FI:PV210 Security in an organization - Course Information
PV210 Cyber security in an organization
Faculty of InformaticsAutumn 2015
- Extent and Intensity
- 2/0/1. 2 credit(s) (plus extra credits for completion). Type of Completion: zk (examination).
- Teacher(s)
- doc. RNDr. Jan Vykopal, Ph.D. (lecturer)
doc. Ing. Pavel Čeleda, Ph.D. (lecturer)
RNDr. Daniel Kouřil, Ph.D. (lecturer)
RNDr. Michal Procházka, Ph.D. (lecturer)
RNDr. Martin Drašar, Ph.D. (assistant)
RNDr. Martin Husák, Ph.D. (assistant)
RNDr. Tomáš Jirsík, Ph.D. (assistant)
RNDr. Petr Velan, Ph.D. (assistant) - Guaranteed by
- doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: doc. RNDr. Jan Vykopal, Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Wed 8:00–9:50 A217
- Prerequisites
- (( PV080 Prot. Data and Inf. Privacy ) && ( PB156 Computer Networks || PV183 Computer Networks Technology ) &&( PV004 UNIX ) )|| SOUHLAS
basic Linux experience at the level of PV004; recommended to concurrently enroll in PV017 - Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 60 student(s).
Current registration and enrolment status: enrolled: 0/60, only registered: 0/60, only registered with preference (fields directly associated with the programme): 0/60 - fields of study / plans the course is directly associated with
- Applied Informatics (programme FI, B-AP)
- Applied Informatics (programme FI, N-AP)
- Information Technology Security (eng.) (programme FI, N-IN)
- Information Technology Security (programme FI, N-IN)
- Bioinformatics (programme FI, B-AP)
- Bioinformatics (programme FI, N-AP)
- Information Systems (programme FI, N-IN)
- Informatics with another discipline (programme FI, B-EB)
- Informatics with another discipline (programme FI, B-FY)
- Informatics with another discipline (programme FI, B-GE)
- Informatics with another discipline (programme FI, B-GK)
- Informatics with another discipline (programme FI, B-CH)
- Informatics with another discipline (programme FI, B-IO)
- Informatics with another discipline (programme FI, B-MA)
- Informatics with another discipline (programme FI, B-TV)
- Informatics (eng.) (programme FI, D-IN4)
- Informatics (programme FI, D-IN4)
- Mathematical Informatics (programme FI, B-IN)
- Parallel and Distributed Systems (programme FI, B-IN)
- Parallel and Distributed Systems (programme FI, N-IN)
- Computer Graphics and Image Processing (programme FI, B-IN)
- Computer Graphics (programme FI, N-IN)
- Computer Networks and Communication (programme FI, B-IN)
- Computer Networks and Communication (programme FI, N-IN)
- Computer Systems and Technologies (eng.) (programme FI, D-IN4)
- Computer Systems and Technologies (programme FI, D-IN4)
- Computer Systems and Data Processing (programme FI, B-IN)
- Computer Systems (programme FI, N-IN)
- Embedded Systems (eng.) (programme FI, N-IN)
- Programmable Technical Structures (programme FI, B-IN)
- Embedded Systems (programme FI, N-IN)
- Service Science, Management and Engineering (eng.) (programme FI, N-AP)
- Service Science, Management and Engineering (programme FI, N-AP)
- Social Informatics (programme FI, B-AP)
- Theoretical Informatics (programme FI, N-IN)
- Upper Secondary School Teacher Training in Informatics (programme FI, N-SS) (2)
- Artificial Intelligence and Natural Language Processing (programme FI, B-IN)
- Artificial Intelligence and Natural Language Processing (programme FI, N-IN)
- Image Processing (programme FI, N-AP)
- Course objectives
- The general objective of the course is the introduction of services of a computer security incident response team (CSIRT) in an organization. At the end of the course student should be able to: understand basic services of a CSIRT; use basic tools of a CSIRT;
- Syllabus
- Computer Security incident Response Team (CSIRT).
- Basic services of a CSIRT.
- Role of a CSIRT in an organization. Infrastructure of CSIRTs. Skills of a CSIRT employee.
- Incident handling (incident taxonomy, processes, and best practices).
- Penetration testing. Security awareness and education.
- Introduction to network security and monitoring, legal issues.
- Packet capture and analysis. Detection of operational issues and intrusions (PCAP, Wireshark).
- Network flow acquisition, collection and analysis (NetFlow, IPFIX, NFDUMP).
- Principles of network intrusion detection and prevention and their limits.
- Introduction to digital forensic investigation.
- Analysis of ongoing incident vs. post-mortem analysis.
- Evidence collection and submission for police investigation.
- Case study: CSIRT-MU, CESNET-CERTS, CSIRT.CZ, GovCERT.
- Literature
- Scarfone, K. Mell, P.: Guide to Intrusion Detection and Prevention Systems (IDPS). Recommendations of the National Institute of Standards and Technology, 2007.
- M. J. West-Brown, et al. Handbook for Computer Security Incident Response Teams (CSIRTs). No. CMU/SEI-2003-HB-002. Carnegie-Mellon University Pittsburgh, 2003. http://www.cert.org/archive/pdf/csirt-handbook.pdf
- Teaching methods
- Lectures, 4 assignments (homework) during the semester.
- Assessment methods
- Assignments during the semester (30 %), written exam (70 %).
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- The course is taught annually.
- Enrolment Statistics (Autumn 2015, recent)
- Permalink: https://is.muni.cz/course/fi/autumn2015/PV210