System Security
Code | Completion | Credits | Range | Language |
---|---|---|---|---|
MI-SYB.16 | Z,ZK | 5 | 2P+2C | Czech |
- Course guarantor:
- Lecturer:
- Tutor:
- Supervisor:
- Department of Information Security
- Synopsis:
-
Students will familiarize themselves with the actual ICT security needs in all ICT disciplines. Students will gain knowledge of typical network attacks and protection against them, together with essential communication encryption techniques. They will learn how to work with certain aspects of encryption techniques - passwords and certificates. After that, students will learn the basics of anti-virus, anti-spam and heuristic analyses used in modern anti-virus solutions or Unified Threat Management (UTM) based solutions. They will also learn the principles of securing websites, web applications and databases. Upon completion of the module, students will have a broad overview of IT security and will be able to apply it to the integration of various software systems and applications.
- Requirements:
-
Fundamentals of computer networks, basic knowledge of cryptography, basics of assembly language programming.
- Syllabus of lectures:
-
1. Security and operating system certification, process security, user roles.
2. Securing file system.
3. Network security on a global scale.
4. Security on the layer of network infrastructure.
5. Network services: ISO/OSI model, application layer, authentification, authorization.
6. Complex deployment of antivirus and antispam solutions.
7. Firewall, IPS.
8. Endpoint security.
9. Content filtering.
10. WiFi security.
11. Methods of attacks.
- Syllabus of tutorials:
- Study Objective:
-
Students learn the principles of system security. They acquire knowledge of the rules and policies for information systems security. They will have an overview of the safe management and use of low-level layers of operating systems and network structures. They become familiar with the safety aspects of modern trends in providing distributed network services: cloud, mobile and smart devices, Internet of Things.
- Study materials:
-
1. Howard, M., LeBlanc, D. ''Writing Secure Code (2nd Edition)''. Microsoft Press, 2003. ISBN 0735617228.
2. Kaeo, M. ''Designing Network Security (2nd Edition)''. Cisco Press, 2004. ISBN 1587051176.
3. Lam, K., LeBlanc, D., Smith, B. ''Assessing Network Security''. Microsoft Press, 2004. ISBN 0735620334.
- Note:
- Further information:
- https://courses.fit.cvut.cz/MI-SYB/
- No time-table has been prepared for this course
- The course is a part of the following study plans:
-
- Master branch Knowledge Engineering, in Czech, 2016-2017 (elective course)
- Master branch Computer Security, in Czech, 2016-2019 (compulsory course of the specialization)
- Master branch Computer Systems and Networks, in Czech, 2016-2019 (compulsory course of the specialization)
- Master branch Design and Programming of Embedded Systems, in Czech, 2016-2019 (elective course)
- Master branch Web and Software Engineering, spec. Info. Systems and Management, in Czech, 2016-2019 (elective course)
- Master branch Web and Software Engineering, spec. Software Engineering, in Czech, 2016-2019 (elective course)
- Master branch Web and Software Engineering, spec. Web Engineering, in Czech, 2016-2019 (elective course)
- Master program Informatics, unspecified branch, in Czech, version 2016-2019 (VO)
- Master branch System Programming, spec. System Programming, in Czech, 2016-2019 (elective course)
- Master branch System Programming, spec. Computer Science, in Czech, 2016-2017 (elective course)
- Master specialization Computer Science, in Czech, 2018-2019 (elective course)
- Master branch Knowledge Engineering, in Czech, 2018-2019 (elective course)