How To Pass An It Forensics Course
|
|
|
- Alban Randall
- 5 years ago
- Views:
Transcription
1 Catalogue of Modules M. Sc. Security Management February 2014
2 Impressum Autor: Prof. Dr. Sachar Paulus Redaktion: Prof. Dr. Sachar Paulus Druck: Druckerei der Fachhochschule Brandenburg Kontakt: Fachhochschule Brandenburg University of Applied Sciences Magdeburger Str Brandenburg an der Havel T F E [email protected] Stand: 21. Februar 2014 Fachhochschule Brandenburg Seite 2/42 Catalogue of Modules M. Sc. Security Management February 2014
3 Inhaltsverzeichnis 1 Introduction 4 2 Modules of the first term Principles of Security Management Law, Compliance and Data Protection Principles of ICT Infrastructure Security Principles of Secure Communication Technology Principles of forensics and auditing Term Thesis Second term Security and Crisis Management in the international Context Physical Security Corporate Governance Secure Systems Lifecycle Management Secure IT Services and Business Processes Project Term Thesis Third Term Master s Thesis incl. Master s Seminar 31 5 Examples for Compulsory Optional Modules ITIL - Information Technology Infrastructure Library Know-how Protection Technical Aspects of the IT Forensics Security Concepts of Nuclear Power Plants 40 Seite 3/42 Catalogue of Modules M. Sc. Security Management February 2014
4 1 Introduction This document contains the module descriptions of Brandenburg University of Applied Sciences M. Sc. Degree program on Security Management. The module content is of 2012, the descriptions have been translated to English early Students can choose a profile amongst a number of offerings. Part of the content consists of compulsory optional modules that the program management selects every term. You can find a number of descriptions for compulsory optional modules as examples at the end of this publication. Module overview Term Module Modules CP/ Term 1 Principles of Security Management (6CP) Principles of Secure Communication Technology (3CP) Principles of Forensices and Auditing (3CP) Principles of ICT Infrastructure Security (6CP) Law, Compliance and Data Protection (6CP) Term Thesis 1 (3CP) Compulsory Optional Module 1 (3CP) Security and Crisis Management in International Contexts (6CP) Physical Security (3CP) Secure System Lifecycle Management (6CP) Secure IT- Services and Business Processes (3CP) Corporate Governance (3CP) Term Thesis 2 (3CP) Project (6CP) 7 30 Compulsory Optional Module 2 (3CP) Compulsory Optional Module 3 (3CP) Master Thesis incl. Colloquium (21CP), Master Seminar (3CP) Subject Area Security Management IT Security Mathematical and Technical Principles Law and Business Management Compulsory Optional Modules Seite 4/42 Catalogue of Modules M. Sc. Security Management February 2014
5 2 Modules of the first term 2.1 Principles of Security Management Brief module label: Module description: Division in teaching sessions, if applicable: Duration of module: Classification in the curriculum: Usability of the module: Frequency of offering of modules: Author: Lecturer: Language of instruction: Prerequisites: SM_Ma_GrundlagenSecurityManagement Principles of Security Management One term SM Ma, 1st term, required module The module is also offered as a compulsory lecture for the Master s course in Information Systems. The module can also be offered for Master s course in Informatics. Every academic year Prof. Dr. Sachar Paulus Prof. Dr. Sachar Paulus German None ECTS-Credits: 6 Total workload and ist composition: Form of teaching/term hours per week: Study and examination achievements: Weighting of the grade in the overall grade: Learning outcomes: 180 hours = 60 hours of attendance and 120 hours of selfstudy Lecture: 15 hours Exercise: 15 hours Practical application based on case studies: 30 hours Homework (50%), Presentation (50%). 2/5 of the subject grade 13.5% of all subject grades 4.725% of the final grade The objective is to enable the students to acquire basic knowledge and skills in the following aspects of learning: Preparation of security investigations Conducting risk evaluations Analysis of conditions of security and the significance of counter measures Development of understanding the importance of security in the process of decision making by entrepreneurs Assessment of security organisations in enterprises Implementing exemplary security processes with the use of IT tools Designing security measures and successfully presenting the same to a committee of decision makers In addition, the students are expected to achieve the following results of learning: Establish a security organisation in an enterprise Prepare a skill profile for an individual in charge of Seite 5/42 Catalogue of Modules M. Sc. Security Management February 2014
6 Contents: Teaching and learning methods: Literature: security Integrate IT and non IT security relevant aspects Introduce a security management system in an organisation Prepare a strategy for a section of IT, information or corporate security Primary aspects of corporate security: Security Governance and Security Management System Security Organisation Security Policy Risk management Analyzing security Security processes Norms and standards for information security Return-on-Security-Investment calculations Crisis management Business Continuity Management Additionally: Selected specific areas of the IT and corporate security Interactive combination of lectures, preparations and presentation of contents, demonstration of concepts, practical tasks for groups, preparation of own content and role play. Security Management 2011: Manual of information security, IT security, security of locations, White-collar criminality and Management liability by Guido Birkner, Handbuch Unternehmenssicherheit [Manual of Corporate Security]: Comprehensive security, continuity and risk management with system by Klaus-Rainer Müller, Unternehmenssicherheit [Corporate Security] by Stephan Gundel, and Lars Mülli, Security Risk Management Body of Knowledge by Julian Talbot, Miles Jakeman, Wiley Additional information: Seite 6/42 Catalogue of Modules M. Sc. Security Management February 2014
7 2.2 Law, Compliance and Data Protection Brief module label: Module description: Division in teaching sessions, if applicable: Duration of module: Classification in the curriculum: SM_Ma_RechtComplianceDatenschutz Law, Compliance and Data Protection One term SecMan Master, 1st term, required module Usability of the module: Frequency of offering of modules: Author: Lecturer: Language of instruction: Every academic year Prof. Dr. Sachar Paulus Prof. Dr. Michaela Schröter, Dipl. iur. Raoul Kirmes M.Sc., CISA, QMA German Prerequisites: ECTS-Credits: 6 Total workload and its composition: Form of teaching/term hours per week: Study and examination achievements: Weighting of the grade in the overall grade: Learning outcomes: Contents: 180 hours = 60 hours of attendance and 120 hours of self-study Lecture: 60 hours Study assignments (30%), Written examination (70%). 2/3 of the subject grade; 8.33% of all subject grades; 2.916% of the final grade This course aims to enable the students to acquire knowledge and skills in the following aspects of learning: Identification of relevant legal position of important activities concerned with security in organisations Application of national, European and international legislations in order to meet the compliance specifications for companies Enabling critical discussion with legal target conflicts and for submitting an appropriate evaluation of the risk situation for companies as those affected by regulations 1. Introduction to juristic methodology 2. European and international security law 3. Introduction to the WTO law (focus on international law on product safety) 4. System of fundamental freedom and national security interests 5. Technical trade restrictions in security law 6. Compliance in the international context 7. International, European and national accreditation law 8. Principles of contractual liability ( 280 BGB) Seite 7/42 Catalogue of Modules M. Sc. Security Management February 2014
8 9. Principles of tortious liability ( 823ff BGB, ProdHaftG) 10. Law governing the private security trade 11. Overview of the German law governing weapons 12. Main features of law of criminal proceedings 13. Electronic legal relations (ecommerce/signature law) 14. International emoluments and principles of law governing data security Teaching and learning methods: Literature: Additional information: Lecture - Harald Jele, Wissenschaftliches Arbeiten: Zitieren [Scientific Working Methods: Quoting], Kohlhammer, 3rd ed., Calliess/Ruffert, EUV/AEUV 4th ed Röhl, Akkreditierung und Zertifizierung im Produktsicherheitsrecht [Accreditation and Certification in Law Governing Product Safety], Springer Verlag Ensthaler, Zertifizierung und Akkreditierung technischer Produkte [Certification and Accreditation of Technical Products], Springer Verlag Martin Schulte, Handbuch des Technikrechts [Manual of Law Governing Technology], 2nd ed. Springer Verlag, Abbott/ Kirchner/ et.al., International Standards and the Law, Stämpfli Verlag AG, Kurt Schellhammer, Schuldrecht nach Anspruchsgrundlagen [Law of Obligations According to Principles of Claims], 8 th ed., Martin Kutscha, Handbuch zum Recht der Inneren Sicherheit [Manual of Law Governing Internal Security], 2nd ed., BWV Verlag, Rolf Stober, Sven Eisenmenger, Besonderes Wirtschaftsverwaltungsrecht [Special Business Administration Law], 15th ed., Verlag Kohlhammer, Knemeyer: Polizei- und Ordnungsrecht [Police and Law Governing Public Order], Beck, Busche: Waffenrecht 2012 [Weapons law 2012], Kiel Hoeren: Internet- und Kommunikationsrecht [Internet and communication law], Otto Schmidt Cologne Schade: Arbeitsrecht [Labour law], Kohlhammer Martin T. Biegelman, Building World-Class Compliance Program: Best Practices and Strategies for Success, John Wiley & Sons; Acquisti/ Gritzalis/Lambrinoudakis, Digital Privacy: Theory, Technologies, and Practices, Auerbach Pubn, Sanjay Anand, Essentials of Sarbanes-Oxley, John Wiley & Sons, CCH Incorporated, SEC Compliance and Disclosure Interpretations, Harcourt Professional Publishing, Reyes, Carla, WTO-compliant Protection of Fundamental Rights: Lessons from the EU 'Privacy Directive, Melbourne Journal of International Law, Vol. 12, No. 1, Jun 2011: Spiros Simitis, Bundesdatenschutzgesetz [Federal Law Governing Data Security], Nomos, 7 th ed., Current legal texts Assignments for thorough reading Seite 8/42 Catalogue of Modules M. Sc. Security Management February 2014
