Course detail

ICT Security 1

FEKT-BPC-IC1Acad. year: 2022/2023

The course covers the topics dealing with secure configuration and administration of modern operating systems. In particular, these topics are included: Windows, Linux and macOS encryption, authentication subsystems of Windows, Linux and macOS platforms, network security features of Windows, Linux and macOS platforms, iOS and Android security architecture, virtualization platform specifics, system vulnerabilities, exploitation and malicious software (malware).  

Language of instruction

Czech

Number of ECTS credits

7

Mode of study

Not applicable.

Learning outcomes of the course unit

Students will learn the practical knowledge from the modern operating system security. The main stress is put to the most popular OS platforms, namely Windows, Linux and macOS. For each platform, the students learn how to use built-in mechanisms for data encryption, authentication and network security. Students also learn the principles of iOS and Android mobile platform security. After successful completions, the students will be able to:
- Analyze and correctly implement the encryption mechanisms on Windows, Linux and macOS operating systems.
- Analyze and correctly implement the authentication mechanisms on Windows, Linux and macOS operating systems.
- Explain the principles and manage security mechanisms of the network subsystems on Windows, Linux and macOS operating systems.
- Explain the basic principles of the iOS and Android platform security.
- Use the basic security principles in the virtualized environment.

Prerequisites

No special prerequisites are required. Only high school knowledge and general PC usage experience is expected.

Co-requisites

Not applicable.

Planned learning activities and teaching methods

Methods of educations are described in the article 7 of the BUT’s Study and Examination Regulation. Teaching methods include lectures, laboratories and individual projects. Course is taking advantage of e-learning (Moodle) system.

Assesment methods and criteria linked to learning outcomes

The maximum of 20 points is given upon completion of the laboratory assignments. The completion of a semester project adds upto 20 points. The requirements on the completion of the tasks in laboratories and projects are described in the annual supervisor’s notice. The maximum of 60 points can be gained during the final exam.

Course curriculum

1. Operating system security introduction
2. Windows security 1: Authentication on Windows OS
3. Windows security 2: Data protection on Windows OS
4. Windows security 3: Network security on Windows OS
5. Exploiting: Software vulnerabilities
6. Malware and Ransomware
7. Linux Security 1: Authentication on Linux OS
8. Linux Security 2: Data protection and Network security on Linux OS
9. Linux Security 3: SELinux
10. macOS security: macOS security mechanisms
11. Mobile OS Security 1: iOS
12. Mobile OS Security 2: Android
13. Security aspects of virtualization environments

Work placements

Not applicable.

Aims

The goal of the course is to provide students with the information about the security architecture of modern operating systems. The students will learn both theoretical and practical aspects of Windows, Linux and macOS security features. The security of mobile platforms, system vulnerabilities and their exploitation, and malicious software (malware) are also covered in this course.

Specification of controlled education, way of implementation and compensation for absences

The conditions for the successful course completion are stated in the yearly updated supervisor’s notice.

Recommended optional programme components

Not applicable.

Prerequisites and corequisites

Not applicable.

Basic literature

NORTHRUP, Anthony. Mistrovství v Microsoft Windows 8: kompletní průvodce do posledního detailu. 1. vyd. Brno: Computer Press, 2013, 615 s. ISBN 978-80-251-4111-3.
POGUE, David. Mac OS X Lion: kompletní průvodce. 1. vyd. Brno: Computer Press, 2013, 1040 s. ISBN 978-80-251-3758-1.
SCHRODER, Carla. Linux: kuchařka administrátora sítě. Vyd. 1. Brno: Computer Press, 2009, 596 s. ISBN 978-80-251-2407-9.
STALLINGS, William. Cryptography and network security: principles and practice. Seventh edition. xix, 731 pages. ISBN 01-333-5469-5.

Recommended reading

Not applicable.

Elearning

Classification of course in study plans

  • Programme BPC-IBE Bachelor's 2 year of study, summer semester, compulsory
  • Programme BPC-TLI Bachelor's 3 year of study, summer semester, compulsory-optional

Type of course unit

 

Lecture

26 hod., optionally

Teacher / Lecturer

Syllabus

1. Úvod do problematiky operačních systémů z pohledu bezpečnosti
2. Ochrana dat na OS Windows
3. Síťová bezpečnost u OS Windows
4. Autentizace u OS Windows
5. Ochrana dat na OS Linux
6. Síťová bezpečnost u OS Linux
7. Autentizace u OS Linux
8. Ochrana dat na OS X
9. Síťová bezpečnost u OS X
10. Autentizace u OS X
11. Bezpečnost mobilních OS
12. Bezpečnostní aspekty virtualizačních prostředí
13. Specializované OS

Laboratory exercise

26 hod., compulsory

Teacher / Lecturer

Syllabus

1. Úvod do problematiky operačních systémů z pohledu bezpečnosti
2. Ochrana dat na OS Windows
3. Síťová bezpečnost u OS Windows
4. Autentizace u OS Windows
5. Ochrana dat na OS Linux
6. Síťová bezpečnost u OS Linux
7. Autentizace u OS Linux
8. Ochrana dat na OS X
9. Síťová bezpečnost u OS X
10. Autentizace u OS X
11. Bezpečnost mobilních OS
12. Bezpečnostní aspekty virtualizačních prostředí
13. Specializované OS

Project

26 hod., compulsory

Teacher / Lecturer

Elearning