FI:PA211 Adv. Topics of Cyber Security - Course Information
PA211 Advanced Topics of Cyber SecurityFaculty of Informatics
- Extent and Intensity
- 2/1/1. 3 credit(s) (plus extra credits for completion). Type of Completion: zk (examination).
- doc. Ing. Pavel Čeleda, Ph.D. (lecturer)
RNDr. Martin Drašar, Ph.D. (lecturer)
RNDr. Daniel Kouřil, Ph.D. (lecturer)
RNDr. Michal Procházka, Ph.D. (lecturer)
RNDr. Jana Komárková (seminar tutor)
RNDr. Martin Laštovička (seminar tutor)
- Guaranteed by
- doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications - Faculty of Informatics
Supplier department: Department of Computer Systems and Communications - Faculty of Informatics
- Tue 10:00–11:50 A319
- Timetable of Seminar Groups:
PA211/02: each odd Wednesday 12:00–13:50 A215, M. Drašar, J. Komárková, M. Laštovička, M. Procházka
- Prerequisites (in Czech)
- (( PV210 Security in an organization || SOUHLAS ) && ( PA159 Net-Centric Computing I || PA191 Advanced Computer Networking ) && ( PV065 UNIX -- Advanced Course I ))
recommended to concurrently enroll in PV077 UNIX -- Programming and System Management II
- Course Enrolment Limitations
- The course is offered to students of any study field.
The capacity limit for the course is 30 student(s).
Current registration and enrolment status: enrolled: 0/30, only registered: 0/30, only registered with preference (fields directly associated with the programme): 0/30
- Course objectives (in Czech)
- Graduate of this course shall be able to: organize establishment and operation of a CSIRT; understand advanced concepts in designing, developing, managing and analyzing of systems and tools used by a CSIRT; select appropriate methods of security monitoring, analysis and digital forensics for a given application;
- Syllabus (in Czech)
- Cyber security in an organization (summary of the course Cyber security in an organization).
- Establishing of a CSIRT.
- Structure of a CSIRT.
- Penetration testing.
- Network security monitoring and attacks.
- Advanced methods of network traffic monitoring (packet and flow analysis - Wireshark, Flowmon).
- Advanced analysis of complex attacks.
- Advance methods of detection and evidence of security threats using network traffic.
- Alerts: Generating, Collecting, Sharing
- Tools for digital forensic investigation (both commercial and open source).
- Methods of digital forensics.
- Forensic analysis of a simulated incident (analysis of data from heterogeneous sources).
- M. J. West-Brown, et al. Handbook for Computer Security Incident Response Teams (CSIRTs). No. CMU/SEI-2003-HB-002. Carnegie-Mellon University Pittsburgh, 2003. http://www.cert.org/archive/pdf/csirt-handbook.pdf
- K. Mell, P.: Guide to Intrusion Detection and Prevention Systems (IDPS). Recommendations of the National Institute of Standards and Technology, 2007.
- Teaching methods (in Czech)
- Lectures, 6 seminars, 6 assignments (homework) during the semester.
- Assessment methods (in Czech)
- Assignments during the semester (40 %), written exam (60 %).
- Language of instruction
- Further Comments
- Study Materials
The course is taught annually.