Course detail
ICT Security 1
FEKT-BPC-IC1Acad. year: 2023/2024
The course covers the topics dealing with secure configuration and administration of modern operating systems. In particular, these topics are included: Windows, Linux and macOS encryption, authentication subsystems of Windows, Linux and macOS platforms, network security features of Windows, Linux and macOS platforms, iOS and Android security architecture, virtualization platform specifics, system vulnerabilities, exploitation and malicious software (malware).
Language of instruction
Number of ECTS credits
Mode of study
Guarantor
Department
Entry knowledge
Rules for evaluation and completion of the course
The conditions for the successful course completion are stated in the yearly updated supervisor’s notice.
Aims
Students will learn the practical knowledge from the modern operating system security. The main stress is put to the most popular OS platforms, namely Windows, Linux and macOS. For each platform, the students learn how to use built-in mechanisms for data encryption, authentication and network security. Students also learn the principles of iOS and Android mobile platform security. After successful completions, the students will be able to:
- Analyze and correctly implement the encryption mechanisms on Windows, Linux and macOS operating systems.
- Analyze and correctly implement the authentication mechanisms on Windows, Linux and macOS operating systems.
- Explain the principles and manage security mechanisms of the network subsystems on Windows, Linux and macOS operating systems.
- Explain the basic principles of the iOS and Android platform security.
- Use the basic security principles in the virtualized environment.
Study aids
Prerequisites and corequisites
Basic literature
POGUE, David. Mac OS X Lion: kompletní průvodce. 1. vyd. Brno: Computer Press, 2013, 1040 s. ISBN 978-80-251-3758-1.
SCHRODER, Carla. Linux: kuchařka administrátora sítě. Vyd. 1. Brno: Computer Press, 2009, 596 s. ISBN 978-80-251-2407-9.
STALLINGS, William. Cryptography and network security: principles and practice. Seventh edition. xix, 731 pages. ISBN 01-333-5469-5.
Recommended reading
Elearning
Classification of course in study plans
Type of course unit
Lecture
Teacher / Lecturer
Syllabus
2. Windows security 1: Authentication on Windows OS
3. Windows security 2: Data protection on Windows OS
4. Windows security 3: Network security on Windows OS
5. Exploiting: Software vulnerabilities
6. Malware and Ransomware
7. Linux Security 1: Authentication on Linux OS
8. Linux Security 2: Data protection and Network security on Linux OS
9. Linux Security 3: SELinux
10. macOS security: macOS security mechanisms
11. Mobile OS Security 1: iOS
12. Mobile OS Security 2: Android
13. Security aspects of virtualization environments
Laboratory exercise
Teacher / Lecturer
Syllabus
2. Authentication in OS Windows
3. Data protection in OS Windows
4. Network security in OS Windows
5. Ethical Hacking: System/Software Vulnerabilities, Project Assignment
6. Authentication in OS LINUX
7. Ethical hacking: Data protection in OS LINUX, Elevation of privileges
8. Network security in OS LINUX
9. SELinux
10. Authentication and Data Security in macOS
11. Network Security in macOS
12. Presentation of semester projects
13. Presentation of semester projects
Elearning