DESCRIPTION OF COURSE UNIT

Similar documents
An Approach to Threat Modeling in Web Application Security Analysis

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

CRYPTUS DIPLOMA IN IT SECURITY

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Description: Objective: Attending students will learn:

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

FORBIDDEN - Ethical Hacking Workshop Duration

Principles of Information Assurance Syllabus

Computer Security DD2395

Computer Security (EDA263 / DIT 641)

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

TCOM 562 Network Security Fundamentals

Development (60 ЕCTS)

Loophole+ with Ethical Hacking and Penetration Testing

Learn the fundamentals of Software Development and Hacking of the iphone Operating System.

2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program.

Common Cyber Threats. Common cyber threats include:

Hope is not a strategy. Jérôme Bei

Network Security Course Specifications

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Computer Security (EDA263 / DIT 641)

Network Security: A Case Study

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

SI - Computer Security

Course Content: Session 1. Ethics & Hacking

Högskoleexamen. Web application Security. Sektionen för informationsvetenskap, data- och elektroteknik. Rapport för Högskoleexamen, January 2013

RMAR Technologies Pvt. Ltd.

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

BBM 461: SECURE PROGRAMMING INTRODUCTION. Ahmet Burak Can

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

UVic Department of Electrical and Computer Engineering

Introduction to Cyber Security / Information Security

EC-Council. Certified Ethical Hacker. Program Brochure

Cisco Advanced Malware Protection. Ross Shehov Security Virtual Systems Engineer March 2016

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws

Network Incident Report

EECS 588: Computer and Network Security. Introduction

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

SETLabs Briefings ENTERPRISE ARCHITECTURE & BUSINESS COMPETITIVENESS VOL 2 NO 4. Oct Dec Threat Modeling in Enterprise Architecture Integration

CHECK POINT Mobile Security Revolutionized. [Restricted] ONLY for designated groups and individuals

Ethical Hacking & Cyber Security Workshop

ITU-IMPACT Training and Skills Development Course Catalogue

Certified Cyber Security Analyst VS-1160

Detailed Description about course module wise:

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Page: Designed & Executed By: Presents Cyber Security Training

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

CAPTURE-THE-FLAG: LEARNING COMPUTER SECURITY UNDER FIRE

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus

Cyber Security. A professional qualification awarded in association with University of Manchester Business School

ALEKSANDRAS STULGINSKIS UNIVERSITETY. Faculty of Economics and Management. Programme of the Second Cycle (Master's) Studies

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

CYBERTRON NETWORK SOLUTIONS

NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS. Division: Applied Science (AS) Liberal Arts (LA) Workforce Development (WD)

Certified Cyber Security Analyst VS-1160

Computer Ethics. (Ethics) Ethics in Computer System (COMPUTER ETHICS AND COMPUTER SECURITY) Computer Ethics and Computer Security

Cybersecurity AAS Program

Information Security Course Specifications

Building the Next Generation of Computer Security Professionals. Chris Simpson

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security.

How Security Testing can ensure Your Mobile Application Security. Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant

Course Syllabus. Course code: Academic Staff Specifics. Office Number and Location

Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability

Description of the program

Ursuline College Accelerated Program URSULINE COLLEGE

Master of Science in Information Systems & Security Management. Courses Descriptions

MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY

Philadelphia University Faculty of law Department of semester, 2007/2008. Course Syllabus

ITSY Security Assessment/Auditing Spring 2010 Professor: Zoltan Szabo D111 LEC TR 11:20AM 12:45PM D111 LAB TR 12:50PM 02:15PM

Jort Kollerie SonicWALL

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Information Systems and Tech (IST)

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Build Your Own Security Lab

Unit 3 Research Project. Eddie S. Jackson. Kaplan University. IT540: Management of Information Security. Kenneth L. Flick, Ph.D.

