|Module name (EN): System Management and Security|
|Degree programme: Computer Science and Communication Systems, Bachelor, ASPO 01.10.2014|
|Module code: KI430|
|Hours per semester week / Teaching method: 2V+2P (4 hours per week)|
|ECTS credits: 4|
|Mandatory course: yes|
|Language of instruction:
Written examination 90 min.
KI430 Computer Science and Communication Systems, Bachelor, ASPO 01.10.2014, semester 4, mandatory course
PIB423 Applied Informatics, Bachelor, ASPO 01.10.2011, semester 4, mandatory course
60 class hours (= 45 clock hours) over a 15-week period.
The total student study time is 120 hours (equivalent to 4 ECTS credits).
There are therefore 75 hours available for class preparation and follow-up work and exam preparation.
|Recommended prerequisites (modules):
KI260 Mathematics 2
KI320 Computer Networks
|Recommended as prerequisite for:
KI500 Internet Technologies
KI593 Introduction to Parallel Programming with CUDA
KI600 Laboratory Course in Information and Communication
KI614 Web Security Project
KI633 IT Security Project
KI690 IT Forensics
Prof. Dr. Damian Weber
Prof. Dr. Damian Weber
Dipl.-Inform. Marion Bohr (practical training)
Dipl.-Ing. Michael Sauer (practical training)
IT-security lab (5103/2)
After completing this course, students will be able to act as system administrators for networked Unix systems. They will understand how to configure and operate such systems reliably. They will be able to protect the network from random errors or from deliberate hostile attacks and be able to respond to critical system states.
1. The UNIX philosophy
2. Files and inodes
5. User IDs
6. File systems
8. The operating system kernel
9. System messages
10. Network configuration
11. Status and statistics of the system state
12. Security aspects
13. System protection
14. Local security
15. Network security
In the problem-solving sessions, students will have the opportunity to modify the operating system, the network configuration and the user management system, as well as simulating local and network attacks. The configuration of typical security measures such as firewalls and virtual private networks will be studied both theoretically and in practice, and the capabilities and limits of currently available network tools discussed and examined.
|Recommended or required reading:
WThe FreeBSD Project: http://www.freebsd.org/
The SANS Institute: http://www.sans.org/
McCLURE, SCAMBRAY, KURTZ: Hacking Exposed, McGraw-Hill
|Module offered in: |
SS 2018, SS 2017, SS 2016, SS 2015, SS 2014, ...
[Thu Sep 24 07:02:45 CEST 2020, CKEY=sysi, BKEY=ki, CID=KI430, LANGUAGE=en, DATE=24.09.2020]