Logo ČVUT
CZECH TECHNICAL UNIVERSITY IN PRAGUE
STUDY PLANS
2019/2020

System Security

The course is not on the list Without time-table
Code Completion Credits Range Language
MIE-SYB Z,ZK 4 2P+1C
Lecturer:
Tutor:
Supervisor:
Department of Information Security
Synopsis:

Students will familiarize themselves with the actual ICT security needs in all ICT disciplines. Students will gain knowledge of typical network attacks and protection against them, together with essential communication encryption techniques. They will learn how to work with certain aspects of encryption techniques - passwords and certificates. After that, students will learn the basics of anti-virus, anti-spam and heuristic analyses used in modern anti-virus solutions or Unified Threat Management (UTM) based solutions. They will also learn the principles of securing websites, web applications and databases. Upon completion of the module, students will have a broad overview of IT security and will be able to apply it to the integration of various software systems and applications.

Requirements:

Fundamentals of computer networks, basic knowledge of cryptography, basics of assembly language programming.

Syllabus of lectures:

1. Security and operating system certification, process security, user roles.

2. Securing file system.

3. Network security on a global scale.

4. Security on the layer of network infrastructure.

5. Network services: ISO/OSI model, application layer, authentification, authorization.

6. Complex deployment of antivirus and antispam solutions.

7. Firewall, IPS.

8. Endpoint security.

9. Content filtering.

10. WiFi security.

11. Methods of attacks.

Syllabus of tutorials:
Study Objective:

The goal is to deliver students knowledge of techniques for network computer security so that they are able to protect them against leakage of (sensitive) data and intrusion of unwanted and undesired user activities, such as massive spamming using viruses. The emphasis is put on multilayer security solutions for networks, applications and operating systems.

Study materials:

1. Howard, M., LeBlanc, D. ''Writing Secure Code (2nd Edition)''. Microsoft Press, 2003. ISBN 0735617228.

2. Kaeo, M. ''Designing Network Security (2nd Edition)''. Cisco Press, 2004. ISBN 1587051176.

3. Lam, K., LeBlanc, D., Smith, B. ''Assessing Network Security''. Microsoft Press, 2004. ISBN 0735620334.

Note:
Further information:
No time-table has been prepared for this course
The course is a part of the following study plans:
Data valid to 2019-10-18
For updated information see http://bilakniha.cvut.cz/en/predmet1440606.html