Bellevue University Cybersecurity Programs & Courses

Secure Software Design in Practice ARES SECSE Workshop

Don t Fall Victim to Cybercrime:

Cybercrime in Canadian Criminal Law

A Review on Zero Day Attack Safety Using Different Scenarios

Certified Cyber Security Expert V Web Application Development

Daniel Meier & Stefan Badertscher

Description: Course Details:

Principles of ICT Systems and Data Security

Client Update NFA Adopts Interpretive Notice Regarding Information Systems Security Programs

Professional Penetration Testing Techniques and Vulnerability Assessment ...

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Course Outline Computing Science Department Faculty of Science. COMP Credits Computer Network Security (3,1,0) Fall 2015

(IŞIK - IT201) 1 / 6 COURSE PROFILE. Theory+PS+Lab (hour/week) Local Credits. Course Name Code Semester Term ECTS

SECURITY. Risk & Compliance Services

A threat risk modeling framework for Geospatial Weather Information System (GWIS): a DREAD based study

Computer and Network Security

CIS 4204 Ethical Hacking Fall, 2014

ETHICAL HACKING CYBER SECURITY

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

Transcription:

DESCRIPTION OF COURSE UNIT APPROVED by Faculty Council 16 april 2015 Resolution No. 1STH-33 1. 2. Code Course unit title Title of the degree programme SN215M077612 Modelling and Management of Computer Networks Name of lecturer(s) Coordinator: Prof. Dr. Darius Štitilis (stitilis@mruni.eu) a. o: Martynas Damkus 3. 4. 5. 6. 7. Cybersecurity management Master`s Degree Programme, Full-time study Departament(s) Institute of Digital Technologies Cycle of course unit Level of course unit Type of course unit II cycle Not applicable Optional Mode of delivery Year of study and semester when the course unit is delivered Language of instruction Auditorial 2 semester Lithuanian Study requirements Prerequisites Co-requisites Internship Not applicable Not applicable Number of ECTS credits allocated 8. Recommended optional programme components Student's workload Management of IT Projects Contact work hours and planned learning activities Independent work hours 6 162 50 112 Learning outcomes of the programme Knowledge to use a holistic approach in dealing with a wide variety of electronic information security (cyber security) threats. Purpose of the course unit: programme competences to be developed Provide knowledge of computer network attack simulations, security enhancement, electronic harassment, space expert analysis. Learning outcomes of the course unit Students who complete this subject: Information systems will be able to justify the validity of cyber harassment; Teaching and learning methods Lectures, workshops, group work Assessment methods Individual papers, presentation on selected topics, discussion and active participants Will be able to organize and manage human resources, technological platforms in cyber security field, and make the decisions in changing environments, to develop and manage cyber security Be able to analyze the following groups: Cybercrime; Social networking risk management; Cyber attacks on the risk assessment. Lectures, workshops, group work Individual papers, presentation on selected topics, discussion and active participants

development projects. Will be able to scientifically analyze creative solutions in the cyber security (cyber security) field, and evaluate development opportunities, to argue and create innovative ideas and creative solutions for their implementation in electronic and information security (cyber security) field, to the security of electronic information (cyber security) innovative projects, to integrate a new knowledge in new and unknown environments and in global multicultural context. Be able to competently prepare and submit to the company, organization, forensic analysis of documents (reports, for the security of the Republic of Lithuania who meets the applicable standards) Lectures, workshops, group work Individual papers, presentation on selected topics, discussion and active participants 9. Course contens Contact work hours and planned learning activities Independent work hours and tasks Topics Lectures Consultations Seminars Training exercises Laboratory work Internship Assessment Remote contact work hours All contact work hours Work in the computer classroom Independent work hours Tasks Introduction. Burglary and ethics. Basic concepts; Hacker hacking techniques; Resonance effect. 2 4 6 14 For practical purposes are considered hackers hacking techniques. Student groups of 4-5 students to discuss, considering: Response process; Couple; resources; Search mechanism. Command-line options.

