CSEC201BKK

Faculty
Sergey Gordeychik
CEO at CyberOK
Course length
Duration
Total hours
Credits
Language
Course type
Fee for single course
Fee for degree students
Skills you’ll learn
Conducted in collaboration with the CyberEd platform, this course offers a practical introduction to Cybersecurity through the lens of modern Security Operations (SecOps) and Purple Team methodology. Students will explore both offensive (Red Team) and defensive (Blue Team) techniques across key areas such as network, operating system, and web application security. The curriculum includes hands-on exposure to common attack vectors, detection strategies, and incident response processes, using industry-standard tools and open lab platforms. Core topics also include authentication, cryptography, cloud and container security, and emerging trends like AI threats and supply chain attacks. Designed for technically capable students, the course balances foundational theory with real-world practice.
15 classes
CIA Triad: Confidentiality, Integrity, Availability.
Assets, Threats, Vulnerabilities, Risks.
Types of Threat Actors and Motivations.
Common Attack Vectors and Real-World Examples.
Security Controls: Preventive, Detective, Corrective.
Authentication, Authorization, and Accounting (AAA).
Access Control Models: DAC, MAC, RBAC.
Formal Security Models.
Security Architecture Layers and Physical Security.
Identity and Access Management (IAM).
Symmetric vs Asymmetric Encryption.
Public Key Infrastructure (PKI) and Certificates.
Hash Functions and Integrity.
Real-World Applications of Cryptography.
Common Cryptographic Pitfalls.
OSI Layers and Network Protocol Basics.
ARP, MAC Spoofing, and Packet Sniffing.
Man-in-the-Middle (MitM) Attacks.
Network Segmentation and Local Defense.
Wi-Fi and LAN Security Concepts.
IP Spoofing, ICMP Abuse, and DoS Attacks.
Fragmentation and Session Hijacking.
Network Address Translation (NAT).
Firewall Concepts and Rule Sets.
Introduction to IDS/IPS.
Windows User Accounts and Permissions.
NTLM, Kerberos, and Authentication Protocols.
Common Windows Services and Vulnerabilities.
Event Logging and Auditing.
Endpoint Protection and Hardening Techniques.
File Permissions, Ownership, and sudo.
Common Misconfigurations and Exploits.
Service Management and Secure Defaults.
Authentication and SSH Hardening.
SELinux and AppArmor Basics.
Web Architecture and HTTP Basics.
OWASP Top 10 and modern threats.
Session Management and Authentication Flaws.
Client-Side vs Server-Side Vulnerabilities.
Reverse Shells and Command Injection.
Secure Coding Principles.
SDLC and DevSecOps Introduction.
Static and Dynamic Code Analysis.
Supply Chain and Dependency Risks.
CI/CD Pipeline Security.
Cloud Service Models and Shared Responsibility.
IAM, Misconfigurations, and S3 Exposure.
Introduction to Containers and Docker Security.
Vulnerability Scanning and Image Hardening.
Basics of Kubernetes and Cloud-Native Security.
Introduction to SecOps and SOC Functions.
Logging and Log Management.
SIEM Systems and Alerting.
Use Cases and Detection Rules.
Threat Hunting Basics and MITRE ATT&CK.
Incident Response Lifecycle.
Basic Digital Forensics: Disk, Memory, Network.
Evidence Collection and Chain of Custody.
Indicators of Compromise (IOCs) and Threat Intel.
Introduction to Managed Detection & Response (MDR).
Penetration Testing Methodology.
Reconnaissance, Exploitation, Post-Exploitation.
Social Engineering and Physical Intrusion.
Red & Blue & Purple Teams.
Reporting and Remediation Strategy.
AI in Cybersecurity: Threats and Defenses.
External Attack Surface Management (EASM).
Cloud Security Posture Management (CSPM).
Zero Trust Architecture.
IoT, OT, and Critical Infrastructure Security.
Red Team: Identify and Exploit Vulnerabilities.
Blue Team: Detect, Analyze, and Mitigate Attacks.
Full Attack Lifecycle in Practice.
Final Report and Team Review.
Course Recap and Q&A Session.
Understanding of basic computing concepts and computer architecture.
Familiarity with the TCP/IP stack and core networking concepts (e.g., IP, ports, DNS, routing).
Basic administrative experience with Linux (command line, file system, permissions) and Windows (user management, system settings).
Proficiency in Python scripting (control structures, file I/O, basic modules).
Exposure to Unix shell scripting and command-line tools.
Basic knowledge of algorithms and data structures.
Familiarity with software development lifecycle and programming logic.
The course combines interactive lectures, guided hands-on labs, and real-world cybersecurity exercises. Each day includes a mix of theory and practical work, typically structured as 1 hour of lecture followed by 2 hours of hands-on lab tasks and group discussion. Students will work individually and in small teams to solve offensive and defensive security challenges using online lab platforms such as PortSwigger, TryHackMe.
Throughout the three weeks, students progress from foundational concepts to more advanced topics, culminating in a final practical assessment on Day 15. The assessment simulates a real-world cyberattack/response scenario, testing both Red Team and Blue Team skills. Regular reflection and discussion help reinforce the “Purple Team” mindset—thinking like an attacker and defender.
Sergey Gordeychik is CEO and Co-Founder of CyberOK, a cybersecurity company delivering advanced services and research. He is also a Visiting Professor at Harbour.Space University (Barcelona, Spain), contributor of different social and educational initiatives. Previously, he was CIO at the Inception Institute of Artificial Intelligence (UAE), where he led AI-driven product development and secure infrastructure design. As Deputy CTO at Kaspersky Lab, he launched Security Intelligence Services and Managed Detection and Response solutions. Earlier, as CTO of Positive Technologies, he led development of award-winning enterprise security products and co-created Positive Hack Days (PHDays), the largest cybersecurity event in Eastern Europe.
Sergey is the author of two books and multiple scientific publications, with three patents in cybersecurity. He has created several training programs including "Critical Infrastructure Protection" and "Web Application Security Assessment." A regular speaker at top-tier conferences such as S4, CCC, CodeBlue, POC, and ZeroNights, Sergey holds CISSP, MCSE, MCT, CWNA, and was recognized as a Microsoft MVP in Enterprise Security R&D.
See full profileApply for this course
by Sergey Gordeychik
Total hours
45 Hours
Dates
Aug 18 - Sep 05, 2025
Fee for single course
€1500
Fee for degree students
€750
How to secure your spot
Complete the form below to kickstart your application
Schedule your Harbour.Space interview
If successful, get ready to join us on campus
FAQ
Will I receive a certificate after completion?
Yes. Upon completion of the course, you will receive a certificate signed by the director of the program your course belonged to.
Do I need a visa?
This depends on your case. Please check with the Spanish or Thai consulate in your country of residence about visa requirements. We will do our part to provide you with the necessary documents, such as the Certificate of Enrollment.
Can I get a discount?
Yes. The easiest way to enroll in a course at a discounted price is to register for multiple courses. Registering for multiple courses will reduce the cost per individual course. Please ask the Admissions Office for more information about the other kinds of discounts we offer and what you can do to receive one.