9 2.3 Principles of ICT Infrastructure Security Brief module label: Module description: Division in teaching sessions, if applicable: Duration of module: Classification in the curriculum: SM_Ma_IKT-Infrastruktursicherheit Principles of ICT Infrastructure Security One term SecMan Master, 1st term, required module Usability of the module: Frequency of offering of modules: Author: Lecturer: Every academic year Prof. Dr. Eberhard von Faber Prof. Dr. Eberhard von Faber, Dipl. Ing. Dietmar Hausmann Language of instruction: Prerequisites: ECTS-Credits: 6 German Importance of IT security and its role in practice; technical and physical basic knowledge; knowledge of the basics of Internet networks, Operating Systems and cryptography-based techniques Total workload and its composition: Form of teaching/term hours per week: Study and examination achievements: Weighting of the grade in the overall grade: Learning outcomes: 180 hours = 60 hours of attendance and 120 hours of self-study lectures in the range of at least 30 hours and exercises up to 30 hours Written examination or oral examination including 20% of the result of project work 1/2 of the subject grade 5% of all subject grades 1.75% of the final grade Familiarization with the threats and challenges in networks, including important counter measures in the form of protocols and various security solutions Familiarization with the functioning of these solutions, understanding of their use, operation and interaction; ability to integrate and deploy independently some of these solutions; familiarization with supplementing measures and solutions Development of the ability to integrate the required solutions adequately into various ITC infrastructures and usage scenarios; familiarization with service models including Cloud Computing and its implications Development of ability to analyse requirements and industrial practical factors and to integrate solutions based on the practical example of an industrial solution Familiarization with security modules and embedded systems as core components for distributed systems; properties, challenges and use; principles of usage and on Seite 9/42 Catalogue of Modules M. Sc. Security Management February 2014
10 Contents: Teaching and learning methods: Literature: the security of smart cards Details of PKI as infrastructure for secure communication, including testing schemes as international infrastructure for the risk management based on the example of payment systems Extended principles of Internet networks (TCP/IP Protocol, ISO/OSI, Routing, active components, cryptography) Dangers in the use of IT, categories of threats, weak points and hazards Security management, security audits with tools, network monitoring and network logging Attacks and counter measures Cryptography applications (encrypted communication, VPN protocols, certificates) Web Server Security, security In depth study and practical application of project topics on Firewalls, Honeypots and Intrusion Detection Systems, WLAN security and VPN Integration of various solutions in the ITC network: business processes vs. ITC; Usage scenarios vs. ITC; service models and Cloud Computing: division of labour, service models, security management Learning situation of a special industry application: requirements and solutions; Practical factors and their outcome, result and practice in industry Components for distributed systems and mobility: Embedded Systems; Properties, challenges and solutions; Internet of things; Life Cycle; Device Management and Security Design; Practical seminar: application, technology of the chip cards and practical attacks PKI: an infrastructure for secure communication (visible or invisible; function, realization, practice) Assurance: an infrastructure for Trust and Security in a (global) division of labour in industrial value-added chains Combination of lectures, exercises based on one s own computer and lab exercises; lectures deploying different media; tasks and exercise examples; control questions/revision course [1] Cisco Networking Academy: CCNA Exploration Companion Guide, Vol. 1-4, Cisco Press, 2008 [2] Alexander Michael: Netzwerke und Netzwerksicherheit - Das Lehrbuch [Networks and Network Security the text book], Hüthing publishers, [3] Plötner Johannes, Wendzel Steffen: Praxishandbuch Netzwerk-Sicherheit [Practical Manual of Network Security], Galileo Computing, [4] Anderson, Ross: Security Engineering, A Guide to Building Dependable Distributed Systems; John Wiley & Sons [5] Common Criteria for Information Technology Security Evaluation; or ISO [6] Rankl, Wolfgang and Wolfgang Effing: Handbuch der Chipkarten, Aufbau, Funktionsweise, Einsatz von Smart Cards; [Manual of Chip Cards, Structure, Functioning, Usage of Smart Seite 10/42 Catalogue of Modules M. Sc. Security Management February 2014
11 Cards] by Hanser technical publishers Other reference works on special project topics (VPN, IPSec, IPv6, IDS, WLAN, Attacks, and many more) Additional information: Scripts and other teaching materials will be distributed directly to the students during the lecture, or made available on the learning platform of the university. Seite 11/42 Catalogue of Modules M. Sc. Security Management February 2014
12 2.4 Principles of Secure Communication Technology Brief module label: Module description: Division in teaching sessions, if applicable: Duration of module: Classification in the curriculum: SM_Ma_SichereKommunikation Principles of Secure Communication Technology One term SecMan Master, 1st term, required module Usability of the module: Frequency of offering of modules: Author: Lecturer: Language of instruction: Every academic year Prof. Dr. Sachar Paulus Prof. Dr. Eberhard von Faber, Prof. Dr. Michael Syriakow German Prerequisites: ECTS-Credits: 3 Total workload and its composition: Form of teaching/term hours per week: Study and examination achievements: Weighting of the grade in the overall grade: 90 hours = 30 hours of attendance and 60 hours of selfstudy Lecture: 30 hours Written examination 1/4 of subject grade 2.5 % of all subject grades % of the final grade This course aims to enable the students to acquire knowledge and skills in the following aspects of learning: Learning outcomes: Contents: Teaching and learning methods: Literature: Comprehension of the fundamentals and conditions of secure communication Thinking out communication scenarios Comprehension of the cryptographic principles Evaluation and selection of management tasks around electronic communication Logical vs. physical security Basic concepts of cryptography (symmetrical vs. asymmetrical methods, encryption, signature, certificates, PKI, RSA, DSA, AES, DES, Hash functions) Security modules Embedded Systems Devices and key management Chip cards, incl. management and personalization Hardware-oriented attacks Lecture and exercises in small groups. [1] Anderson, Ross: Security Engineering, A Guide to Building Dependable Distributed Systems; John Wiley & Sons, Inc.; 2001 Seite 12/42 Catalogue of Modules M. Sc. Security Management February 2014
13 Additional information: [2] FIPS PUB 140-2, Security Requirements for Cryptographic Modules; National Institute of Standards and Technology; 2002; [3] Common Criteria for Information Technology Security Evaluation (also ISO15408), Part 1: Introduction and general model, Part 2: Security functional requirements, Part 3: Security assurance requirements or (and: CEM) [4] BSI-PP-0002, Smartcard Integrated Circuit Platform Protection Profile; Version 1.0, July 2001 (E. von Faber main technical editor); Smartcard Integrated Circuit Augmentations; Version 1.0, March 2002; [5] Rankl, Wolfgang and Effing, Wolfgang: Handbuch der Chipkarten, Aufbau, Funktionsweise, Einsatz von Smart Cards [Manual of Chip Cards, Structure, Functioning, Use of Smart Cards]; published by Hanser Fachbuchverlag, 2002 Beutelspacher, Kryptologie [Cryptology], Vieweg, 2005 C. A. Deavours L. Kruh, Machine Cryptography and Modern Cryptanalysis, Artech House Publishers, 1985 D. E. Knuth, The Art of Computer Programming 2, Seminumerical Algorithms, Addison-Wesley, 1998 A. J. Menezes - P. van Oorschoot - S. Vanstone, Handbook of Applied Cryptography, CRC, 1996 B. Schneier, Angewandte Kryptographie [Applied Cryptography], Pearson Studium, 2005 A. Sinkov, Elementary Cryptanalysis, The Mathematical Association of America, 1998 M. Welschenbach, Cryptography in C and C++, Apress, 2005 J. Bamford, Body of Secret: Anatomy of the Ultra-Secret National Security Agency, Anchor, Reprint Edition, 2002 Use of the E-Learning Program CrypTool Seite 13/42 Catalogue of Modules M. Sc. Security Management February 2014
