Course detail

ICT Security 1

FEKT-BPC-IC1Acad. year: 2023/2024

The course covers the topics dealing with secure configuration and administration of modern operating systems. In particular, these topics are included: Windows, Linux and macOS encryption, authentication subsystems of Windows, Linux and macOS platforms, network security features of Windows, Linux and macOS platforms, iOS and Android security architecture, virtualization platform specifics, system vulnerabilities, exploitation and malicious software (malware). 

Language of instruction

Czech

Number of ECTS credits

7

Mode of study

Not applicable.

Entry knowledge

No special prerequisites are required. Only high school knowledge and general PC usage experience is expected.

Rules for evaluation and completion of the course

The maximum of 20 points is given upon completion of the laboratory assignments. The completion of a semester project adds upto 20 points. The requirements on the completion of the tasks in laboratories and projects are described in the annual supervisor’s notice. The maximum of 60 points can be gained during the final exam.
The conditions for the successful course completion are stated in the yearly updated supervisor’s notice.

Aims

The goal of the course is to provide students with the information about the security architecture of modern operating systems. The students will learn both theoretical and practical aspects of Windows, Linux and macOS security features. The security of mobile platforms, system vulnerabilities and their exploitation, and malicious software (malware) are also covered in this course.
Students will learn the practical knowledge from the modern operating system security. The main stress is put to the most popular OS platforms, namely Windows, Linux and macOS. For each platform, the students learn how to use built-in mechanisms for data encryption, authentication and network security. Students also learn the principles of iOS and Android mobile platform security. After successful completions, the students will be able to:
- Analyze and correctly implement the encryption mechanisms on Windows, Linux and macOS operating systems.
- Analyze and correctly implement the authentication mechanisms on Windows, Linux and macOS operating systems.
- Explain the principles and manage security mechanisms of the network subsystems on Windows, Linux and macOS operating systems.
- Explain the basic principles of the iOS and Android platform security.
- Use the basic security principles in the virtualized environment.

Study aids

Not applicable.

Prerequisites and corequisites

Not applicable.

Basic literature

NORTHRUP, Anthony. Mistrovství v Microsoft Windows 8: kompletní průvodce do posledního detailu. 1. vyd. Brno: Computer Press, 2013, 615 s. ISBN 978-80-251-4111-3.
SCHRODER, Carla. Linux: kuchařka administrátora sítě. Vyd. 1. Brno: Computer Press, 2009, 596 s. ISBN 978-80-251-2407-9.
POGUE, David. Mac OS X Lion: kompletní průvodce. 1. vyd. Brno: Computer Press, 2013, 1040 s. ISBN 978-80-251-3758-1.
STALLINGS, William. Cryptography and network security: principles and practice. Seventh edition. xix, 731 pages. ISBN 01-333-5469-5.

Recommended reading

Not applicable.

eLearning

Classification of course in study plans

  • Programme BPC-IBE Bachelor's, 2. year of study, summer semester, compulsory
  • Programme BPC-TLI Bachelor's, 3. year of study, summer semester, compulsory-optional

Type of course unit

 

Lecture

26 hours, optionally

Teacher / Lecturer

Syllabus

1. Operating system security introduction
2. Windows security 1: Authentication on Windows OS
3. Windows security 2: Data protection on Windows OS
4. Windows security 3: Network security on Windows OS
5. Exploiting: Software vulnerabilities
6. Malware and Ransomware
7. Linux Security 1: Authentication on Linux OS
8. Linux Security 2: Data protection and Network security on Linux OS
9. Linux Security 3: SELinux
10. macOS security: macOS security mechanisms
11. Mobile OS Security 1: iOS
12. Mobile OS Security 2: Android
13. Security aspects of virtualization environments 

Laboratory exercise

26 hours, compulsory

Teacher / Lecturer

Syllabus

1. Familiarization with the laboratory, Virtualization of operating systems, Windows OS installation
2. Authentication in OS Windows
3. Data protection in OS Windows
4. Network security in OS Windows
5. Ethical Hacking: System/Software Vulnerabilities, Project Assignment
6. Authentication in OS LINUX
7. Ethical hacking: Data protection in OS LINUX, Elevation of privileges
8. Network security in OS LINUX
9. SELinux
10. Authentication and Data Security in macOS
11. Network Security in macOS
12. Presentation of semester projects
13. Presentation of semester projects

Project

26 hours, compulsory

Teacher / Lecturer

eLearning