PA211 Advanced Topics of Cyber Security

Faculty of Informatics
Spring 2018
Extent and Intensity
2/1/1. 3 credit(s) (plus extra credits for completion). Type of Completion: zk (examination).
Teacher(s)
doc. Ing. Pavel Čeleda, Ph.D. (lecturer)
RNDr. Martin Drašar, Ph.D. (lecturer)
RNDr. Daniel Kouřil, Ph.D. (lecturer)
RNDr. Michal Procházka, Ph.D. (lecturer)
RNDr. Jan Vykopal, Ph.D. (lecturer)
RNDr. Tomáš Jirsík (seminar tutor)
Mgr. Martin Laštovička (seminar tutor)
RNDr. Petr Velan (seminar tutor)
RNDr. Martin Vizváry (seminar tutor)
RNDr. Martin Husák (assistant)
Supervisor
doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications - Faculty of Informatics
Supplier department: Department of Computer Systems and Communications - Faculty of Informatics
Prerequisites (v češtině)
(( PV210 Security in an organization || SOUHLAS ) && ( PA159 Net-Centric Computing I || PA191 Advanced Computer Networking ) && ( PV065 UNIX -- Advanced Course I ))
recommended to concurrently enroll in PV077 UNIX -- Programming and System Management II
Course Enrolment Limitations
The course is offered to students of any study field.
The capacity limit for the course is 30 student(s).
Current registration and enrolment status: enrolled: 0/30, only registered: 0/30, only registered with preference (fields directly associated with the programme): 0/30
Course objectives (v češtině)
Graduate of this course shall be able to: organize establishment and operation of a CSIRT; understand advanced concepts in designing, developing, managing and analyzing of systems and tools used by a CSIRT; select appropriate methods of security monitoring, analysis and digital forensics for a given application;
Syllabus (v češtině)
  • Cyber security in an organization (summary of the course Cyber security in an organization).
  • Establishing of a CSIRT.
  • Structure of a CSIRT.
  • Penetration testing.
  • Honeypots.
  • Network security monitoring and attacks.
  • Advanced methods of network traffic monitoring (packet and flow analysis - Wireshark, Bro, FlowMon).
  • Advanced analysis of complex attacks (Bro Intelligence Module).
  • Advance methods of detection and evidence of security threats using network traffic.
  • Tools for digital forensic investigation (both commercial and open source).
  • Methods of digital forensics.
  • Forensic analysis of a simulated incident (analysis of data from heterogeneous sources).
Literature
  • M. J. West-Brown, et al. Handbook for Computer Security Incident Response Teams (CSIRTs). No. CMU/SEI-2003-HB-002. Carnegie-Mellon University Pittsburgh, 2003. http://www.cert.org/archive/pdf/csirt-handbook.pdf
  • K. Mell, P.: Guide to Intrusion Detection and Prevention Systems (IDPS). Recommendations of the National Institute of Standards and Technology, 2007.
Teaching methods (v češtině)
Lectures, 6 seminars, 6 assignments (homework) during the semester.
Assessment methods (v češtině)
Assignments during the semester (40 %), written exam (60 %).
Language of instruction
English
Further Comments
The course is taught annually.
The course is taught: every week.
The course is also listed under the following terms Spring 2016, Spring 2017.
  • Enrolment Statistics (Spring 2018, recent)
  • Permalink: https://is.muni.cz/course/fi/spring2018/PA211

Go to top | Current date and time: 25. 9. 2017 17:24, Week 39 (odd)

Contact: istech(zavináč/atsign)fi(tečka/dot)muni(tečka/dot)cz, Office for Studies, access rights administrators, is-technicians, e-technicians, IT support | Use of cookies | Více o Informačním systému