14 2.5 Principles of forensics and auditing Brief module label: Module description: Division in teaching sessions, if applicable: Duration of module: Classification in the curriculum: SM_Ma_ForensikAuditing Principles of forensics and auditing One term SecMan Master, 1st term, required module Usability of the module: Frequency of offering of modules: Author: Lecturer: Language of instruction: Every academic year Prof. Dr. Sachar Paulus Prof. Dr. Igor Podebrad German Prerequisites: ECTS-Credits: 3 Total workload and its composition: Form of teaching/term hours per week: Study and examination achievements: Weighting of the grade in the overall grade: Learning outcomes: Contents: Teaching and learing methods: Literature: 90 hours = 30 hours of attendance and 60 hours of self-study Lecture: 30 hours Written examination 1/4 of the subject grade 2.5% of all subject grades 0.875% of the final grade This course aims to enable the students to acquire knowledge and skills in the following aspects of learning: Organisation of IT forensic analyses and IT audits Operating IT systems while taking into account the requirements of IT forensics and IT auditing Development and implementation of IT forensics related security guidelines Evaluation of the usability of IT audit results for forensics Legal prerequisites for IT forensics Principles of IT auditing Organisation of IT forensic analyses Lecture and exercises in small groups IT-Forensik [IT Forensics] by Alexander Geschonnek, 2011 The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics by John Sammons, 2012 Additional information: Seite 14/42 Catalogue of Modules M. Sc. Security Management February 2014
15 2.6 Term Thesis 1 Brief module label: SM_Ma_Semesterarbeit1 Module description: Term Thesis 1 Division in teaching sessions, if applicable: Duration of module: One term Classification in the curriculum: SecMan Master, 1st term, required module Usability of the module: Frequency of offering of modules: Author: Lecturer: Language of instruction: Every academic year Prof. Dr. Sachar Paulus Prof. Dr. Friedrich Holl and all other participating teaching faculty members German Prerequisites: ECTS-Credits: 3 Total workload and its composition: Form of teaching/term hours per week: Study and examination achievements: Weighting of the grade in the overall grade: Learning outcomes: Contents: 90 hours = 30 hours of attendance and 60 hours of selfstudy Lecture: 15 hours Seminar with preparation of presentation: 15 hours Written assignments 1/2 of the subject grade 5% of all subject grades 1.75% of the final grade Preparation of scientific papers with tutorial related to the topic of security Methods of collection of data (statistics, interviews, primary/secondary sources) Source discussion: research, reading, evaluation Creative techniques and self-organisation Situation-related requirements for writing styles (advertising, press releases, scientific papers etc.) Preparation of an exposé Methodical structure of scientific papers Phases of scientific working methods Material collection and research Material evaluation and selection Material and topic processing Method of quoting Teaching and learning methods: Literature: Lecture, discussion, presentation of own results. DIN 1421 (Classification and Numbering System in texts) Eco, U. (2005) Wie man eine wissenschaftliche Abschlussarbeit schreibt Seite 15/42 Catalogue of Modules M. Sc. Security Management February 2014
16 - Doktor-, Diplom- und Magisterarbeit in den Geistesund Sozialwissenschaften [How to Compile Final Thesis for Doctorate, Graduate and Postgraduate Studies in Humanity and Social Science Studies], Müller, Heidelberg, Theisen, Manuel R.: Scientific Papers Technique & Methodology, Form, Peterssen, Wilhelm H.: Scientific Papers - An Introduction for School and Studies, Additional information: Seite 16/42 Catalogue of Modules M. Sc. Security Management February 2014
17 3 Second term 3.1 Security and Crisis Management in international Contexts Brief module label: Module description: Division in teaching sessions, if applicable: Duration of module: Classification in the curriculum: SM_Ma_SecurityKrisenManagementInternational Security and Crisis Management in international Contexts One term SM Ma, 2nd term, required module Usability of the module: Frequency of offering of modules: Author: Lecturer: Every academic year Prof. Dr. Sachar Paulus Prof. Dr. Sachar Paulus Language of instruction: German, partly English (10%) Prerequisites: None ECTS-Credits: 6 Total workload and its composition: Form of teaching/term hours per week: Study and examination achievements: Weighting of the grade in the overall grade: Learning outcomes: Contents: 180 hours = 60 hours of attendance and 120 hours of selfstudy Lecture: 30 hours Exercise: 15 hours Practical application based on case studies: 15 hours Written examination or oral examination 2/5 of the subject grade 13.5% of all subject grades 4.725% of the final grade The objective is to enable the students to acquire knowledge and skills in the following aspects of learning: Analysis of security systems in the international context while taking into account the cultural, political and geographical conditions Management of security organisation in international corporations Preparation of security measures during travel or delegation of employees to foreign countries Introduction of a crisis management system Reaction in international crisis situations Controlling the global crisis communication Influencing the public perception of security topics Security management in global organisations Travel Security Security during delegation of employees Crisis management in the international context Communication during crises: principles and procedures for communication during crisis situations Internal and external crisis communication Message House Seite 17/42 Catalogue of Modules M. Sc. Security Management February 2014
18 Teaching and learning methods: Literature: Additional information: Handling media during crisis situations Public image of security Campaigns for security topics Interactive combination of lecture, preparation and presentation of content, demonstration of concepts, practical tasks for groups, preparation of own content and role play. Notfall- und Krisenmanagement im Unternehmen [Emergency and Crisis Management in Companies] by Axel Bédé, Unternehmenskrisen und Krisenmanagement [Corporate Crises and Crisis Management] by Ronny Scharschmidt, Führen in Krisensituationen [Managing during Crisis Situations] by Markus Klaus, Global Threat: Target-Centered Assessment and Management by Robert Mandel, Security Risk Management Body of Knowledge by Julian Talbot and Miles Jakeman, Seite 18/42 Catalogue of Modules M. Sc. Security Management February 2014
19 3.2 Physical Security Brief module label: Module description: Division in teaching sessions, if applicable: Duration of module: Classification in the curriculum: SM_Ma_PhysischeSicherheit Physical Security One term SM Ma, 2nd term, required module Usability of the module: Frequency of offering of modules: Author: Lecturer: Language of instruction: Prerequisites: Every academic year Prof. Dr. Sachar Paulus Ralph Wölpert, Thorsten Weller, Ralf Dahmer, Thomas Koch German None ECTS-Credits: 3 Total workload and its composition: Form of teaching/term hours per week: Study and examination achievements: Weighting of the grade in the overall grade: Learning outcomes: Contents: 90 hours = 30 hours of attendance and 60 hours of selfstudy Lecture: 30 hours Written examination or oral examination 1/5 of the subject grade 6.75% of all subject grades % of the final grade The objective is to enable the students to acquire basic knowledge and skills in the following aspects of learning: Knowing the methods of protection and safety engineering Analysis of the possibilities of use and effectiveness of protective mechanisms against elementary damage, mechanical safety installations, hazard alert systems and surveillance systems Planning of a security system network Evaluation of solutions available in the market Appraisal of the legal aspects for the deployment of individual security mechanisms Fundamentals of building safety Terminology and overview of areas of tasks and available options Engineering principles Physical attacks and their effect Elementary damage Attackers, their aims and methods of attack Weapons and their effect Seite 19/42 Catalogue of Modules M. Sc. Security Management February 2014
20 Radiation of electronic devices Mechanical safety systems and access control Locks, locking systems and their security Securing doors, windows and fences against attacks Secure storage and data cabinets Engineering and legal regulations and directives Hazard alert systems Fundamentals Burglary alarm systems Attack alert systems Installation failure alert systems Fire alarm and fire fighting systems Engineering and legal regulations and directives Surveillance systems Technical possibilities Open and hidden monitoring Engineering and legal regulations and directives Emergency planning and operational safety Consequential damage analysis Handling untoward incidents Teaching and learning methods: Literature: Additional information: Lecture Physical Security Systems Handbook by Michael Kairallah, Current Journals and Magazines covering the topic: kes, Der Sicherheitsberater [The Safety Advisor], S&I. Seite 20/42 Catalogue of Modules M. Sc. Security Management February 2014
