
The objective of this course is to explain the basic flow of cyber attacks and to understand the actions of attackers and countermeasures against them through simple hands-on group activities.
Specifically, we will confirm the vulnerabilities of various protocols and applications, experience how these vulnerabilities are used by attackers for reconnaissance and attacks, and examine countermeasures from the three perspectives of before, during, and after the attacks.