Getting Started with Cybersecurity Science | O’Reilly

Getting Started with Cybersecurity Science | O’Reilly
English | Size: 544.49 MB
Genre: eLearning

Join Josiah Dykstra for an introduction to the application of scientific methodology to the process of creating cybersecurity tools and systems.

Creating, using, and evaluating cybersecurity tools and systems are complex tasks. Many cybersecurity professionals are attracted to the challenges of building these tools and systems, and are motivated to use their expertise to bring sanity and solutions to real-world problems. The addition of scientific methodology aids in dealing with uncertainty, unknowns, choices, and crises. It can improve existing products and lead to groundbreaking innovation and applications.

In this course, you’ll focus on practical, real-world applications of science to the work you do. You’ll learn about scientific principles and flexible methodologies for effective security as you design, execute, and evaluate your own experiments. You’ll discover why the application of science is worth the added effort and you’ll glean insights from specific examples of experimentation in cybersecurity.

This course uses a mix of lectures, examples, exercises, and Q&A. The course is ideal for students, software developers, forensic investigators, network administrators, and any other person responsible for providing security.

By the end of this course, you’ll understand:
The steps and principles of scientific method and their application to everyday, practical cybersecurity
The difference between metrics and science
How experimentation and evaluation can help ensure that software is secure
And you’ll be able to:
Turn your ideas into well-formulated and testable questions
Identify, dissect, and evaluate the methodology and claims of others
Ask clarifying questions about the claims of vendors, marketers, and salespeople
You’re an infosec practitioner, cybersecurity specialist, or other security professional intrigued by the practical application of science to your work
You need to evaluate and recommend security solutions to decision-makers in your organization
You want to become the top vendor or create the top product in your field




If any links die or problem unrar, send request to

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.