21 3.3 Corporate Governance Brief module label: Module description: Division in teaching sessions, if applicable: Duration of module: Classification in the curriculum: SM_Ma_Unternehmensführung Corporate Governance One term SecMan Master, 2nd term, required module Usability of the module: Frequency of offering of modules: Author: Lecturer: Language of instruction: Every academic year Prof. Dr. Sachar Paulus Prof. Dr. Robert Franz, Prof. Dr. Friedrich Holl, Prof. Dr. Sachar Paulus German Prerequisites: ECTS-Credits: 3 Total workload and its composition: Form of teaching/term hours per week: Study and examination achievements: Weighting of the grade in the overall grade: Learning outcomes: Contents: 90 hours = 30 hours of attendance and 60 hours of selfstudy Lecture: 15 hours Processing case studies: 15 hours Oral examination 1/3 of the subject grade 4.17% of all subject grades 1.46% of the final grade This course aims to enable the students to acquire knowledge and skills in the following aspects of learning: Knowing the principles of successful corporate governance Influencing the corporate leaders for observing the security aspects and for constructive handling of crisis situations Derivation of a security strategy and security goals out of the corporate strategy Development of a strategy to strengthen the ethical aspects of corporate governance Resolution of conflicts Functions of corporate governance (development of corporate goals, principles, culture; Formulation of strategies; Human Resources and Negotiations Management; international aspects in the global competition) Integration of security goals with the corporate strategy Ethical aspects of corporate governance (anti-corruption strategies, Code of Conduct etc.) Seite 21/42 Catalogue of Modules M. Sc. Security Management February 2014
22 Teaching and learning methods: Literature: Conflict management (conflict diagnosis, typology of conflicts, escalations, strategies for conflict handling) Lecture, processing case studies in small groups, presentation of practice examples, role plays. K. Macharzina: Unternehmensführung [Corporate Governance] T. Hutzschenreuther: Krisenmanagement [Crisis Management] F. Glasl: Konfliktmanagement [Conflict Management] B. Stackpole, E. Osendahl: Security Strategy: From Requirements to Reality. Additional information: Seite 22/42 Catalogue of Modules M. Sc. Security Management February 2014
23 3.4 Secure Systems Lifecycle Management Brief module label: Module description: Division in teaching sessions, if applicable: Duration of module: Classification in the curriculum: Usability of the module: Frequency of offering of modules: Author: Lecturer: SM_Ma_SecureSystems Secure Systems Lifecycle Management One term SecMan Master, 2nd term, required module The module can also be offered as WPF for WI [Business Informatics] and Informatics Master courses. Every academic year Prof. Dr. Sachar Paulus Prof. Dr. Sachar Paulus Language of instruction: Prerequisites: ECTS-Credits: 6 Total workload and its composition: Form of teaching/term hours per week: Study and examination achievements: Weighting of the grade in the overall grade: Learning outcomes: 80% German, 20% English Initial experience in programming web applications for an exemplary scenario. Normally, this should be ensured by studies completed until this point of time. Alternatively: selfstudy, for example, based on PHP 5.3: Program Dynamic Websites Professionally by Christian Wenz and Tobias Hauser (December 2009) 180 hours = 60 hours of attendance and 120 hours of selfstudy Lecture: 30 hours Exercise: 30 hours Development of a secure web application (30%); Documentation of a secure development cycle for a software application (40%); Carrying out and presentation of a security investigation for another web application (30%). 2/3 of the subject grade 15% of all subject grades 5.25% of the final grade This course aims to enable the students to acquire knowledge and skills in the following aspects of learning: Knowing and application of Best Practices taught during the development of IT based systems for secure software Development of acceptance criteria for non-functional security requirements Carrying out threat models Avoidance of weak points during the development Carrying out security checks Secure installation and operation of software Establishment of a Security Response Program Analysis of existing software for security-related weak points Seite 23/42 Catalogue of Modules M. Sc. Security Management February 2014
24 Contents: Teaching and learning methods: Literature: Additional information: Development and implementation of a protective program for software during the system development Establishment of a Management System for security in the development process, and integration of such Management System into a possibly available quality process Carrying out security analyses ( Hacking ) Presentation of investigation results Basic principles of secure software development: Security requirements Safe designing and threat models Architecture analyses Secure coding Security checks Secure systems Security Response Protection of own software against manipulation and know-how theft Interactive combination of lecture, exercises on own computer, lab exercises, preparation and presentation of content, demonstration of concepts, practical tasks in groups. Basiswissen sichere Software [Basics of secure software] by Sachar Paulus, dpunkt Software-Qualität, Testen, Analysieren und Verifizieren von Software [Software Quality, Testing, Analysis and Verification of Software] by Peter Liggesmeyer, Spektrum Akademischer Verlag, Writing Secure Code by Michael Howard & David LeBlanc, Seite 24/42 Catalogue of Modules M. Sc. Security Management February 2014
25 3.5 Secure IT Services and Business Processes Brief module label: Module description: Division in teaching sessions, if applicable: Duration of module: Classification in the curriculum: SM_Ma_SichereITDienste Secure IT Services and Business Processes One term SM Ma, 2nd term, required module Usability of the module: Frequency of offering of modules: Author: Lecturer: Every academic year Prof. Dr. Eberhard von Faber Dr. Eberhard von Faber Language of instruction: Prerequisites: ECTS-Credits: 3 Total workload and its composition: Form of teaching/term hours per week: Study and examination achievements: Weighting of the grade in the overall grade: Learning outcomes: Contents: German Basic knowledge of business processes and corporate governance; Knowledge of Information and Communications Technology: Applications, Systems and Networks, including the underlying technology. 90 hours = 30 hours of attendance and 60 hours of selfstudy 15 hours: lecture utilizing various media, project assignments for practice, in depth study and self checks, including control questions/revision course Written examination or oral examination 1/3 of the subject grade 7.5% of all subject grades 2.625% of the final grade This course aims to enable the students to acquire knowledge and skills in the following aspects of learning: Understanding of technologies and organisation of modern (industrial) ITC production, and especially the incidental security questions Usage and integration of IT services in business processes; assessment of security requirements, evaluation and selection of IT services Successful implementation of Identity and Access Management (IAM): understanding of basic terminology, architectures and technologies; planning and implementation in companies and in complex value-added chains 1. Fundamentals of ITC production; ITC architectures and infrastructure elements; Security aspects; Management of solutions for the system and network security; processes and organisation; Tasks ranging from weak point management to Disaster Recovery Seite 25/42 Catalogue of Modules M. Sc. Security Management February 2014
26 Teaching and learning methods: Literature: Additional information: 2. User and Producer: IT services; Security requirements, evaluation, selection and integration; Security and risk management in outsourcing, basic problems and sourcing models 3. Enterprise Security Architecture: ICT Production, Service Design, Transition, Service Delivery Management, Security Management, GRC 4. Basic terminology IAM (from Identification to Accounting), 5. Authentication: Types, methods, technologies; problems and solutions; Architectures and distributed systems (e.g. LDAP, RADIUS, Kerberos, ESSO, Single Sign-On, Federation), 6. Authorization: Services and limitations; Strategies (DAC, MAC, RBAC, IF); Realization (Groups, Roles, ACL, Capabilities); Alternatives; Trends and Outlook including DRM, 7. Identity Management: Administrative tasks, Registration, Workflows, Enrolment; Credential Management, User Self-Service, UHD etc. 8. Accounting; Analytics; Attestation; Intelligence, SOD 9. IAM-Architectures (the whole picture); Infrastructures 10. Erection and implementation of IAM programs in large enterprises Lecture utilizing various media, project assignments for practice, in depth study and self checks, including control questions/revision course [1] Alexander Tsolkas and Klaus Schmidt: Rollen und Berechtigungskonzepte, Ansätze für das Identity- und Access Management im Unternehmen [Roles and Authorization Concepts, Approaches for the Identity and Access Management in the Company]; August 2010, Vieweg+Teubner [2] Martin Kappes: Netzwerk- und Datensicherheit, Eine praktische Einführung [Network and Data Security, A Practical Introduction]; Vieweg+Teubner [3] Hans-Peter Königs: IT-Risiko-Management mit System, Von den Grundlagen bis zur Realisierung. Ein praxisorientierter Leitfaden [IT Risk Management with System, From the Basics to Realization. A Practice-oriented Guide], Vieweg [4] Claudia Eckert: IT Security, Concepts - Methods Protocols [5 : J. R. Winkler: Securing the Cloud: Cloud Computer Security Techniques and Tactics, Syngress. [6] Current Journals and Magazines on the topic: kes, Der Sicherheitsberater [The Security Advisor], S&I. Seite 26/42 Catalogue of Modules M. Sc. Security Management February 2014
