Logo ČVUT
CZECH TECHNICAL UNIVERSITY IN PRAGUE
STUDY PLANS
2020/2021

System and Network Security

Login to KOS for course enrollment Display time-table
Code Completion Credits Range Language
BIE-SSB Z,ZK 5 2P+2C English
Lecturer:
Jiří Dostál (guarantor)
Tutor:
Jiří Dostál (guarantor)
Supervisor:
Department of Information Security
Synopsis:

The students will understand the public key infrastructure (PKI), its strengths and weaknesses, its vulnerabilities againstattacks. The students will also understand the analysis of network protocols from the perspectives of: authentication and authorisation,key exchange, and encryption. They get an overview of the security mechanisms of operating systems (OSs), of the ways virtualization canbe used to protect OSs, and of the security mechanisms for the OS memory. The students will learn basic methods of forensic analysisof storage media and networks. The students will also understand security of the networking infrastructure and its protocols andwill be able to design and implement a secured and survivable network. Students will also get an overview of securing data in clouds,database systems, and servers.

Requirements:
Syllabus of lectures:

1. Weaknesses of the PKI and attacks on the PKI.

2. Analysis of the networks protocols (authentication, authorization, key exchange and network data flow encryption).

3. OS ? security levels, virtualization (as a OS security mechanism).

4. OS memory security.

5. Forensic analysis of storage media.

6. Communication infrastructure security.

7. Network protocols security.

8. Secure and survivable planning, design, and implementation of switched network infrastructure.

9. Secure and survivable planning, design, and implementation of a routed network infrastructure.

10. Securing data in a cloud. 1Database and web servers security.

11. Monitoring of vulnerabilities in an IT infrastructure and fast reactions upon them.

Syllabus of tutorials:
Study Objective:

The students will understand the public key infrastructure (PKI), its strengths and weaknesses, its vulnerabilities againstattacks. The students will also understand the analysis of network protocols from the perspectives of: authentication and authorisation,key exchange, and encryption. They get an overview of the security mechanisms of operating systems (OSs), of the ways virtualization canbe used to protect OSs, and of the security mechanisms for the OS memory. The students will learn basic methods of forensic analysisof storage media and networks. The students will also understand security of the networking infrastructure and its protocols andwill be able to design and implement a secured and survivable network. Students will also get an overview of securing data in clouds,database systems, and servers.

Study materials:

[1] Xiao, Y. - Li, F.H. - Chen, H., eds.: Handbook of Security and Networks, World Scientific Publishing Company, 2011, 978-9814273039,

[2] Sammons, J.: The Basics of Digital Forensics, Elsevier, 2012, 978-1-59749-661-2,

[3] Harris, S.: CISSP All-in-One Exam Guide, 6th Edition, International Information Systems Security Certification Consortium, 2013, 978-0071781749,

[4] Odom, W.: CCNA Routing and Switching ICND2 200-101 Official Cert Guide, Cisco Press, 2013, 978-1-58714-373-1,

Note:
Further information:
https://courses.fit.cvut.cz/BI-SSB/
Time-table for winter semester 2020/2021:
06:00–08:0008:00–10:0010:00–12:0012:00–14:0014:00–16:0016:00–18:0018:00–20:0020:00–22:0022:00–24:00
Mon
Tue
roomT9:344

09:15–10:45
(lecture parallel1)
Dejvice
NBFIT síťová učebna
roomT9:344

11:00–12:30
(lecture parallel1
parallel nr.101)

Dejvice
NBFIT síťová učebna
Fri
Thu
Fri
Time-table for summer semester 2020/2021:
Time-table is not available yet
The course is a part of the following study plans:
Data valid to 2020-09-26
For updated information see http://bilakniha.cvut.cz/en/predmet3467606.html