FI:PV204 Lab - security, appl. crypto 2 - Course Information
PV204 Laboratory of security and applied cryptography IIFaculty of Informatics
- Extent and Intensity
- 0/2/1. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: k (colloquium). Other types of completion: z (credit).
- Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
Ing. Milan Brož, Ph.D. (seminar tutor)
Mgr. Vít Bukač, Ph.D. (seminar tutor)
Mgr. et Mgr. Jan Krhovják, Ph.D. (seminar tutor)
RNDr. Marek Kumpošt, Ph.D. (seminar tutor)
RNDr. Václav Lorenc (seminar tutor)
RNDr. Marián Novotný, Ph.D. (seminar tutor)
doc. RNDr. Petr Švenda, Ph.D. (seminar tutor)
- Guaranteed by
- doc. RNDr. Vlastislav Dohnal, Ph.D.
Department of Computer Systems and Communications - Faculty of Informatics
Contact Person: Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D.
Supplier department: Department of Computer Systems and Communications - Faculty of Informatics
- Timetable of Seminar Groups
- PV204/01: Mon 16:00–17:50 G191a, M. Kumpošt, Z. Říha, P. Švenda
PV204/02: Mon 10:00–11:50 G191a, M. Kumpošt, Z. Říha, P. Švenda
- Registration to PV204 requires: 1) long-term interest in IT security; 2) programming skills (ideally C and Java) under Unix/Linux or Windows; 3) fluent English.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 30 student(s).
Current registration and enrolment status: enrolled: 0/30, only registered: 0/30, only registered with preference (fields directly associated with the programme): 0/30
- fields of study / plans the course is directly associated with
- there are 32 fields of study the course is directly associated with, display
- Course objectives
- The aim of this subject is to understand details of biometric authentication systems and be able to apply the gained knowledge in practice. At the end of the course students also will be able to understand the principles of network security and identify weak points in networks.
- Biometric systems (error rates, keyboard typing, voice verification, face recognition, fingerprints and their security, calculation of error rates). Network security (eavesdropping, security of active network entities, IDS systems, vulnerability scanning, wireless networks). Security of operating systems (Windows, Linux, rootkits, viruses, web applications).
- Handbook of biometrics. Edited by Anil K. Jain - Patrick J. Flynn - Arun A. Ross. New York: Springer, 2008. x, 556. ISBN 9780387710402. info
- STALLINGS, William. Cryptography and network security : principles and practice. 4th ed. Upper Saddle River, N.J.: Pearson/Prentice Hall, 2006. xvi, 680. ISBN 0131873164. info
- JAIN, Anil K., Ruud BOLLE and Sharath PANKANTI. Biometrics: Personal Identification in Networked Society. Norwell, Massachusetts: Kluwer Academic Publishers, 1999. 411 pp. Second printing 1999. ISBN 0-7923-8345-1. info
- Teaching methods
- seminars in a security lab, homeworks
- Assessment methods
- Two hours per week are scheduled for seminars, otherwise students work on projects, homeworks etc. in their free time. There are 13 homeworks (10 points each). To get the credit (Z) 50% of the points are required.
- Language of instruction
- Follow-Up Courses
- Further comments (probably available only in Czech)
- Study Materials
The course is taught annually.