27 3.6 Project Brief module label: Module description: Division in teaching sessions, if applicable: Duration of module: Classification in the curriculum: SM_Ma_Projekt Project One term SecMan Master, 2nd term, required module Usability of the module: Frequency of offering of modules: Author: Lecturer: Language of instruction: Every academic year Prof. Dr. Sachar Paulus Prof. Dr. Friedrich Holl and all other participating teaching faculty members German Prerequisites: ECTS-Credits: 6 Total workload and its composition: Form of teaching/term hours per week: Study and examination achievements: Weighting of the grade in the overall grade: Learning outcomes: Contents: 180 hours = 60 hours of attendance and 120 hours of selfstudy Lecture: 15 hours Practical work: 45 hours + self-study time Project report (50%) Presentation (50%) 2/5 of the subject grade 9% of all subject grades 3.15% of the final grade This course aims to enable the students to acquire knowledge and skills in the following aspects of learning: Conducting security projects Planning a security-related project while following all requirements of security Application of project management methodologies Problem identification: - Systematic preparation of the State of the Art technology - Integration into the available practical context - Basic conditions of deployment - Use of different techniques of analysis such as interview method, questionnaire Delphi method, preparation of the context concerning documents and so on. Development of expected concepts: - Systematically founded development of a practiceoriented approach to solutions - Use of creative methods - Cost-benefit analyses - Development of basic conditions for deployment Prototypical implementation Seite 27/42 Catalogue of Modules M. Sc. Security Management February 2014
28 Teaching and learning methods: Literature: Additional information: - the prototypical implementation is carried out by developing a software prototype - implementation in an enterprise/organisation or e.g. development of an application for R&D sponsorship Lecture, practical work in groups comprising maximum 7 participants, presentation of own results. A Guide to the Project Management Body of Knowledge, PMI, 2008 For this course, the candidate s willingness to undertake practical work with cooperating partners is a prerequisite. Seite 28/42 Catalogue of Modules M. Sc. Security Management February 2014
29 3.7 Term Thesis 2 Brief module label: SM_Ma_Semesterarbeit2 Module description: Term Thesis 2 Division in teaching sessions, if applicable: Duration of module: One term Classification in the curriculum: SecMan Master, 2nd term, required module Usability of the module: Frequency of offering of modules: Author: Lecturer: Language of instruction: Every academic year Prof. Dr. Sachar Paulus Prof. Dr. Friedrich Holl and all other participating faculty members German Prerequisites: ECTS-Credits: 3 Total workload and its composition: Form of teaching/term hours per week: Study and examination achievements: Weighting of the grade in the overall grade: Learning outcomes: Contents: Teaching and learning methods: Literature: 90 hours = 30 hours of attendance and 60 hours of selfstudy Lecture: 15 hours Seminar including topic presentation: 15 hours Writing assignment 1/2 of the subject grade 5% of all subject grades 1.75% of the final grade This course aims to enable the students to acquire knowledge and skills in the following aspects of learning: Preparation of independent scientific paper on the topic of security Source discussion: research, reading, evaluation Covering all relevant topics Logical coherence and consistency Formulate complex coherences comprehensibly Present own findings Lecture, discussion, presentation of own findings. DIN 1421 (Classification and Numbering System in Texts) Eco, U. (2005) Wie man eine wissenschaftliche Abschlussarbeit schreibt - Doktor-, Diplom- und Magisterarbeit in den Geistes- und Sozialwissenschaften [How to Compile Final Thesis for Doctorate, Graduate and Postgraduate Studies in Humanity and Social Science Studies], Müller, Heidelberg, Theisen, Manuel R.: Scientific Papers Technique & Methodology, Form, Peterßen, Wilhelm H.: Wissenschaftliche(s) Arbeiten - Eine Einführung für Schule und Studium [Scientific Papers An Introduction to Schools and Studies], Seite 29/42 Catalogue of Modules M. Sc. Security Management February 2014
30 Additional information: Ideally, the student should prepare his own scientific publication during this course. Seite 30/42 Catalogue of Modules M. Sc. Security Management February 2014
31 4 Third Term 4.1 Master s Thesis incl. Master s Seminar Brief module label: Module description: Division in teaching sessions, if applicable: Duration of module: Classification in the curriculum: SM_Ma_Masterarbeit Master s Thesis incl. Master s Seminar Master s seminar is offered simultaneously, where state of work done is appraised without grading. One term SecMan Master, 3rd term, required module Usability of the module: Frequency of offering of modules: Author: Lecturer: Every academic year Prof. Dr. Sachar Paulus All faculty members of the university teaching in the course Language of instruction: Prerequisites: ECTS-Credits: 24 Total workload and its composition: Form of teaching/term hours per week: Study and examination achievements: Weighting of the grade in the overall grade: Learning outcomes: Contents: Teaching and learning methods: Literature: German / English (as per student s option). Only candidates may register themselves for Master s Thesis, who have successfully completed all examinations and course achievements expected to be completed until incl. the 2 nd term. 690 hours of self-study, 30 hours of attendance (Master s seminar) Self-study. Master s Thesis (75%) Colloquium (25%) 30% of the final grade This course aims to enable the students to acquire knowledge and skills in the following aspects of learning: Preparation of a scientific paper under the guidance with own creative and/or constructive portions of the topic Security Management within a period of 4 months The Master s Thesis is intended as related preoccupation with an extensive topic and the resulting solution for a theoretical or practical problem. Self-study. Booth, W. C. et a. (1995). The draft of research. Chicago London Brown, S. R. et al. (1990) Experimental Design and Analysis. London Cialdini, R. B. (2001). Influence, Science and Practice. Bosten, M.A. Hussley, J., Hussley, R. (1997). Business Research. A practical guide for undergraduate and postgraduate Seite 31/42 Catalogue of Modules M. Sc. Security Management February 2014
32 students Karmasin, M. et al. (1999). Die Gestaltung wissenschaftlicher Arbeiten: ein Leitfaden für Haus-, Seminar- und Diplomarbeiten sowie Dissertationen [The Designing of Scientific Papers: A Guide for Homework, Seminar and Graduation Papers and Dissertations]. Vienna Pyrczak, S. et. Al. (1998). Writing empirical Research Reports. Los Angeles. C.A. Seale, C. (1999). The quality of quantitative research. London Trachim, W. M. K. (2000). The Research Knowledge Base. Cincinatti. Ohio Additional information: Seite 32/42 Catalogue of Modules M. Sc. Security Management February 2014
33 5 Examples for Compulsory Optional Modules 5.1 ITIL - Information Technology Infrastructure Library Brief module label: Module description: SM_Ma_ITIL ITIL - Information Technology Infrastructure Library Division in teaching sessions, if applicable: Duration of module: Classification in the curriculum: One term SecMan Master, 1 st / 2 nd /3 rd terms, elective module Usability of the module: Frequency of offering of modules: Author: Lecturer: Language of instruction: Every academic year Thekla Ludwig Timothy Ross German Prerequisites: ECTS-Credits: 3 Total workload and its composition: Form of teaching/term hours per week: Study and examination achievements: Weighting of the grade in the overall grade: Learning outcomes: 90 hours = 30 hours of attendance and 60 hours of selfstudy Lecture: 30 hours Homework (100%) 1/5 of the subject grade; 4.5% of all subject grades; 1.575% of the final grade This course aims to enable the students to acquire knowledge and skills in the following aspects of learning: - Application of the ITIL model - Evaluation of company/security processes in regard to the implementation of the ITIL model Seite 33/42 Catalogue of Modules M. Sc. Security Management February 2014
34 Contents: Teaching and learning methods: Literature: The students are introduced to ITIL (IT Infrastructure Library v3 ) and IT Service Management, comprising: - ITIL model - 5 Phases of the ITIL lifecycle (Service Strategy, Service Design, Service Transition, Service Operation and Continual Service Improvement) and their individual processes. Supplementing the theoretical introduction, various practical scenarios are presented and practically developed. Different situations of ITIL introductions are presented and the significance of ITIL is highlighted through examples. Individual topics are studied in depth through presentations. In addition to this, the option is offered to acquire an official ITIL Foundation certificate. Lecture with projector, Flipchart, Whiteboard, exercises (in groups and plenary sessions, presentations. - Jan van Bon, et al., Foundations in IT Service Management based on ITIL v3, Van Haren Publishing, Zaltbommel Jan van Bon, et al., Foundations in IT Service Management based on ITIL, Zaltbommel David Cannon, et al., ITIL Service Strategy 2011 Edition, TSO, London, Lou Hunnebeck, et al., ITIL Service Design 2011 Edition, TSO, London, Stuart Rance, et al., ITIL Service Transition 2011 Edition, TSO, London, Randy Steinberg, et al. ITIL Service Operation 2011 Edition, TSO, London, Vernon Lloyd, et al., ITIL Continual Service Improvement 2011 Edition, TSO, London, 2011 Additional information: Seite 34/42 Catalogue of Modules M. Sc. Security Management February 2014
