Logo ČVUT
CZECH TECHNICAL UNIVERSITY IN PRAGUE
STUDY PLANS
2024/2025

System Security and Forensics

Login to KOS for course enrollment Display time-table
Code Completion Credits Range Language
NIE-SBF Z,ZK 5 2P+1C English
Garant předmětu:
Simona Fornůsek
Lecturer:
Simona Fornůsek
Tutor:
Simona Fornůsek, Marián Svetlík
Supervisor:
Department of Information Security
Synopsis:

Students will be introduced to various aspects of system security (principles of endpoint security, principles of security policies, security models, authentication concepts). Students will also learn about forensic analysis as a tool for investigating security incidents (techniques used by malicious software or attackers, forensic analysis techniques, and the importance of memory or file system artifacts for attack analysis and detection).

Requirements:

No prerequisites

Syllabus of lectures:

1. Security of information systems, security policies.

2. Security models and modeling.

3. Authentication: Management of encryption keys and certificates, secure local and remote authentication.

4. Authentication: Authentication protocols, Kerberos.

5. Security of distributed services and cloud.

6. Forensics: Introduction.

7. Forensics: Forensic imaging.

8. Forensics: File systems analysis, Data Carving.

9. Forensics: Volatile memory.

10. Forensics: Information and residual data, activities of OS, applications and users.

11. Security of terminal stations.

12. Cyber attacks, methods and classification.

13. Security of Distributed Services - Internet of Things (IoT)

Syllabus of tutorials:

1. Malware Analysis - basics

2. File System Artifacts

3. Memory Analysis

4. Windows Registry

5. Residual user data & artefacts in Windows OS

Study Objective:
Study materials:

1. Carvey, H. : Investigating Windows Systems. Academic Press, 2018. ISBN 978-0128114155.

2. Vacca, J. R. : Network and System Security (2nd Edition). Syngress, 2013. ISBN 978-0124166899.

3. Kim, D. - Solomon, M. : Fundamentals of Information Systems Security. Jones & Bartlett Learning, 2012. ISBN 987-0-7637-9025-7.

4. Stallings, W. : Cryptography and Network Security: Principles and Practice (5th Edition). Prentice Hall, 2010. ISBN 0-13-869017-0.

5. Anderson, R. : Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley, 2008. ISBN 0470068523.

Note:
Time-table for winter semester 2024/2025:
Time-table is not available yet
Time-table for summer semester 2024/2025:
Time-table is not available yet
The course is a part of the following study plans:
Data valid to 2024-05-23
Aktualizace výše uvedených informací naleznete na adrese https://bilakniha.cvut.cz/en/predmet6624806.html