Main page | Study Branches/Specializations | Groups of Courses | All Courses | Roles                Instructions

A course is the basic teaching unit, it's design as a medium for a student to acquire comprehensive knowledge and skills indispensable in the given field. A course guarantor is responsible for the factual content of the course.
For each course, there is a department responsible for the course organisation. A person responsible for timetabling for a given department sets a time schedule of teaching and for each class, s/he assigns an instructor and/or an examiner.
Expected time consumption of the course is expressed by a course attribute extent of teaching. For example, extent = 2 +2 indicates two teaching hours of lectures and two teaching hours of seminar (lab) per week.
At the end of each semester, the course instructor has to evaluate the extent to which a student has acquired the expected knowledge and skills. The type of this evaluation is indicated by the attribute completion. So, a course can be completed by just an assessment ('pouze zápočet'), by a graded assessment ('klasifikovaný zápočet'), or by just an examination ('pouze zkouška') or by an assessment and examination ('zápočet a zkouška') .
The difficulty of a given course is evaluated by the amount of ECTS credits.
The course is in session (cf. teaching is going on) during a semester. Each course is offered either in the winter ('zimní') or summer ('letní') semester of an academic year. Exceptionally, a course might be offered in both semesters.
The subject matter of a course is described in various texts.

NIE-SBF System Security and Forensics Extent of teaching: 2P+1C
Instructor: Fornůsek S. Completion: Z,ZK
Department: 18106 Credits: 5 Semester: Z

Annotation:
Students will be introduced to various aspects of system security (principles of endpoint security, principles of security policies, security models, authentication concepts). Students will also learn about forensic analysis as a tool for investigating security incidents (techniques used by malicious software or attackers, forensic analysis techniques, and the importance of memory or file system artifacts for attack analysis and detection).

Lecture syllabus:
1. Security of information systems, security policies.
2. Security models and modeling.
3. Authentication: Management of encryption keys and certificates, secure local and remote authentication.
4. Authentication: Authentication protocols, Kerberos.
5. Security of distributed services and cloud.
6. Forensics: Introduction.
7. Forensics: Forensic imaging.
8. Forensics: File systems analysis, Data Carving.
9. Forensics: Volatile memory.
10. Forensics: Information and residual data, activities of OS, applications and users.
11. Security of terminal stations.
12. Cyber attacks, methods and classification.
13. Security of Distributed Services - Internet of Things (IoT)

Seminar syllabus:
1. Malware Analysis - basics
2. File System Artifacts
3. Memory Analysis
4. Windows Registry
5. Residual user data & artefacts in Windows OS

Literature:
1. Carvey, H. : Investigating Windows Systems. Academic Press, 2018. ISBN 978-0128114155.
2. Vacca, J. R. : Network and System Security (2nd Edition). Syngress, 2013. ISBN 978-0124166899.
3. Kim, D. - Solomon, M. : Fundamentals of Information Systems Security. Jones & Bartlett Learning, 2012. ISBN 987-0-7637-9025-7.
4. Stallings, W. : Cryptography and Network Security: Principles and Practice (5th Edition). Prentice Hall, 2010. ISBN 0-13-869017-0.
5. Anderson, R. : Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley, 2008. ISBN 0470068523.

Requirements:
No prerequisites

Chybí webová stránka.

The course is also part of the following Study plans:
Study Plan Study Branch/Specialization Role Recommended semester
NIE-PB.21 Computer Security 2021 PS 1
NIE-TI.21 Computer Science 2021 VO 1
NIE-NPVS.21 Design and Programming of Embedded Systems 2021 V 1
NIE-SI.21 Software Engineering 2021 V 1
NIE-PSS.21 Computer Systems and Networks 2021 V 1


Page updated 29. 3. 2024, semester: L/2021-2, Z,L/2023-4, Z/2021-2, Z/2020-1, Z/2019-20, L/2020-1, Z,L/2022-3, L/2019-20, Send comments to the content presented here to Administrator of study plans Design and implementation: J. Novák, I. Halaška