35 5.2 Know-how Protection Brief module label: Module description: SM_Ma_Know-HowSchutz Know-how Protection Division in teaching sessions, if applicable: Duration of module: Classification in the curriculum: One term SecMan Master, 1 st / 2 nd / 3rd terms, elective module Usability of the module: Frequency of offering of modules: Every academic year Author: Lecturer: Language of instruction: Thekla Ludwig Peter Mnich and Dr. Jörg Treffke German Prerequisites: ECTS-Credits: 3 Total workload and its composition: Form of teaching/term hours per week: Study and examination achievements: 90 hours = 30 hours of attendance and 60 hours of selfstudy Lecture: 15 hours Oral examination Weighting of the grade in the overall grade: Learning outcomes: Contents14: 1/5 of the subject grade; 4.5% of all subject grades; 1.575% of the final grade This course aims to enable the students to acquire knowledge and skills in the following aspects of learning: - Evaluation of corporate risks in regard to the Know-how protection The students learn about contents related to: - the explanation of protection of know-how and products - definitions and differentiation of information outflow and espionage - current position of espionage worldwide - risks for German enterprises - offenders, offender models and their modus operandi - protective measures, processes and current spheres of activity in the domain of Know-how Protection Seite 35/42 Catalogue of Modules M. Sc. Security Management February 2014
36 Teaching and learning methods: Literature: Lecture, exercises in small groups. - Lindemann U. et al.: Know-How-Schutz im Wettbewerb: Gegen Produktpiraterie und unerwünschten Wissenstransfer [Know-how Protection in the World of Competition: Against Product Piracy and undesired Transfer of Knowledge], Springer Berlin Heidelberg, Kochmann, K.: Schutz des Know-How gegen ausspähende Produktanalysen [Protection of know-how against spying product analyses], De Gruyter, Abele, E. at all.: Schutz vor Produktpiraterie: Ein Handbuch für den Maschinen- und Anlagenbau [Protection against Proct Piracy: a Manual for Construction of Machines and Installations], Springer Berlin Heidelberg, Kahle/Merkel: Fall- und Schadensanalyse bzg. Know-how-/Informationsverlusten in Baden- Württemberg ab 1995 [Case and Damage Analysis reg. Know-how/Information losses in the State of Baden- Würtemberg from 1995], Uni Lüneburg, Wurzer/Kaiser: Praxishandbuch Internationaler Know-how-Schutz [Practical manual for international Know-how Protection], Bundesanzeiger Verlag, Lux/Peske: Competitive Intelligence und Wirtschaftsspionage [Competitive Intelligence and Industrial espionage], Gabler Verlag, Michaeli, Competitive Intelligence, Springer Verlag, Schaaf, Industriespionage [Industrial espionage], Boorberg, Fussan: Managementmaßnahmen gegen Produktpiraterie und Industriespionage [Management measures against product piracy and industrial espionage], Gabler Verlag, Fink, Lauschziel Wirtschaft [Business world, the target of bugging], Boorberg, Kenan, Vertrag versus Vertrauen [Contract vs. Trust], VDM, Liman: Bewertung des irregulären Verlustes von Know-how [Assessment of irregular loss of knowhow], Wirtschaftsverlag Bachem, Westermann: Handbuch Know-how-Schutz [Manual of Know-how Protection], Verlag C.H. Beck, Additional information: Seite 36/42 Catalogue of Modules M. Sc. Security Management February 2014
37 5.3 Technical Aspects of the IT Forensics Brief module label: Module description: SM_Ma_IT-Forensik Technical Aspects of IT Forensics Division in teaching sessions, if applicable: Duration of module: Classification in the curriculum: One term SecMan Master, 1 st / 2 nd / 3 rd terms, elective module Usability of the module: Frequency of offering of modules: Every academic year Author: Lecturer: Language of instruction: Thekla Ludwig Prof. Dr. Igor Podebrad German Prerequisites: ECTS-Credits: 3 Total workload and its composition: Form of teaching/term hours per week: Study and examination achievements: Weighting of the grade in the overall grade: Learning outcomes: 90 hours = 30 hours of attendance and 60 hours of selfstudy Lecture: 2 term hours per week Homework (100%) 1/5 of the subject grade; 4.5% of all subject grades; 1.575% of the final grade This course aims to enable the students to acquire knowledge and skills in the following aspects of learning: - Analysis of data media, Operating Systems and networks - Evaluation of data media and Operating Systems in regard to their forensic case-related information Seite 37/42 Catalogue of Modules M. Sc. Security Management February 2014
38 The students will receive leaning content concerning: Data media analysis - Overview of types of hard disks - Overview of physical and logical distribution of a disk - Overview of file systems and file administration - Details of hard disk analysis (files and their properties, including the types of files) - Details of FAT Analysis of Operating Systems - Server vs. Workstation - Location of OS on the disk - Process analysis Contents14: - Network connectivity - Registry - NTFS - Details of Alternate Datastreams and Filetypes - Windows artefacts - Timelining - Details of Registry - analysis Network analysis - Fundamentals - Protocols - Details of analysis (anomalies, hidden communication, types of attacks) Teaching and learning methods: Lecture, exercises in small groups. Seite 38/42 Catalogue of Modules M. Sc. Security Management February 2014
39 Literature: - Dewald, A. et al.: Forensische Informatik [Forensic Informatics], Books on Demand, Geschoneck, A.: Computer-Forensik: Computerstraftaten erkennen, ermitteln, aufklären [Computer Forensics: Identifying, investigating, solving computer criminality], dpunkt.verlag, Carrier, B.: File System Forensic Analysis, Addision-Wesley Professional, Carvey, H.: Windows Forensic Analysis DVD Toolkit, Syngress, Pogue, C.: UNIX and Linux Frensic Analysis DVD Toolkit, Syngress, 2008 Additional information: Seite 39/42 Catalogue of Modules M. Sc. Security Management February 2014
40 5.4 Security Concepts of Nuclear Power Plants Brief module label: Module description: SM_Ma_KonzepteSicherheitKernkraftwerken Security Concepts of Nuclear Power Plants Division in teaching sessions, if applicable: Duration of module: Classification in the curriculum: One term SecMan Master, 1 st /2 nd / 3 rd terms, elective module Usability of the module: Frequency of offering of modules: Every academic year Author: Thekla Ludwig Lecturer: Language of instruction: German Prerequisites: ECTS-Credits: 3 Total workload and its composition: Form of teaching/term hours per week: Study and examination achievements: Weighting of the grade in the overall grade: Learning outcomes: 90 hours = 30 hours of attendance and 60 hours of selfstudy Lecture: 2 term hours per week Homework (100%) 1/5 of the subject grade; 4.5% of all subject grades; 1.575% of the final grade This course aims to enable the students to acquire knowledge and skills in the following aspects of learning: - Application of the ITIL model - Evaluation of corporate/security processes in regard to the implementation of the ITIL model Seite 40/42 Catalogue of Modules M. Sc. Security Management February 2014
41 The students receive comprehensive information concerning the fundamentals and requirements of: - Integrated management system (interaction between Man-Technology-Organisation (MTO concept)) - Aims of security (radiological and technical aims) - Defence in Depth concept, independence of security levels - Barrier concept - Events and situations on security levels - Installation internal emergency protection concept - Protection against overlapping impacts Contents14: - Principles of proofs of safety (deterministic and probabilistic approaches) CCF concept - Classification concept - Concept for practical exclusion of events - Principles of layout o o o o o o Diversity principle avoidance of Individual error concept 30 minute concept Inherent safety, fail-safe principle Passive principles of operation Basic safety, leak-before-break - Safety requirements for future nuclear power plants Teaching and learning methods: Lecture, exercises in small groups. Seite 41/42 Catalogue of Modules M. Sc. Security Management February 2014
42 Literature: - Borlein, M.: Kerntechnik [Nuclear Technology], Vogel Business Media, Smidt, D.: Reaktor-Sicherheitstechnik [Reactor Safety Technology], Springer-Verlag, Berlin, IAEA: - WENRA: nce=1&action=pod_show - KTA: - GRS: - Handbuch für Reaktorsicherheit und Strahlenschutz, - BMU: Sicherheitskriterien für Kernkraftwerke, hriften_technische_regeln/doc/40327.php Additional information: Seite 42/42 Catalogue of Modules M. Sc. Security Management February 2014
e-code Academy Information Security Diploma Training Discerption
e-code Academy Information Security Diploma Training 2015 I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. OBJECTIVE... 3 LIST OF POSTGRADUATE COURSES... 3 FIRST SEMESTER
Netzwerksicherheit [NetSec] Systemsicherheit [SysSec]
Netzwerksicherheit [NetSec] Dr.-Ing. Falko Dressler Computer Networks and Communication Systems http://www7.informatik.uni-erlangen.de/~dressler/ [email protected] Systemsicherheit [SysSec]
Implementing Cisco IOS Network Security v2.0 (IINS)
Implementing Cisco IOS Network Security v2.0 (IINS) Course Overview: Implementing Cisco IOS Network Security (IINS) v2.0 is a five-day instructor-led course that is presented by Cisco Learning Partners
Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2.
