Module CS2550-KP08
Security in Networks and Computer Forensics (SichereNCF)
Duration
1 Semester
Turnus of offer
each winter semester
Credit points
8
Course of studies, specific fields and terms:
- Bachelor Computer Science 2019, optional subject, major subject informatics
- Bachelor Computer Science 2016, optional subject, major subject informatics
- Bachelor IT-Security 2016, compulsory, IT-Security
Classes and lectures:
- Security in Networks and Computer Forensics (exercise, 2 SWS)
- Security in Networks and Computer Forensics (lecture, 4 SWS)
Workload:
- 90 hours in-classroom work
- 120 hours private studies
- 30 hours exam preparation
Contents of teaching:
- Fundamentals of network security
- Attacks
- Baisics of cryptography, confidentiality, integrity
- Authentication, Authorization, and Accountability
- Key Distribution, Certificates and Digital Signatures
- Protocols (Physical & Data-Link, Network & Transport, Application Layer)
- Firewalls, Intrusion Detection Systems and Penetration Testing
- IT Security Management with IT Grundschutz & ITIL
- Incident-Response technologies
- Computer forensic investigation processes
- post-mortem analysis
- Forensic Toolkits
- Cooperation with authorities
Qualification-goals/Competencies:
- The students have an in-depth understanding of the different security problems in networks (including terminology, security goals, security services, communication model, network security model, attacker model, difference between safety and security).
- They know the essential security risks in networks and distributed systems and can assess their significance.
- They have detailed knowledge about different types of attacks in networks and their classification.
- They know important encryption techniques and can apply them with the help of tools.
- They know the relevant security services such as confidentiality, integrity or authenticity and can describe them in detail.
- They understand the principle of electronic and digital signatures and public key infrastructures and know important standards (e.g. X.509).
- They know the different security solutions on the different layers of the ISO/OSI stack.
- They know firewalls and their deployment scenarios as well as the essential products. They have basic knowledge of how to configure firewalls.
- They know the basic organizational and regulatory measures to implement network security in a company (IT Baseline Security, ITIL Security).
- They know the basic processes of computer forensics.
- They are able to use incident-response tools to determine the cause and originator of a damage event.
- They are familiar with basic methods and tools for analyzing programs and malware.
- They can perform the essential steps necessary after a damage event.
- Students are able to hold subject-specific discussions in English and can follow subject-specific talks.
Grading through:
- portfolio exam
Responsible for this module:
Literature:
- William Stallings : Cryptography and Network Security: Principles and Practice Prentice Hall, 2013
- William Stallings, Lawrie Brown : Computer Security: Principles and Practice Prentice Hall, 2014
- Alexander Geschonneck : Computer Forensik dpunkt, 6th ed., 2014
Language:
- German and English skills required
Notes:
Admission requirements for taking the module:- None
Admission requirements for participation in module examination(s):
- See portfolio
Module examination(s):
- CS2550-L1 Secure Networks and Computer Forensics, portfolio examination, the specific examination elements and their weightings will be announced at the beginning of the semester
Note on the discontinued module 'CS4180-KP04, CS4180 Security in Networks and Distributed Systems':
This module will not be offered in the future. Students who still need to take retakes or CS4180 as a compulsory module can now do so as part of this module ('CS2550-KP08 Secure Networks and Computer Forensics'). Further information on the procedure is available in the Moodle course and from the module supervisor.
Last Updated:
12.09.2024