Website
Curriculum

Modul CS2550-KP08

Security in Networks and Computer Forensics (SichereNCF)

Duration:


1 Semester
Turnus of offer:


each winter semester
Credit points:


8
Course of studies, specific field and terms:
  • Bachelor Computer Science 2019 (optional subject), major subject informatics, Arbitrary semester
  • Bachelor Computer Science 2016 (optional subject), major subject informatics, Arbitrary semester
  • Bachelor IT-Security 2016 (compulsory), IT-Security, 5th semester
Classes and lectures:
  • Security in Networks and Computer Forensics (exercise, 2 SWS)
  • Security in Networks and Computer Forensics (lecture, 4 SWS)
Workload:
  • 90 Hours in-classroom work
  • 120 Hours private studies
  • 30 Hours exam preparation
Contents of teaching:
  • Fundamentals of network security
  • Attacks
  • Baisics of cryptography, confidentiality, integrity
  • Authentication, Authorization, and Accountability
  • Key Distribution, Certificates and Digital Signatures
  • Protocols (Physical & Data-Link, Network & Transport, Application Layer)
  • Firewalls, Intrusion Detection Systems and Penetration Testing
  • IT Security Management with IT Grundschutz & ITIL
  • Incident-Response technologies
  • Computer forensic investigation processes
  • post-mortem analysis
  • Forensic Toolkits
  • Cooperation with authorities
Qualification-goals/Competencies:
  • The students have an in-depth understanding of the different security problems in networks (including terminology, security goals, security services, communication model, network security model, attacker model, difference between safety and security).
  • They know the essential security risks in networks and distributed systems and can assess their significance.
  • They have detailed knowledge about different types of attacks in networks and their classification.
  • They know important encryption techniques and can apply them with the help of tools.
  • They know the relevant security services such as confidentiality, integrity or authenticity and can describe them in detail.
  • They understand the principle of electronic and digital signatures and public key infrastructures and know important standards (e.g. X.509).
  • They know the different security solutions on the different layers of the ISO/OSI stack.
  • They know firewalls and their deployment scenarios as well as the essential products. They have basic knowledge of how to configure firewalls.
  • They know the basic organizational and regulatory measures to implement network security in a company (IT Baseline Security, ITIL Security).
  • They know the basic processes of computer forensics.
  • They are able to use incident-response tools to determine the cause and originator of a damage event.
  • They are familiar with basic methods and tools for analyzing programs and malware.
  • They can perform the essential steps necessary after a damage event.
  • Students are able to hold subject-specific discussions in English and can follow subject-specific talks.
Grading through:
  • portfolio exam
Responsible for this module:
Teachers:
Literature:
  • William Stallings: Cryptography and Network Security: Principles and Practice - Prentice Hall, 2013
  • William Stallings, Lawrie Brown: Computer Security: Principles and Practice - Prentice Hall, 2014
  • Alexander Geschonneck: Computer Forensik - dpunkt, 6th ed., 2014
Language:
  • German and English skills required
Notes:

Admission requirements for taking the module:
- None

Admission requirements for participation in module examination(s):
- See portfolio

Module examination(s):
- CS2550-L1 Secure Networks and Computer Forensics, portfolio examination, the specific examination elements and their weightings will be announced at the beginning of the semester


Note on the discontinued module 'CS4180-KP04, CS4180 Security in Networks and Distributed Systems':
This module will not be offered in the future. Students who still need to take retakes or CS4180 as a compulsory module can now do so as part of this module ('CS2550-KP08 Secure Networks and Computer Forensics'). Further information on the procedure is available in the Moodle course and from the module supervisor.

Letzte Änderung:
12.9.2024