Module CS2550-KP08

Security in Networks and Computer Forensics (SichereNCF)


Duration

1 Semester

Turnus of offer

each winter semester

Credit points

8

Course of studies, specific fields and terms:

  • Bachelor Computer Science 2019, optional subject, major subject informatics
  • Bachelor Computer Science 2016, optional subject, major subject informatics
  • Bachelor IT-Security 2016, compulsory, IT-Security

Classes and lectures:

  • Security in Networks and Computer Forensics (exercise, 2 SWS)
  • Security in Networks and Computer Forensics (lecture, 4 SWS)

Workload:

  • 90 hours in-classroom work
  • 120 hours private studies
  • 30 hours exam preparation

Contents of teaching:

  • Fundamentals of network security
  • Attacks
  • Baisics of cryptography, confidentiality, integrity
  • Authentication, Authorization, and Accountability
  • Key Distribution, Certificates and Digital Signatures
  • Protocols (Physical & Data-Link, Network & Transport, Application Layer)
  • Firewalls, Intrusion Detection Systems and Penetration Testing
  • IT Security Management with IT Grundschutz & ITIL
  • Incident-Response technologies
  • Computer forensic investigation processes
  • post-mortem analysis
  • Forensic Toolkits
  • Cooperation with authorities

Qualification-goals/Competencies:

  • The students have an in-depth understanding of the different security problems in networks (including terminology, security goals, security services, communication model, network security model, attacker model, difference between safety and security).
  • They know the essential security risks in networks and distributed systems and can assess their significance.
  • They have detailed knowledge about different types of attacks in networks and their classification.
  • They know important encryption techniques and can apply them with the help of tools.
  • They know the relevant security services such as confidentiality, integrity or authenticity and can describe them in detail.
  • They understand the principle of electronic and digital signatures and public key infrastructures and know important standards (e.g. X.509).
  • They know the different security solutions on the different layers of the ISO/OSI stack.
  • They know firewalls and their deployment scenarios as well as the essential products. They have basic knowledge of how to configure firewalls.
  • They know the basic organizational and regulatory measures to implement network security in a company (IT Baseline Security, ITIL Security).
  • They know the basic processes of computer forensics.
  • They are able to use incident-response tools to determine the cause and originator of a damage event.
  • They are familiar with basic methods and tools for analyzing programs and malware.
  • They can perform the essential steps necessary after a damage event.
  • Students are able to hold subject-specific discussions in English and can follow subject-specific talks.

Grading through:

  • portfolio exam

Responsible for this module:

Literature:

  • William Stallings : Cryptography and Network Security: Principles and Practice Prentice Hall, 2013
  • William Stallings, Lawrie Brown : Computer Security: Principles and Practice Prentice Hall, 2014
  • Alexander Geschonneck : Computer Forensik dpunkt, 6th ed., 2014

Language:

  • German and English skills required

Notes:

Admission requirements for taking the module:
- None

Admission requirements for participation in module examination(s):
- See portfolio

Module examination(s):
- CS2550-L1 Secure Networks and Computer Forensics, portfolio examination, the specific examination elements and their weightings will be announced at the beginning of the semester


Note on the discontinued module 'CS4180-KP04, CS4180 Security in Networks and Distributed Systems':
This module will not be offered in the future. Students who still need to take retakes or CS4180 as a compulsory module can now do so as part of this module ('CS2550-KP08 Secure Networks and Computer Forensics'). Further information on the procedure is available in the Moodle course and from the module supervisor.

Last Updated:

12.09.2024