Duration:
1 Semester | Turnus of offer:
each winter semester | Credit points:
8 |
Course of studies, specific field and terms: - Bachelor Computer Science 2019 (optional subject), major subject informatics, Arbitrary semester
- Bachelor Computer Science 2016 (optional subject), major subject informatics, Arbitrary semester
- Bachelor IT-Security 2016 (compulsory), IT-Security, 5th semester
|
Classes and lectures: - Security in Networks and Computer Forensics (exercise, 2 SWS)
- Security in Networks and Computer Forensics (lecture, 4 SWS)
| Workload: - 90 Hours in-classroom work
- 120 Hours private studies
- 30 Hours exam preparation
| |
Contents of teaching: | - Fundamentals of network security
- Attacks
- Baisics of cryptography, confidentiality, integrity
- Authentication, Authorization, and Accountability
- Key Distribution, Certificates and Digital Signatures
- Protocols (Physical & Data-Link, Network & Transport, Application Layer)
- Firewalls, Intrusion Detection Systems and Penetration Testing
- IT Security Management with IT Grundschutz & ITIL
- Incident-Response technologies
- Computer forensic investigation processes
- post-mortem analysis
- Forensic Toolkits
- Cooperation with authorities
| |
Qualification-goals/Competencies: - The students have an in-depth understanding of the different security problems in networks (including terminology, security goals, security services, communication model, network security model, attacker model, difference between safety and security).
- They know the essential security risks in networks and distributed systems and can assess their significance.
- They have detailed knowledge about different types of attacks in networks and their classification.
- They know important encryption techniques and can apply them with the help of tools.
- They know the relevant security services such as confidentiality, integrity or authenticity and can describe them in detail.
- They understand the principle of electronic and digital signatures and public key infrastructures and know important standards (e.g. X.509).
- They know the different security solutions on the different layers of the ISO/OSI stack.
- They know firewalls and their deployment scenarios as well as the essential products. They have basic knowledge of how to configure firewalls.
- They know the basic organizational and regulatory measures to implement network security in a company (IT Baseline Security, ITIL Security).
- They know the basic processes of computer forensics.
- They are able to use incident-response tools to determine the cause and originator of a damage event.
- They are familiar with basic methods and tools for analyzing programs and malware.
- They can perform the essential steps necessary after a damage event.
- Students are able to hold subject-specific discussions in English and can follow subject-specific talks.
|
Grading through: |
Responsible for this module: Teachers: |
Literature: - William Stallings: Cryptography and Network Security: Principles and Practice - Prentice Hall, 2013
- William Stallings, Lawrie Brown: Computer Security: Principles and Practice - Prentice Hall, 2014
- Alexander Geschonneck: Computer Forensik - dpunkt, 6th ed., 2014
|
Language: - German and English skills required
|
Notes:Admission requirements for taking the module: - None Admission requirements for participation in module examination(s): - See portfolio Module examination(s): - CS2550-L1 Secure Networks and Computer Forensics, portfolio examination, the specific examination elements and their weightings will be announced at the beginning of the semester Note on the discontinued module 'CS4180-KP04, CS4180 Security in Networks and Distributed Systems': This module will not be offered in the future. Students who still need to take retakes or CS4180 as a compulsory module can now do so as part of this module ('CS2550-KP08 Secure Networks and Computer Forensics'). Further information on the procedure is available in the Moodle course and from the module supervisor. |
Letzte Änderung: 12.9.2024 |
für die Ukraine