Lecturer(s)
|
|
Course content
|
Lectures: 1. Security of personal computers, general aspects. 2. Firewalls, malware. 3. Personal computers and server protection solutions. 4. Symmetric and assymetric cryptography. 5. Electronic signature. 6. Methods of authentization, certificates, PKI. 7. Authentization in distributed environment, LDAP, Shibboleth. 8. Ciphering methods in e-mails, ssh, SSL. 9. Network monitoring, attacks detection. 10. Resume. Practices: 1. Security of personal computers, general aspects. 2. Firewalls, malware. 3. Personal computers and server protection solutions. 4. Symmetric and assymetric cryptography. 5. Electronic signature. 6. Methods of authentization, certificates, PKI. 7. Authentization in distributed environment, LDAP, Shibboleth. 8. Ciphering methods in e-mails, ssh, SSL. 9. Network monitoring, attacks detection. 10. Resume.
|
Learning activities and teaching methods
|
Monological explanation (lecture, presentation,briefing)
- Class attendance
- 40 hours per semester
|
Learning outcomes
|
Basic knowledge in the area of computer and network security. Computers and their protection. Ciphering and cryptography, authentization methods.
Students will aquire basic knowledge in the area of computer and network security.
|
Prerequisites
|
Unspecified
|
Assessment methods and criteria
|
Combined examination
Requirements for getting a credit are activity at the practicals /seminars and successful passing the tests. Examination is of the written and oral forms.
|
Recommended literature
|
-
Dostálek L., Vohnoutová M. Velký průvodce infrastrukturou PKI a technologií el. podpisu, Computer Press, 2006.
-
Endorf C., Schultz E., Mellander J. Hacking ? detekce a prevence počítačového útoku, Grada, 2005.
-
Grimes R. A., Johansson J. M. Windows Vista Security, Wiley, 2007.
-
Kocman R., Lohnický J. Jak se bránit virům, spamu a spyware, Computer Press, 2005.
-
McClure S., Scambray J., Kurtz G. Hacking bez záhad, Grada, 2007.
|