htw saar Piktogramm
Back to Main Page

Choose Module Version:
XML-Code

flag

Security Engineering

Module name (EN): Security Engineering
Degree programme: Computer Science and Communication Systems, Bachelor, ASPO 01.10.2017
Module code: KIB-SE
Hours per semester week / Teaching method: 2V+2P (4 hours per week)
ECTS credits: 5
Semester: 4
Mandatory course: yes
Language of instruction:
German
Assessment:
Written exam

[updated 26.02.2018]
Applicability / Curricular relevance:
DFIW-SE Computer Science and Web Engineering, Bachelor, ASPO 01.10.2019, semester 4, mandatory course
KIB-SE Computer Science and Communication Systems, Bachelor, ASPO 01.10.2017, semester 4, mandatory course
PIB-SE Applied Informatics, Bachelor, ASPO 01.10.2017, semester 4, mandatory course
Workload:
60 class hours (= 45 clock hours) over a 15-week period.
The total student study time is 150 hours (equivalent to 5 ECTS credits).
There are therefore 105 hours available for class preparation and follow-up work and exam preparation.
Recommended prerequisites (modules):
None.
Recommended as prerequisite for:
Module coordinator:
Prof. Dr. Damian Weber
Lecturer:
Prof. Dr. Damian Weber
Sarah Theobald, M.Sc.
Dipl.-Inform. Marion Bohr


[updated 21.11.2016]
Learning outcomes:
After successfully completing this module, students will be familiar with the critical parts, procedures and audit-relevant data of an operating system.
An open source UNIX system will be used in order to be able to comprehensively analyze
processes, security gaps and system calls in detail. The knowledge of these components and their
weak points will enable the students to pursue a security-by-design approach for new application systems or the configuration
of operating systems, which prevents vulnerabilities from the outset.
This includes basic knowledge of current cryptography methods. Students will learn to integrate the social necessity of data protection and privacy protection in communication processes into their future concepts.

[updated 26.02.2018]
Module content:
 1. Security terms, threat model, examples
 2. Identities, authentication, authorization
 3. Encryption (symmetric, asymmetric)
 4. Cryptographic hash functions, message authentication codes
 5. UNIX from a security perspective
 6. Auditing, system status, system statistics
 7. Network security, perimeter security
 8. Penetration tests


[updated 26.02.2018]
Recommended or required reading:
D. Kim, M. G. Solomon, Fundamentals Of Information Systems Security, 2016
G. Weidman, Penetration Testing: A Hands-On Introduction to Hacking, 2014
https://www.sans.org/
http://www.securityfocus.com/vulnerabilities

[updated 26.02.2018]
Module offered in:
SS 2021, SS 2020, SS 2019
[Mon Nov 29 10:09:21 CET 2021, CKEY=ksc, BKEY=ki2, CID=KIB-SE, LANGUAGE=en, DATE=29.11.2021]