Join Josiah Dykstra for an introduction to the application of scientific methodology to the process of creating cybersecurity tools and systems.
Creating, using, and evaluating cybersecurity tools and systems are complex tasks. Many cybersecurity professionals are attracted to the challenges of building these tools and systems, and are motivated to use their expertise to bring sanity and solutions to real-world problems. The addition of scientific methodology aids in dealing with uncertainty, unknowns, choices, and crises. It can improve existing products and lead to groundbreaking innovation and applications.
In this course, you’ll focus on practical, real-world applications of science to the work you do. You’ll learn about scientific principles and flexible methodologies for effective security as you design, execute, and evaluate your own experiments. You’ll discover why the application of science is worth the added effort and you’ll glean insights from specific examples of experimentation in cybersecurity.
This course uses a mix of lectures, examples, exercises, and Q&A. The course is ideal for students, software developers, forensic investigators, network administrators, and any other person responsible for providing security.
What you’ll learn and how you can apply it
By the end of this course, you’ll understand:
- The steps and principles of scientific method and their application to everyday, practical cybersecurity
- The difference between metrics and science
- How experimentation and evaluation can help ensure that software is secure
And you’ll be able to:
- Turn your ideas into well-formulated and testable questions
- Identify, dissect, and evaluate the methodology and claims of others
- Ask clarifying questions about the claims of vendors, marketers, and salespeople
This course is for you because…
- You’re an infosec practitioner, cybersecurity specialist, or other security professional intrigued by the practical application of science to your work
- You need to evaluate and recommend security solutions to decision-makers in your organization
- You want to become the top vendor or create the top product in your field
Prerequisites
There are no strict prerequisites. However, 5–10 years of experience in information security will offer the best context for learning. No prior training in scientific investigation is required.
Recommended Preparation:
Getting Started with Cybersecurity Science