacts (2) | Understand the RDP bitmap cache, which is an important artifact. |
Class 11 | Insight and analysis into artifacts (3) | Understand the SRUM, which is an important artifact. |
Class 12 | Practical exercise of digital forensics | Understand the incident i nvestigation approach by analyzing artifacts. |
Class 13 | Follow-up session (1) | Understand web security or digital forensics by working on tasks. |
Class 14 | Follow-up session (2) | Understand web security or digital forensics by working on tasks. |
Study advice (preparation and review)
To enhance effective learning, students are encouraged to spend approximately 100 minutes preparing for class and another 100 minutes reviewing class content afterwards (including assignments) for each class.
They should do so by referring to textbooks and other course material.
Textbook(s)
Textbooks will be used in this course.
Reference books, course materials, etc.
References will be announced in classes.
Evaluation methods and criteria
The evaluation consists of the exercises solved in the classes.
Related courses
- XCO.T473 : Foundation of Cybersecurity
- XCO.T474 : Theory of Cryptography for Cybersecurity
- XCO.T478 : Cybersecurity Governance
- XCO.T475 : Attack and Defense on Cybersecurity I
- XCO.T477 : Attack and Defense on Cybersecurity III
Prerequisites
Students must have successfully completed Attack and Defense on Cybersecurity I (XCO.T475), or have equivalent knowledge.
Contact information (e-mail and phone) Notice : Please replace from ”[at]” to ”@”(half-width character).
keisuke[at]is.titech.ac.jp
Office hours
Appointment by e-mail is required.