|
|
Module code: KIB-SE |
|
2V+2P (4 hours per week) |
5 |
Semester: 4 |
Mandatory course: yes |
Language of instruction:
German |
Assessment:
Written exam
[updated 26.02.2018]
|
DFIW-SE (P610-0194) Computer Science and Web Engineering, Bachelor, ASPO 01.10.2019
, semester 4, mandatory course
KIB-SE (P222-0039) Computer Science and Communication Systems, Bachelor, ASPO 01.10.2021
, semester 4, mandatory course
KIB-SE (P222-0039) Computer Science and Communication Systems, Bachelor, ASPO 01.10.2022
, semester 4, mandatory course
PIB-SE (P222-0039) Applied Informatics, Bachelor, ASPO 01.10.2022
, semester 4, mandatory course
PRI-SE (P222-0039) Production Informatics, Bachelor, SO 01.10.2023
, semester 4, mandatory course
|
60 class hours (= 45 clock hours) over a 15-week period. The total student study time is 150 hours (equivalent to 5 ECTS credits). There are therefore 105 hours available for class preparation and follow-up work and exam preparation.
|
Recommended prerequisites (modules):
None.
|
Recommended as prerequisite for:
|
Module coordinator:
Prof. Dr. Damian Weber |
Lecturer: Prof. Dr. Damian Weber
[updated 01.10.2022]
|
Learning outcomes:
After successfully completing this module, students will be familiar with the critical parts, procedures and audit-relevant data of an operating system. An open source UNIX system will be used in order to be able to comprehensively analyze processes, security gaps and system calls in detail. The knowledge of these components and their weak points will enable the students to pursue a security-by-design approach for new application systems or the configuration of operating systems, which prevents vulnerabilities from the outset. This includes basic knowledge of current cryptography methods. Students will learn to integrate the social necessity of data protection and privacy protection in communication processes into their future concepts.
[updated 26.02.2018]
|
Module content:
1. Security terms, threat model, examples 2. Identities, authentication, authorization 3. Encryption (symmetric, asymmetric) 4. Cryptographic hash functions, message authentication codes 5. UNIX from a security perspective 6. Auditing, system status, system statistics 7. Network security, perimeter security 8. Penetration tests
[updated 26.02.2018]
|
Recommended or required reading:
D. Kim, M. G. Solomon, Fundamentals Of Information Systems Security, 2016 G. Weidman, Penetration Testing: A Hands-On Introduction to Hacking, 2014 https://www.sans.org/ http://www.securityfocus.com/vulnerabilities
[updated 26.02.2018]
|