CSET 4850 Computer Network Security (4 semester credit hours) CSET Elective IT Elective Current Catalog Description: Theory and practice of network security. Topics include firewalls, Windows, UNIX and
Guidance to the Master and PhD Programmes in Computer Science
Guidance to the Master and PhD Programmes in Computer Science at the Faculty of Science, University of Basel Department of Mathematics and Computer Science Bernoullistrasse 16, CH 4056 Basel Tel: +41 61
EUCIP - IT Administrator. Module 5 IT Security. Version 2.0
EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single
Eleventh Hour Security+
Eleventh Hour Security+ Exam SYO-201 Study Guide I do Dubrawsky Technical Editor Michael Cross AMSTERDAM BOSTON HEIDELBERG LONDON NEWYORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO SYNGRESS.
Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)
Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses
CESG Certification of Cyber Security Training Courses
CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security
MSc in Computer and Information Security
MSc in Computer and Information Security Programme Specification Primary Purpose: Course management, monitoring and quality assurance. Secondary Purpose: Detailed information for students, staff and employers.
Bachelor of Information Technology (Network Security)
Bachelor of Information Technology (Network Security) Course Structure Year 1: Level 100 Foundation knowledge subjects SEMESTER 1 SEMESTER 2 ITICT101A Fundamentals of Computer Organisation ITICT104A Internetworking
Masters in Information Technology
Computer - Information Technology MSc & MPhil - 2015/6 - July 2015 Masters in Information Technology Programme Requirements Taught Element, and PG Diploma in Information Technology: 120 credits: IS5101
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing
Introduction to Cyber Security / Information Security
Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be
Curran, K. Tutorials. Independent study (including assessment) N/A
MODULE TITLE: MODULE CODE: Systems Security COM535 YEAR OF REVISION: 2013/14 MODULE LEVEL: 6 CREDIT POINTS: 20 MODULE STATUS: SEMESTER: 1 LOCATION: E-LEARNING: PREREQUISITE(S): CO-REQUISITE(S): MODULE
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering
Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Number HE20524 Location Meadowbank OVERVIEW OF SUBJECT REQUIREMENTS Note: This document
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Curriculum Form. 1. Name of the curriculum Küberturbe tehnoloogiad 2. Name of the curriculum in Cyber Security Engineering
Curriculum Form 1. Name of the curriculum Küberturbe tehnoloogiad 2. Name of the curriculum in Cyber Security Engineering English 3. Level of higher education Applied higher education 4. Form of study
Weighted Total Mark. Weighted Exam Mark
CMP4103 Computer Systems and Network Security Period per Week Contact Hour per Semester Weighted Total Mark Weighted Exam Mark Weighted Continuous Assessment Mark Credit Units LH PH TH CH WTM WEM WCM CU
(Instructor-led; 3 Days)
Information Security Manager: Architecture, Planning, and Governance (Instructor-led; 3 Days) Module I. Information Security Governance A. Introduction to Information Security Governance B. Overview of
Vendor Audit Questionnaire
Vendor Audit Questionnaire The following questionnaire should be completed as thoroughly as possible. When information cannot be provided it should be noted why it cannot be provided. Information may be
Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.
Elective course in Computer Science University of Macau Faculty of Science and Technology Department of Computer and Information Science SFTW498 Information Security Syllabus 2nd Semester 2011/2012 Part
Certified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the
Masters in Human Computer Interaction
Masters in Human Computer Interaction Programme Requirements Taught Element, and PG Diploma in Human Computer Interaction: 120 credits: IS5101 CS5001 CS5040 CS5041 CS5042 or CS5044 up to 30 credits from
Masters in Advanced Computer Science
Masters in Advanced Computer Science Programme Requirements Taught Element, and PG Diploma in Advanced Computer Science: 120 credits: IS5101 CS5001 up to 30 credits from CS4100 - CS4450, subject to appropriate
Master International Business & Consulting: International Strategic Management
Hochschule für Wirtschaft und Recht Berlin Department of Business and Economics Master International Business & Consulting: International Strategic Management accredited by International Business & Consulting:
Computer and Network Security PG 6697. Unit Outline 2007. School of Information Sciences and Engineering
Computer and Network Security PG 6697 Unit Outline 2007 School of Information Sciences and Engineering Division of Business, Law and Information Sciences University of Canberra Australian Government Higher
Masters in Artificial Intelligence
Masters in Artificial Intelligence Programme Requirements Taught Element, and PG Diploma in Artificial Intelligence: 120 credits: IS5101 CS5001 CS5010 CS5011 CS4402 or CS5012 in total, up to 30 credits
Information Security and Cryptography
Information Security and Cryptography Fundamentals and Applications June 1-3, 2015 Zurich, Switzerland Lecturers: David Basin, ETH Zurich Ueli Maurer, ETH Zurich ATG www.infsec.ch Program Starting 09:00
Hochschule Esslingen University of Applied Sciences
Hochschule Esslingen University of Applied Sciences Campus Göppingen Campus Hilltop Faculty of Engineering Management Faculty of Information Technology - English Lectures - English Lectures Core Courses:
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
Unit 3 Cyber security
2016 Suite Cambridge TECHNICALS LEVEL 3 IT Unit 3 Cyber security Y/507/5001 Guided learning hours: 60 Version 1 September 2015 ocr.org.uk/it LEVEL 3 UNIT 3: Cyber security Y/507/5001 Guided learning hours:
1. Programme title and designation Advanced Software Engineering
PROGRAMME APPROVAL FORM SECTION 1 THE PROGRAMME SPECIFICATION 1. Programme title and designation Advanced Software Engineering 2. Final award Award Title Credit Value MSc Advanced Software Engineering
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
Module Description. Master Programme. International Business and Finance (M.A.)
Fakultät für Wirtschaft Module Description Master Programme International Business and Finance (M.A.) (Version: 2014-10-01) Introduction: The official requirements for the degree program 'International
Master International Business & Consulting: International Human Resource Management
Hochschule für Wirtschaft und Recht Berlin Department of Business and Economics Master International Business & Consulting: International Human Resource Management accredited by International Business
Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline
Course Number: SEC 150 Course Title: Security Concepts Hours: 2 Lab Hours: 2 Credit Hours: 3 Course Description: This course provides an overview of current technologies used to provide secure transport
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester
Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering Sixth Semester Subject: Network Security & Management Contact Hrs / week: 4 Total hrs: 64 Table of Contents
Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire
SAMPLE CREDIT UNION INFORMATION SECURITY DUE DILIGENCE QUESTIONNAIRE FOR POTENTIAL VENDORS Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire 1. Physical security o Where is
Network Security Course Specifications2011-2012
Assiut University Faculty of Computers & Information Department of Information Technology Quality Assurance Unit Network Security Course Specifications2011-2012 Relevant program B.Sc. in Computers and
Masters in Networks and Distributed Systems
Masters in Networks and Distributed Systems Programme Requirements Taught Element, and PG Diploma in Networks and Distributed Systems: 120 credits: IS5101 CS5001 CS5021 CS4103 or CS5023 in total, up to
MS Information Security (MSIS)
MS Information Security (MSIS) Riphah Institute of Systems Engineering (RISE) Riphah International University, Islamabad, Pakistan 1. Program Overview: The program aims to develop core competencies in
M.A. Programme in Corporate Communication Management (Improved Programme for 2006)
M.A. Programme in Corporate Communication Management (Improved Programme for 2006) 1. Programme Title Master of Arts Programme in Corporate Communication Management 2. Degree Full Title: Abbreviated Title:
Module compendium of the Master s degree course of Information Systems
Module compendium of the Master s degree course of Information Systems Information Management: Managing IT in the Information Age Information Management: Theories and Architectures Process Management:
BUY ONLINE FROM: http://www.itgovernance.co.uk/products/497
CISSP EXAM CRAM 2 1. The CISSP Certification Exam. Assessing Exam Readiness. Taking the Exam. Multiple-Choice Question Format. Exam Strategy. Question-Handling Strategies. Mastering the Inner Game. 2.
