Learning cyber security is more than the grasp of security concepts, principles, theories and methodologies. An excellent cyber security professional needs lots of hands-on training before being able to solve real world problems independently. This is a companion laboratory course that extends the scope of IERG4130 (Introduction to Cyber Security) and aims to teach students how to use existing tools to solve cyber security problems. This course will also serve as the introductory training course for the Capture-the-Flag (CTF) competition so that our students can achieve better results in local, regional and international CTF competitions. The whole lab course will be organized around six topics:
1. Cryptography
2. Reverse Engineering
3. Web Exploitation
4. Binary Exploitation
5. Forensics
6. Miscellaneous problems
For each of the topics above, the students will learn the typical vulnerability types and attacking methods, as well as the commonly used tools for vulnerability discovery and exploitation, followed by solving given problems with those tools and techniques.



