Course detail
ICT Security 1
FEKT-BPC-IC1Acad. year: 2022/2023
The course covers the topics dealing with secure configuration and administration of modern operating systems. In particular, these topics are included: Windows, Linux and macOS encryption, authentication subsystems of Windows, Linux and macOS platforms, network security features of Windows, Linux and macOS platforms, iOS and Android security architecture, virtualization platform specifics, system vulnerabilities, exploitation and malicious software (malware).
Language of instruction
Number of ECTS credits
Mode of study
Guarantor
Department
Learning outcomes of the course unit
- Analyze and correctly implement the encryption mechanisms on Windows, Linux and macOS operating systems.
- Analyze and correctly implement the authentication mechanisms on Windows, Linux and macOS operating systems.
- Explain the principles and manage security mechanisms of the network subsystems on Windows, Linux and macOS operating systems.
- Explain the basic principles of the iOS and Android platform security.
- Use the basic security principles in the virtualized environment.
Prerequisites
Co-requisites
Planned learning activities and teaching methods
Assesment methods and criteria linked to learning outcomes
Course curriculum
2. Windows security 1: Authentication on Windows OS
3. Windows security 2: Data protection on Windows OS
4. Windows security 3: Network security on Windows OS
5. Exploiting: Software vulnerabilities
6. Malware and Ransomware
7. Linux Security 1: Authentication on Linux OS
8. Linux Security 2: Data protection and Network security on Linux OS
9. Linux Security 3: SELinux
10. macOS security: macOS security mechanisms
11. Mobile OS Security 1: iOS
12. Mobile OS Security 2: Android
13. Security aspects of virtualization environments
Work placements
Aims
Specification of controlled education, way of implementation and compensation for absences
Recommended optional programme components
Prerequisites and corequisites
Basic literature
POGUE, David. Mac OS X Lion: kompletní průvodce. 1. vyd. Brno: Computer Press, 2013, 1040 s. ISBN 978-80-251-3758-1.
SCHRODER, Carla. Linux: kuchařka administrátora sítě. Vyd. 1. Brno: Computer Press, 2009, 596 s. ISBN 978-80-251-2407-9.
STALLINGS, William. Cryptography and network security: principles and practice. Seventh edition. xix, 731 pages. ISBN 01-333-5469-5.
Recommended reading
Elearning
Classification of course in study plans
Type of course unit
Lecture
Teacher / Lecturer
Syllabus
2. Ochrana dat na OS Windows
3. Síťová bezpečnost u OS Windows
4. Autentizace u OS Windows
5. Ochrana dat na OS Linux
6. Síťová bezpečnost u OS Linux
7. Autentizace u OS Linux
8. Ochrana dat na OS X
9. Síťová bezpečnost u OS X
10. Autentizace u OS X
11. Bezpečnost mobilních OS
12. Bezpečnostní aspekty virtualizačních prostředí
13. Specializované OS
Laboratory exercise
Teacher / Lecturer
Syllabus
2. Ochrana dat na OS Windows
3. Síťová bezpečnost u OS Windows
4. Autentizace u OS Windows
5. Ochrana dat na OS Linux
6. Síťová bezpečnost u OS Linux
7. Autentizace u OS Linux
8. Ochrana dat na OS X
9. Síťová bezpečnost u OS X
10. Autentizace u OS X
11. Bezpečnost mobilních OS
12. Bezpečnostní aspekty virtualizačních prostředí
13. Specializované OS
Elearning