Entrust IdentityGuard Comprehensive
Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive is a five-day, hands-on overview of Entrust Course participants will gain experience planning, installing and configuring Entrust
Media: Conception and Production (B.A.) English taught courses
Media: Conception and Production (B.A.) English taught courses Module 06 Production Module name Module name in English Production Production MO 06MCP Module Number (optional) 1600 Degree program Person
Certificate in Cyber Security
Certificate in Cyber Security Offered as a partnership between Cape Peninsula University of Technology (CPUT), French South African Institute of Technology (F SATI), CS Interactive Training and Boshoff
Security + Certification (ITSY 1076) Syllabus
Security + Certification (ITSY 1076) Syllabus Course: ITSY 1076 Security+ 40 hours Course Description: This course is targeted toward an Information Technology (IT) professional who has networking and
CH ENSA EC-Council Network Security Administrator Detailed Course Outline
CH ENSA EC-Council Network Security Administrator Detailed Course Outline Summary Duration Vendor Audience 5 Days hands-on training EC-Council Security Professionals Level Technology Category Advance Ethical
InfoSec Academy Application & Secure Code Track
Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security
(IŞIK - IT201) 1 / 6 COURSE PROFILE. Theory+PS+Lab (hour/week) Local Credits. Course Name Code Semester Term ECTS
COURSE PROFILE Course Name Code Semester Term Theory+PS+Lab (hour/week) Local Credits ECTS Network Security IT527 Fall 3 + 0 + 0 3 8 Prerequisites None Course Language Course Type Course Lecturer Course
Master of Science in Information Technology (MS-IT)
Master of Science in Information Technology (MS-IT) Program Objectives The primary aim of the program is to allow IT professionals an opportunity for professional upgrading or an extension of their qualifications
MAESON MAHERRY. 3 Factor Authentication and what it means to business. Date: 21/10/2013
MAESON MAHERRY 3 Factor Authentication and what it means to business. Date: 21/10/2013 Concept of identity Identity and Access Management Authoritive Identity Source User Identity Feed and Role Management
NETWORK SECURITY (W/LAB) Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information
Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification
1. Module Title Information Security 2. Module Code: CS403INS 3. Module Level - Forth Stage 4. Module Leader Safwan M. 5. Teaching Semester 7 and 8 Soran University Faculty of Science and Engineering Computer
K 066/921. Master Curriculum. Computer Science. (in English)
K 066/921 Master Curriculum Computer Science (in English) 1_MS_ComputerScience_Curr Seite 1 von 11 Inkrafttreten: 1. 10. 2013 Table of Contents 1 Qualification Profile...3 2 Admissions...5 3 Structure
TEACHING AND EXAMINATION REGULATIONS PART B: programme specific section MASTER S PROGRAMME SYSTEM AND NETWORK ENGINEERING
UNIVERSITY OF AMSTERDAM FACULTY OF SCIENCE TEACHING AND EXAMINATION REGULATIONS PART B: programme specific section Academic year 2015 2016 MASTER S PROGRAMME SYSTEM AND NETWORK ENGINEERING Chapter 1 Article
Programme Specification and Curriculum Map for MSc Computer and Network Security
Programme Specification and Curriculum Map for MSc Computer and Network Security 1. Programme title MSc Computer and Network Security 2. Awarding institution Middlesex University 3. Teaching institution
Master Business Intelligence and Process Management
Hochschule für Wirtschaft und Recht Berlin Berlin School of Economics and Law Department of Business and Economics Master Business Intelligence and Process Management Business Intelligence and Process
M.Sc. Health Economics and Health Care Management
List of Courses M.Sc. Health Economics and Health Care Management METHODS... 2 QUANTITATIVE METHODS... 2 ADVANCED ECONOMETRICS... 3 MICROECONOMICS... 4 DECISION THEORY... 5 INTRODUCTION TO CSR: FUNDAMENTALS
Tim Bovles WILEY. Wiley Publishing, Inc.
Tim Bovles WILEY Wiley Publishing, Inc. Contents Introduction xvii Assessment Test xxiv Chapter 1 Introduction to Network Security 1 Threats to Network Security 2 External Threats 3 Internal Threats 5
Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge
Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Mitgliederversammlung EIKON e.v. 26. Februar 2014 Prof. Dr.-Ing. Georg Sigl Lehrstuhl für Sicherheit in
Data Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
Networked Systems Security
Unit 32: Networked Systems Security Unit code: QCF Level 3: Credit value: 10 Guided learning hours: 60 Aim and purpose J/601/7332 BTEC National The aim of this unit is to ensure learners know about the
Information, Network & Cyber Security
School COMSC Information, Network & Cyber Security Information security officers are faced with strategic decisions on a daily basis, and are required to make informed decisions on the security options
Using BroadSAFE TM Technology 07/18/05
Using BroadSAFE TM Technology 07/18/05 Layers of a Security System Security System Data Encryption Key Negotiation Authentication Identity Root Key Once root is compromised, all subsequent layers of security
School of Earth and Environmental Sciences (SEES) The University of Guyana. Proposal
School of Earth and Environmental Sciences (SEES) The University of Guyana Proposal Postgraduate Diploma/Master of Science Degree in Environmental Management Expected Start Date: August 2012 Proposed by
ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0
ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0 Module 1: Vulnerabilities, Threats, and Attacks 1.1 Fundamental Principles of a Secure Network
ROMANIAN - AMERICAN UNIVERSITY. School of Domestic and International Business, Banking and Finance
Invest in People! Project co-financed by European Social Fund through the Sectoral Operational Programme Human Resource Development 2007 2013 Priority Axis: 1. Education and training in support for growth
Masters in Computing and Information Technology
Masters in Computing and Information Technology Programme Requirements Taught Element, and PG Diploma in Computing and Information Technology: 120 credits: IS5101 CS5001 or CS5002 CS5003 up to 30 credits
Software Quality. Introduction " Martin Glinz. Chapter 1. Department of Informatics!
Department of Informatics! Martin Glinz Software Quality Chapter 1 Introduction 2014 Martin Glinz. All rights reserved. Making digital or hard copies of all or part of this work for educational, non-commercial
School of Computer Science
School of Computer Science Head of School Professor S Linton Taught Programmes M.Sc. Advanced Computer Science Artificial Intelligence Computing and Information Technology Information Technology Human
Digital Asset Manager, Digital Curator. Cultural Informatics, Cultural/ Art ICT Manager
Role title Digital Cultural Asset Manager Also known as Relevant professions Summary statement Mission Digital Asset Manager, Digital Curator Cultural Informatics, Cultural/ Art ICT Manager Deals with
Programme Specification and Curriculum Map for MSc Network Security and Pen Testing
Programme Specification and Curriculum Map for MSc Network Security and Pen Testing 1. Programme title MSc Network Security and Pen Testing 2. Awarding institution Middlesex University 3. Teaching institution
Conditions of Studies Economics - Business Administration (B.A.) for the bachelor study programme of Business Administration (B.A.
Study Regulations* for the bachelor study programme of Business Administration (B.A.) at SRH Hochschule Berlin according to the decision of the senate 17 of the basic statutes 27. May 2010 1 * Whenever
MEng, BSc Applied Computer Science
School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions
Information Security Course Specifications2011-2012
Assiut University Faculty of Computers & Information Information Systems Department Quality Assurance Unit Information Security Course Specifications2011-2012 Relevant program Department offers the program
PROGRAMME SPECIFICATION UNDERGRADUATE PROGRAMMES KEY FACTS. School of Arts and Social Sciences Department or equivalent Department of Psychology
PROGRAMME SPECIFICATION UNDERGRADUATE PROGRAMMES KEY FACTS Programme name Psychology Award BSc (Hons) School School of Arts and Social Sciences Department or equivalent Department of Psychology UCAS Code
Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits)
Page 1 of 5 Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description:
Programme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics
Programme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics 1. Programme title Electronic Security & Digital Forensics 2. Awarding institution Middlesex University 3. Teaching
Implementing Microsoft Azure Infrastructure Solutions
Course Code: M20533 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Implementing Microsoft Azure Infrastructure Solutions Overview This course is aimed at experienced IT Professionals who currently
CAREER OPPORTUNITIES
CAREER OPPORTUNITIES After the graduation, students can select three different paths. Students should have at least GPA 2.7 to get into the first two types of job. To apply for academic positions in the
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
CLOUD FRAMEWORK & SECURITY OVERVIEW
CLOUD FRAMEWORK & OVERVIEW From small businesses to the largest Fortune 500 Enterprises, customers trust the irise cloud infrastructure when collaborating to define and design their applications. This
