Logo ČVUT
CZECH TECHNICAL UNIVERSITY IN PRAGUE
STUDY PLANS
2022/2023

Basics of System Security

The course is not on the list Without time-table
Code Completion Credits Range Language
BIE-ZSB.21 Z,ZK 5 2P+2C English
Lecturer:
Tutor:
Supervisor:
Department of Information Security
Synopsis:

The goal of the course is to provide introduction to basic concepts in security of computer systems. Further, the course introduces the basics of forensic analysis and related topics such as malware analysis or incident response. After finishing the course student will get both theoretical and practical knowledge in the area of modern operating systems security, as well as skills needed for independent work in the area of operating system security incident analysis.

Requirements:

The course has no initial knowledge requirements.

Syllabus of lectures:

1. Introduction to systems security, definition of basic terms, system security requirements.

2. Operating systems security – threat model, security concepts.

3. Operating systems security – secure design, role of OS in security.

4. Memory and CPU architecture attacks (Meltdown, Spectre).

5. Access control in operating systems.

6. Introduction to forensic analysis, terminology, methodology, applications.

7. Forensic analysis – data acquisition.

8. Forensic analysis of file systems and its artefacts.

9. Security incident response.

10. Malware analysis (online services, static analysis, dynamic analysis).

11. Vulnerability management and Patch management.

12. Business Continuity Management.

13. Disaster Recovery.

Syllabus of tutorials:

1. Security features in OS Windows

2. Security features in OS Linux, SELinux

3. Access control in Linux and Windows

4. Meltdown & Spectre attacks

6. Basics of forensics analysis

7. File system forensic analysis, MFT extraction and analysis

8. Practical malware analysis

Study Objective:
Study materials:

1. Anderson R. : Security engineering - A Guide to building dependable distributed systems (2nd Edition). John Wiley & Sons, 2008. ISBN 978-0470068526.

2. Perla E. : A Guide to Kernel Exploitation: Attacking the Core. Syngress, 2010. ISBN 978-1597494861.

3. Arnes A. : Digital Forensics. John Wiley & Sons, 2017. ISBN 978-1119262381.

4. Stallings W., Brown L. : Computer Security: Principles and Practice, Global Edition (4th Edition). Pearson, 2018. ISBN 978-1292220611.

5. Anson S. : Applied Incident Response. John Wiley & Sons, 2020. ISBN 978-1119560265.

Note:
Further information:
No time-table has been prepared for this course
The course is a part of the following study plans:
Data valid to 2022-09-25
Aktualizace výše uvedených informací naleznete na adrese https://bilakniha.cvut.cz/en/predmet6560006.html