Modul CS2550-KP08

Security in Networks and Computer Forensics (SichereNCF)


1 Semester
Turnus of offer:

each winter semester
Credit points:

Course of studies, specific field and terms:
  • Bachelor Computer Science 2019 (optional subject), major subject informatics, Arbitrary semester
  • Bachelor Computer Science 2016 (optional subject), major subject informatics, Arbitrary semester
  • Bachelor IT-Security 2016 (compulsory), IT-Security, 5th semester
Classes and lectures:
  • Security in Networks and Computer Forensics (exercise, 2 SWS)
  • Security in Networks and Computer Forensics (lecture, 4 SWS)
  • 90 Hours in-classroom work
  • 120 Hours private studies
  • 30 Hours exam preparation
Contents of teaching:
  • Fundamentals of network security
  • Attacks
  • Baisics of cryptography, confidentiality, integrity
  • Authentication, Authorization, and Accountability
  • Key Distribution, Certificates and Digital Signatures
  • Protocols (Physical & Data-Link, Network & Transport, Application Layer)
  • Firewalls, Intrusion Detection Systems and Penetration Testing
  • IT Security Management with IT Grundschutz & ITIL
  • Incident-Response technologies
  • Computer forensic investigation processes
  • post-mortem analysis
  • Forensic Toolkits
  • Cooperation with authorities
  • The students have an in-depth understanding of the different security problems in networks (including terminology, security goals, security services, communication model, network security model, attacker model, difference between safety and security).
  • They know the essential security risks in networks and distributed systems and can assess their significance.
  • They have detailed knowledge about different types of attacks in networks and their classification.
  • They know important encryption techniques: substitution ciphers (Caesar, Vigenère, etc.), Enigma, One-Time Pad, stream ciphers (General Structure, RC4), block ciphers (Feistel Networks, DES, AES), operating modes (ECB, CBC, PCBC, CFB, OFB, Counter), padding, asymmetric systems (Diffie-Hellmann, RSA) and can apply them with the help of tools.
  • They know the relevant security services such as confidentiality, integrity or authenticity and can describe them in detail.
  • They understand the principle of electronic and digital signatures and public key infrastructures and know important standards (e.g. X.509).
  • They know the different security solutions on the different layers of the ISO/OSI stack.
  • They know firewalls and their deployment scenarios as well as the essential products. They have basic knowledge of how to configure firewalls.
  • They know the basic organizational and regulatory measures to implement network security in a company (IT Baseline Security, ITIL Security).
  • They know the basic processes of computer forensics.
  • They are able to use incident-response tools to determine the cause and originator of a damage event.
  • They can perform the essential steps necessary after a damage event.
  • Students are able to hold subject-specific discussions in English and can follow subject-specific talks.
Grading through:
  • Written or oral exam as announced by the examiner
Responsible for this module:
  • William Stallings: Cryptography and Network Security: Principles and Practice - Prentice Hall, 2013
  • William Stallings, Lawrie Brown: Computer Security: Principles and Practice - Prentice Hall, 2014
  • Alexander Geschonneck: Computer Forensik - dpunkt, 6th ed., 2014
  • offered only in German

Admission requirements for taking the module:
- None

Admission requirements for participation in module examination(s):
- Successful completion of exercises as specified at the beginning of the semester.

Module Exam(s):
- CS2550-L1 Secure Networks and Computer Forensics, written exam, 90 min, 100% of the module grade.

Note on the discontinued module 'CS4180-KP04, CS4180 Security in Networks and Distributed Systems':
This module will not be offered in the future. Students who still need to take retakes or CS4180 as a compulsory module can now do so as part of this module ('CS2550-KP08 Secure Networks and Computer Forensics'). Further information on the procedure is available in the Moodle course and from the module supervisor.

Letzte Änderung: