Logo ČVUT
CZECH TECHNICAL UNIVERSITY IN PRAGUE
STUDY PLANS
2023/2024
UPOZORNĚNÍ: Jsou dostupné studijní plány pro následující akademický rok.

System and Network Security

Login to KOS for course enrollment Without time-table
Code Completion Credits Range Language
BIE-SSB Z,ZK 5 2P+2C English

During a review of study plans, the course BIE-ADS can be substituted for the course BIE-SSB.

Garant předmětu:
Jiří Dostál
Lecturer:
Jiří Dostál
Tutor:
Jiří Dostál
Supervisor:
Department of Information Security
Synopsis:

The students will understand the public key infrastructure (PKI), its strengths and weaknesses, its vulnerabilities againstattacks. The students will also understand the analysis of network protocols from the perspectives of: authentication and authorisation,key exchange, and encryption. They get an overview of the security mechanisms of operating systems (OSs), of the ways virtualization canbe used to protect OSs, and of the security mechanisms for the OS memory. The students will learn basic methods of forensic analysisof storage media and networks. The students will also understand security of the networking infrastructure and its protocols andwill be able to design and implement a secured and survivable network. Students will also get an overview of securing data in clouds,database systems, and servers.

Requirements:
Syllabus of lectures:

1. Weaknesses of the PKI and attacks on the PKI.

2. Analysis of the networks protocols (authentication, authorization, key exchange and network data flow encryption).

3. OS ? security levels, virtualization (as a OS security mechanism).

4. OS memory security.

5. Forensic analysis of storage media.

6. Communication infrastructure security.

7. Network protocols security.

8. Secure and survivable planning, design, and implementation of switched network infrastructure.

9. Secure and survivable planning, design, and implementation of a routed network infrastructure.

10. Securing data in a cloud. 1Database and web servers security.

11. Monitoring of vulnerabilities in an IT infrastructure and fast reactions upon them.

Syllabus of tutorials:
Study Objective:

The students will understand the public key infrastructure (PKI), its strengths and weaknesses, its vulnerabilities againstattacks. The students will also understand the analysis of network protocols from the perspectives of: authentication and authorisation,key exchange, and encryption. They get an overview of the security mechanisms of operating systems (OSs), of the ways virtualization canbe used to protect OSs, and of the security mechanisms for the OS memory. The students will learn basic methods of forensic analysisof storage media and networks. The students will also understand security of the networking infrastructure and its protocols andwill be able to design and implement a secured and survivable network. Students will also get an overview of securing data in clouds,database systems, and servers.

Study materials:

[1] Xiao, Y. - Li, F.H. - Chen, H., eds.: Handbook of Security and Networks, World Scientific Publishing Company, 2011, 978-9814273039,

[2] Sammons, J.: The Basics of Digital Forensics, Elsevier, 2012, 978-1-59749-661-2,

[3] Harris, S.: CISSP All-in-One Exam Guide, 6th Edition, International Information Systems Security Certification Consortium, 2013, 978-0071781749,

[4] Odom, W.: CCNA Routing and Switching ICND2 200-101 Official Cert Guide, Cisco Press, 2013, 978-1-58714-373-1,

Note:
Further information:
https://courses.fit.cvut.cz/BI-SSB/
No time-table has been prepared for this course
The course is a part of the following study plans:
Data valid to 2024-04-15
Aktualizace výše uvedených informací naleznete na adrese https://bilakniha.cvut.cz/en/predmet3467606.html