|
Lecturer(s)
|
-
Brandejský Tomáš, doc. Ing. Dr.
|
|
Course content
|
There will be disscussed typical attacks and their scenarios. There will be solved problematics of security policy of company/institution including behaviour after identified attacks, determination of defence mechanisms adequacy, penetration analysis and forenze analysis. Students will take practical skills with basic tools used for etical hacking or for forenze analysis. Main topics of course: *Secure hazards in information environment, typical forms and aims of attack. Concepts of security, threat, risk, volunderability. Risks in government and public health. Management of information security by ISO/IEC 27001. *Valid legislative in the area of cybersecurity, its expected evolution in near future. *Security policy, adequate measures, human resources management. Security policy of organization, its definition, problems of its implementation in real environmment, related leglegislation. *Penetration and forenze analyzis. Infrastructure analyzis, DOS & DDOS tests, pishing attacks, "Red team" simulated attacks, audits of OS, attack detection, valid legislation. *Geting knowledge of related tools and procedures.
|
|
Learning activities and teaching methods
|
|
Monologic (reading, lecture, briefing), Methods of individual activities, Laboratory work
|
|
Learning outcomes
|
In this course, students will be introduced into problems of informačtion systém security, related legislation, institutional environment especially in ČR, critical infrastructure and network security, typical risks for institutions, companies and individuals.
|
|
Prerequisites
|
unspecified
|
|
Assessment methods and criteria
|
Oral examination, Written examination, Home assignment evaluation
The student completes at least 3 consultations during the semester concerning the theoretical content of the course. The student will pass at least 1 consultations concerning the assigned practical problem. In practical part of study student will implement secure measure, analyze of security policy, or ethic hacking of suitable system. In the case of secure measure implementation student will demostrate its functionality and will explain its implementation, in the case of analysis or ethic hacking student will demonstrate results of his/her analysis and design.
|
|
Recommended literature
|
-
Banks, Jerry. Handbook of simulation : principles, methodology, advances, applications, and practice. New York: John Wiley & Sons, 1998. ISBN 0-471-13403-1.
-
Kizza, Z. Guide to computer network security. Heidelberg: Springer, 2015. ISBN 978-1-4471-6653-5.
-
Li, Q.; Clark. G. Security intelligence. Indianapolis: Jon Wiley, 2015. ISBN 978-1-118-89669-3.
|