Main page | Study Branches/Specializations | Groups of Courses | All Courses | Roles                Instructions

A course is the basic teaching unit, it's design as a medium for a student to acquire comprehensive knowledge and skills indispensable in the given field. A course guarantor is responsible for the factual content of the course.
For each course, there is a department responsible for the course organisation. A person responsible for timetabling for a given department sets a time schedule of teaching and for each class, s/he assigns an instructor and/or an examiner.
Expected time consumption of the course is expressed by a course attribute extent of teaching. For example, extent = 2 +2 indicates two teaching hours of lectures and two teaching hours of seminar (lab) per week.
At the end of each semester, the course instructor has to evaluate the extent to which a student has acquired the expected knowledge and skills. The type of this evaluation is indicated by the attribute completion. So, a course can be completed by just an assessment ('pouze zápočet'), by a graded assessment ('klasifikovaný zápočet'), or by just an examination ('pouze zkouška') or by an assessment and examination ('zápočet a zkouška') .
The difficulty of a given course is evaluated by the amount of ECTS credits.
The course is in session (cf. teaching is going on) during a semester. Each course is offered either in the winter ('zimní') or summer ('letní') semester of an academic year. Exceptionally, a course might be offered in both semesters.
The subject matter of a course is described in various texts.

BIE-SSB System and Network Security Extent of teaching: 2P+2C
Instructor: Dostál J. Completion: Z,ZK
Department: 18106 Credits: 5 Semester: Z

Annotation:
The students will understand the public key infrastructure (PKI), its strengths and weaknesses, its vulnerabilities againstattacks. The students will also understand the analysis of network protocols from the perspectives of: authentication and authorisation,key exchange, and encryption. They get an overview of the security mechanisms of operating systems (OSs), of the ways virtualization canbe used to protect OSs, and of the security mechanisms for the OS memory. The students will learn basic methods of forensic analysisof storage media and networks. The students will also understand security of the networking infrastructure and its protocols andwill be able to design and implement a secured and survivable network. Students will also get an overview of securing data in clouds,database systems, and servers.

Lecture syllabus:
1. Weaknesses of the PKI and attacks on the PKI.
2. Analysis of the networks protocols (authentication, authorization, key exchange and network data flow encryption).
3. OS ? security levels, virtualization (as a OS security mechanism).
4. OS memory security.
5. Forensic analysis of storage media.
6. Communication infrastructure security.
7. Network protocols security.
8. Secure and survivable planning, design, and implementation of switched network infrastructure.
9. Secure and survivable planning, design, and implementation of a routed network infrastructure.
10. Securing data in a cloud. 1Database and web servers security.
11. Monitoring of vulnerabilities in an IT infrastructure and fast reactions upon them.

Seminar syllabus:

Literature:
[1] Xiao, Y. - Li, F.H. - Chen, H., eds.: Handbook of Security and Networks, World Scientific Publishing Company, 2011, 978-9814273039,
[2] Sammons, J.: The Basics of Digital Forensics, Elsevier, 2012, 978-1-59749-661-2,
[3] Harris, S.: CISSP All-in-One Exam Guide, 6th Edition, International Information Systems Security Certification Consortium, 2013, 978-0071781749,
[4] Odom, W.: CCNA Routing and Switching ICND2 200-101 Official Cert Guide, Cisco Press, 2013, 978-1-58714-373-1,

Requirements:

Information about the course and courseware are available at https://courses.fit.cvut.cz/BI-SSB/
Students who repeat their study and the subject BIE-ADS was recognized, could ask the vicedean to recognize an assessment of BIE-SSB.

The course is also part of the following Study plans:
Study Plan Study Branch/Specialization Role Recommended semester
BIE-BIT.2015 Computer Security and Information technology (Bachelor, in English) PO 5
BIE-TI.2015_ORIGINAL Computer Science (Bachelor, in English) V 5
BIE-TI.2015 Computer Science (Bachelor, in English) V 5
BIE-WSI-SI.2015 Software Engineering (Bachelor, in English) V 5


Page updated 19. 4. 2024, semester: L/2020-1, L/2021-2, Z/2023-4, Z/2024-5, Z/2019-20, Z/2022-3, L/2019-20, L/2022-3, Z/2020-1, Z/2021-2, L/2023-4, Send comments to the content presented here to Administrator of study plans Design and implementation: J. Novák, I. Halaška