THREAT2023 Summer School Schedule

Proposed Summer School Program

Detailed schedule will be made availible soon.

Registration, Opening and Welcome

Session One

Embarking on a Digital Odyssey: Exploring Cybersecurity

Introduction of delegates, lecturers, Overview, aims and objectives Introduction to cybersecurity, principles and core concepts Understanding risk: threats, vulnerabilities, and impacts Network infrastructure basics Securing the Network

Networking Break

Session Two

Behind Enemy Lines: Tactics and Motivations of Modern Cyber Threat Actors

Organised Cybercrime (A Technical Analysis) Social engineering, Ransomware and other forms of malware Emerging Threats and Attack Vectors, APTs and targeted attacks Cybersecurity Awareness Cloud computing models and related security issues


Session Three

Cracking the Code: Delving into the Intriguing World of Classical Cryptography

Introduction to Classical Cryptography DES, 3DES, PKI, Digital Signatures RSA, ECDSA, Blockchain

Recap day one and preview of the day ahead

Session Four

Steering the Cyber Ship: Navigating the Challenges of Effective Cybersecurity Management

Identification, Authentication and Access Control Cybersecurity Response Plans (Incidence, Disaster Recovery) Security Information and Event Management (SIEM) systems Cybersecurity frameworks, Building an Organisational Cybersecurity Strategy and Business Case

Networking Break

Session Five

Guardians of the Digital Realm: Mastering Privacy and Data Protection in the Information Age

POPIA, GDPR, Regional frameworks, CERTS, Cross-border regulations, Challenges in legislating cybersecurity


Session Six

Mysterious Destinations: An Exclusive Cybersecurity Site Visit

A visit is planned to a major IT installation in Cape Town. The visit will conclude with a sponsored cocktail party.

Recap day two and preview of the day ahead

Session Seven

Fortifying the Digital Frontier: Exploring AI-Powered Cybersecurity Strategies

AI and Machine Learning Basics applied to Threat Detection and Prevention, Anomaly Detection. Using Natural Language Processing for Phishing Detection Implementing AI-driven, risk-based authentication methods that dynamically adjust security measures based on user behaviour and contextual factors. AI and Privacy Concerns: Discussing the ethical implications and potential risks associated with using AI technologies for cybersecurity, and how to address privacy concerns. The role of AI in securing the metaverse, autonomous blockchain applications


Session Eight

Quantum Leaps in Cybersecurity: Unravelling the Potential of Quantum Computing for Next-Generation Defence

A primer on quantum computing concepts, including qubits, superposition, entanglement, and quantum gates, and their relevance to cybersecurity. Quantum Cryptography and Quantum Key Distribution (QKD), Quantum Random Number Generation Post-Quantum Cryptography Quantum Threats to Classical Cryptography Quantum-Resistant Blockchains: Investigating the role of quantum computing in blockchain security and the development of quantum-resistant blockchain technologies to secure digital assets. Preparing for the Quantum Future

Close Out and the way forward