Based on an adequate analysis of the Needs Assessment, which was the first stage of the project. The consortium agrees to have the following Courses and Tutorials in IT Security field to support smart cities operations in Palestine.
Course 1: Applied Cryptography for Smart Cities
This course is an introduction to smart cities, introduction to Cyber-Security, theory and practice in cryptography and their application in smart city operations.
The topics includes: introduction to smart cities, general threats, sources of vulnerabilities, and attacks. Classical cryptography, stream ciphers, symmetric block ciphers (DES, 3DES and AES), introduction to number theory, public key encryptions (Diffie-Hellman, RSA), key exchange, hash functions, message authentication codes(MD5, HMAC), digital signature. Random and pseudorandom generators, Hash Functions. Securing Internet services and mobile applications. Overview of Malware analysis. Practical examples related to smart cities.
Course 2: Computer and Network Security for Smart Cities
This course provides an in-depth study of various network attacks techniques and methods to defend against them. A number of threats and vulnerabilities of the Internet will be covered, including various vulnerabilities of TCP/IP protocols, denial of service (DOS), attacks on routing, attacks on DNS servers, TCP session hijacking, and so on. This course will also cover defending mechanisms, including intrusion detection techniques, firewalls, VPNs, tracing the source of attacks, anonymous communication, IPsec, virtual private network, and PKI. Preventive and defensive mechanisms are covered; such as email security, web security, IP security, wireless security and internet of things. In addition, this course will include: Introduction to Smart Cities, Introduction to Cyber-security, and Practical Examples for smart cities related to the course content.
Course 3: Advanced Cybersecurity for Smart Cities
This course is intended for the Master level students in Computer Science, Computer Engineering, or any IT-related graduate-level students. This is an independent, self-content course. The course will focus on Systems Security, Services, and their applications specially those related to the Smart Cities.
Topics include: Malware analysis, securing mobile applications, industrial control systems, traditional SCADA systems and modern cyber-physical systems. Forensic techniques, machine learning techniques (self-diagnosis and self-healing).Operating system security (LINUX and windows). SIEMS (Security Information and Event Management Systems). Finally, practical examples/cases of system security applied to smart cities.
Tutorial 1: Smart Cities and their main security issues and countermeasures
This Tutorial is an introduction to smart cities, introduction to Cyber-Security, and main security issues and countermeasures in smart cities, in addition to their application in smart city operations.
Topics includes: Introduction to smart cities, smart cities benefits and challenges, smart cities indicators, examples of smart cities in the world, legal issues and recommendations, introduction to cyber security, introduction to cryptography, fundamentals of network security, securing Internet services and applications, Overview of Malware analysis. Practical examples related to smart cities.
Tutorial 2: Applied Cybersecurity for Smart Cities
This tutorial provides an in-depth study of various network attacks techniques and methods to defend against them, also it focus on Systems Security, Services, and their applications specially those related to the Smart Cities.
The topics include: Introduction to smart cities, Cyber security in smart cities, Fundamentals of Network Security, vulnerabilities of TCP/IP protocols, denial of service (DOS), attacks on routing, attacks on DNS servers, TCP session hijacking, intrusion detection techniques, firewalls, VPNs, tracing the source of attacks, email security, web security, IP security, wireless security and internet of things. Also, it includes Malware analysis, securing mobile applications, SCADA systems, Forensic techniques, and Operating system security.