Daily schedule
Seminars meet each weekday morning after breakfast.
After lunch, afternoons are free for individual study or exploring the many places of interest in and around the city. Optional plenary excursions and social activities including walking tours will also be available.
The course fee includes breakfasts Monday-Saturday (residential guests only), lunches Sunday-Friday, and three-course dinners Sunday-Thursday. All meals are taken in Christ Church’s spectacular dining hall.
On Friday, there will be a special four-course gala dinner to celebrate the closing of the week.
Seminars
Monday
Anatomy of Hacking
This lecture dissects how attackers breach networks and achieve their objectives (eg disruption, data theft). We explore the 'Cyber Kill Chain', a conceptual model of the hacking process. Taking each step in turn, we detail the considerations that hackers must make to avoid detection and infiltrate target networks. At the end of this lecture, you will have a conceptual understanding of the foundations of hacking.
Tuesday
Hackers: An Origin Story
This lecture charts the genesis of hackers, from their mid-twentieth century origins to present incarnations. Our exploration starts in the 1950s at MIT where the earliest hackers originated, we follow the movement through 1970s phone-phreakers, 1990s cypherpunks, and hacktivists who emerged at the millennium's turn. Finally, we explore the diverse community of hackers today.
Wednesday
Dark Web: A Gangster’s Paradise?
Explores the Dark Web’s mechanics, and how the cyber underworld collaborates. We analyse the history and architecture of the Dark Web (Tor), before considering its uses, ranging from protecting the privacy of individual's legal browsing to enabling the uncensored browsing of dissidents within autocratic countries. Finally, we take a tour of a criminal marketplace to understand how it functions and creates trust amongst users. At the conclusion of this lecture, you will have a foundational understanding of the Dark Web and its history.
Thursday
Cybercrime: Illegality in the Digital World
This lecture considers how criminals use hacking for financial gain. First, we explore the primary attack types of data theft, extortion and fraud. We will then study how some nation-states use hacking to help finance their governments, before we examine the Dark Web ecosystem, a critical enabler for global cybercrime. Finally, we consider some of the options for countering criminal hackers.
Friday
Ransomware: Disrupting Critical National Infrastructure
This lecture starts by travelling back to the 1980s, to study the origins of Ransomware. We trace its evolution through to the early 2010s and analyse the catalysts that turned it from a niche technical problem to an endemic threat to critical national infrastructure. We examine the tradecraft attackers employ, before considering the scale and impacts of the problem. Then, we assess the variables in deciding whether to capitulate to a ransom demand. Finally, we explore available countermeasures.