Logo ČVUT
CZECH TECHNICAL UNIVERSITY IN PRAGUE
STUDY PLANS
2024/2025

Basics of System Security

Login to KOS for course enrollment Display time-table
Code Completion Credits Range Language
BIK-ZSB.21 Z,ZK 5 14KP+4KC Czech
Garant předmětu:
Jiří Dostál
Lecturer:
Jiří Dostál
Tutor:
Jiří Dostál
Supervisor:
Department of Information Security
Synopsis:

The goal of the course is to provide introduction to basic concepts in security of computer systems. Further, the course introduces the basics of forensic analysis and related topics such as malware analysis or incident response. After finishing the course student will get both theoretical and practical knowledge in the area of modern operating systems security, as well as skills needed for independent work in the area of operating system security incident analysis.

Requirements:

The course has no initial knowledge requirements.

Syllabus of lectures:

1. Introduction to systems security, definition of basic terms, system security requirements.

2. Operating systems security – threat model, security concepts.

3. Operating systems security – secure design, role of OS in security.

4. Memory and CPU architecture attacks (Meltdown, Spectre).

5. Access control in operating systems.

6. Introduction to forensic analysis, terminology, methodology, applications.

7. Forensic analysis – data acquisition.

8. Forensic analysis of file systems and its artefacts.

9. Security incident response.

10. Malware analysis (online services, static analysis, dynamic analysis).

11. Vulnerability management and Patch management.

12. Business Continuity Management.

13. Disaster Recovery.

Syllabus of tutorials:

1. Security features in OS Windows

2. Security features in OS Linux, SELinux

3. Access control in Linux and Windows

4 Meltdown & Spectre attacks

5. Basics of forensics analysis

6. File system forensic analysis, MFT extraction and analysis

7. Practical malware analysis

Study Objective:
Study materials:

1. Anderson R. : Security engineering - A Guide to building dependable distributed systems (2nd Edition). John Wiley & Sons, 2008. ISBN 978-0470068526.

2. Perla E. : A Guide to Kernel Exploitation: Attacking the Core. Syngress, 2010. ISBN 978-1597494861.

3. Arnes A. : Digital Forensics. John Wiley & Sons, 2017. ISBN 978-1119262381.

4. Stallings W., Brown L. : Computer Security: Principles and Practice, Global Edition (4th Edition). Pearson, 2018. ISBN 978-1292220611.

5. Anson S. : Applied Incident Response. John Wiley & Sons, 2020. ISBN 978-1119560265.

Note:
Time-table for winter semester 2024/2025:
Time-table is not available yet
Time-table for summer semester 2024/2025:
Time-table is not available yet
The course is a part of the following study plans:
Data valid to 2024-06-16
Aktualizace výše uvedených informací naleznete na adrese https://bilakniha.cvut.cz/en/predmet6559906.html