FI:PA211 Adv. Topics of Cyber Security - Course Information
PA211 Advanced Topics of Cyber Security
Faculty of InformaticsSpring 2018
- Extent and Intensity
- 2/1/1. 3 credit(s) (plus extra credits for completion). Type of Completion: zk (examination).
- Teacher(s)
- doc. Ing. Pavel Čeleda, Ph.D. (lecturer)
RNDr. Martin Drašar, Ph.D. (lecturer)
RNDr. Daniel Kouřil, Ph.D. (lecturer)
RNDr. Michal Procházka, Ph.D. (lecturer)
RNDr. Jana Komárková, Ph.D. (seminar tutor)
RNDr. Martin Laštovička, Ph.D. (seminar tutor) - Guaranteed by
- doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Tue 10:00–11:50 A319
- Timetable of Seminar Groups:
PA211/02: each odd Wednesday 12:00–13:50 A215, M. Drašar, J. Komárková, M. Laštovička, M. Procházka - Prerequisites (in Czech)
- (( PV210 Security in an organization || SOUHLAS) && ( PA159 Net-Centric Computing I || PA191 Advanced Computer Networking ) && ( PV065 UNIX -- Advanced Course I ))
recommended to concurrently enroll in PV077 UNIX -- Programming and System Management II - Course Enrolment Limitations
- The course is offered to students of any study field.
The capacity limit for the course is 30 student(s).
Current registration and enrolment status: enrolled: 0/30, only registered: 0/30, only registered with preference (fields directly associated with the programme): 0/30 - Course objectives (in Czech)
- Graduate of this course shall be able to: organize establishment and operation of a CSIRT; understand advanced concepts in designing, developing, managing and analyzing of systems and tools used by a CSIRT; select appropriate methods of security monitoring, analysis and digital forensics for a given application;
- Syllabus (in Czech)
- Cyber security in an organization (summary of the course Cyber security in an organization).
- Establishing of a CSIRT.
- Structure of a CSIRT.
- Penetration testing.
- Network security monitoring and attacks.
- Advanced methods of network traffic monitoring (packet and flow analysis - Wireshark, Flowmon).
- Advanced analysis of complex attacks.
- Advance methods of detection and evidence of security threats using network traffic.
- Honeypots.
- Alerts: Generating, Collecting, Sharing
- Tools for digital forensic investigation (both commercial and open source).
- Methods of digital forensics.
- Forensic analysis of a simulated incident (analysis of data from heterogeneous sources).
- Literature
- M. J. West-Brown, et al. Handbook for Computer Security Incident Response Teams (CSIRTs). No. CMU/SEI-2003-HB-002. Carnegie-Mellon University Pittsburgh, 2003. http://www.cert.org/archive/pdf/csirt-handbook.pdf
- K. Mell, P.: Guide to Intrusion Detection and Prevention Systems (IDPS). Recommendations of the National Institute of Standards and Technology, 2007.
- Teaching methods (in Czech)
- Lectures, 6 seminars, 6 assignments (homework) during the semester.
- Assessment methods (in Czech)
- Assignments during the semester (40 %), written exam (60 %).
- Language of instruction
- English
- Further Comments
- Study Materials
The course is taught annually.
- Enrolment Statistics (Spring 2018, recent)
- Permalink: https://is.muni.cz/course/fi/spring2018/PA211