Beyond Cyber 01 course with The Academic College of Tel Aviv-Yaffo

Feb 15, 2022 | Blog, Israel

Red Hat Project Security Engineers Haim Krasniker, Or Asaf, and Luiza Nacshon recently led the first Red Hat Beyond-Cyber-01 course with MTA (The Academic College of Tel Aviv-Yaffo). Beyond-Cyber-01 provides undergraduates the opportunity to learn fundamentals in security. The course took place in the Ra’anana Red Hat Office, which allowed teachers and students to conduct group work face to face.

The course is part of Red Hat’s Beyond Program, created by Liora Milbaum, Senior Principal Software Engineer, and Irit Goihman, Manager, Software Engineering. The goal of Beyond-Cyber-01, a new course led by Krasniker, is for students to develop an understanding of the offensive and defensive sides of cybersecurity and apply many of those hands-on principles. Students worked in teams guided by mentors. 

During each class session, a new type of vulnerability was introduced by one of the mentors. The course covered some of the most common vulnerabilities, such as SQL injection, cross-site scripting, buffer overflows, and cryptography attacks. Each session included team presentations, lectures by mentors, and group work in teams with mentor support. Through homework assignments, students were presented with a vulnerable code that had to be exploited and explained in a write-up and presentation. Once the code was exploited, students had to mitigate the vulnerability by doing a pull request to fix it. Through the week, the teams worked together, conducted research, and applied what they learned to solve the homework, which presented different and more complex versions of the material practiced in class. Learn more about the students’ final solutions in the Beyond GitHub repository.

Beyond-Cyber-01 provides new learning opportunities for students to build real world skills. The first course of the Beyond Program, Beyond OS, provides students the opportunity to experience how practical development works in industry while using open source software principles and collaborative teamwork. This class has been offered six times since the program launched.

Related Stories

The (open) source of cutting-edge innovation

The (open) source of cutting-edge innovation

by Gordon Haff, technology advocate at Red Hat Where do people come together to make cutting-edge invention and innovation happen? The corporate lab One possible answer is the corporate research lab. More long-term focused than most company product development...

Intern Spotlight: Rohan Devasthale, Red Hat Research Boston

Intern Spotlight: Rohan Devasthale, Red Hat Research Boston

This blog post spotlights Rohan Devasthale, a Software Engineering Intern. Rohan spoke with us about his contributions to the Elastic Secure Infrastructure (ESI) project, how his experience as a Red Hat Research Intern enhanced his technical skills, and his passion for badminton.

Explore project updates with new project posters

Explore project updates with new project posters

Red Hat Research is excited to share its new series of research posters designed to visually share details of 17 active research collaborations and spur new collaborations between Red Hat engineers and existing project teams. The posters have been printed for display...

Getting started with data science and machine learning

Getting started with data science and machine learning

Data science has exploded in popularity (and sometimes, hype) in recent years. This has led to an increased interest in learning the subject. With so many possible directions, it can be hard to know where to start. This blog post is here to help.

Technical Report: Benchmarking tunnel and encryption methodologies in cloud environments

Technical Report: Benchmarking tunnel and encryption methodologies in cloud environments

In this report, we benchmark the performance of various tunneling technologies to provide directions on their use in multi-cloud deployments. Based on the various experiments conducted on three different testbeds, we present quantifiable data which can be leveraged by operators and providers tasked with design and development decisions of multi-cloud providers and orchestrators.”