Access, services and protocols. devices; topology; TCP / IP model;. 2 4 6 14 Examination of real networks. A group of students (3-5 people) introduces the topic is relevant to the situation, the identification of problems to look for alternative solutions. Applicable to the delivery of computer network simulators, visual aids, PowerPoint presentation, slides, handouts, remote (video) training - examples and so on.). IS identification, analysis attacks. Service identification; Features of the system; Packet analysis. 2 4 6 14 Students (in groups) will prepare an accurate packet data analysis report. PowerPoint software, network analysis program packet simulators. Slides, handouts, remote (video) training - examples and so on.).

Malicious Software Attacks and simulation. worms; Trojan horses; rootkits; Logic bombs; Spyware software; Botnet. 2 4 6 14 Specific (actually existing) attack or safeguard investigation (working groups). Self study are: Malware today; botnet; Anti-virus programs; Firewall; "Sandbox". Digital forensics. principles; methodology; process; Evidence. 2 4 6 14 Simulator developed the electronic crime situation (forensics). A group of students (3-5 people) introduces the topic is relevant to the situation (in the subject), adapted from the study (search for traces of evidence) methodology properly registered discovered evidence. Passwords. history; types; Crack passwords; Security measures. 2 4 6 14 Make a password security, development and cracking expert analysis. Strong / weak passwords simulators. Password encryption / decryption.

Usage of social engineering in cyber space. 2 4 6 14 Discussion on the usage of social engineering concepts in cyber space, analysis of real life examples. Computer network security model. The network simulator; Social network security simulator; Digital examination. 2 4 6 14 Future ekspertizininkai analyze the simulator networking, social networks from simple to complex ekeltroninių crimes. These service reports will be available for the company or organization, and judicial proceedings justification. 10. Assessment 2 2 Assesment strategy Overall 16 32 2 50 112 Weighting percentage Period or date of assessment Written paper (Abstract) 50 During the semester Assessment criteria Assessed the following aspects: - The structure and scope: the structure of the letter is clear and logical, there are all necessary components (introduction, which presents the theme, goals, objectives, methods, and empirical materials, teaching, where the empirical material analysis and interpretation, conclusion), the work is a reasonable amount of (0.5 points); - Analysis and Conclusions: The analysis is very detailed, the findings are based, formulated on the basis of empirical material (2 points) if the analysis is done, but not complete, the findings are not always justified, given 1 point for a superficial analysis of the scores are not given. - Scientific research culture and style: the proper treatment of sources and quotes, wording and styles to meet the requirements of scientific work (0.5 points). Evaluation without written work - 0 points. Only written work with delivery. (Students in groups where there will be many, if not this one, will get a specific company (which may be a company with which to sign a cooperation partner's

Powered by TCPDF (www.tcpdf.org) intentions or social protocols or companies that want to get the test for free / paid) will perform IT risk assessment report can be supply companies / organizations). Examination 50 According to the shedule Evaluation by criteria mentioned in University Study regulations 11. Required reading 1. Robertas Vageris. Rizikos analizės vadovas. Vilnius: Vagos leidykla, 2005 2. Threat Modeling Web Applications, J.D. Meier, Alex Mackman, Blaine Wastell, Microsoft Corporation, May 2005. 3. Improving Web Application Security: Threats and Countermeasures, J.D. Meier, Alex Mackman, Michael Dunner, Srinath Vasireddy, Ray Escamilla and Anandha Murukan, Microsoft Corporation, June 2003. 4. Threat Modeling, Frank Swiderski and Window Snyder, Microsoft Press, June 2004, ISBN 0-7356-1991-3. 5. Writing Secure Code, 2nd Edition, Howard and LeBlanc, (pp. 69 124), Microsoft Press, 2003, ISBN 0-7356-1722-8. 6. A Conceptual Model for Threat Modeling Applications, Saitta, Larcom, and Michael Eddington, July 2005 Recommended reading 1. Open Source Security Testing Methodology Manual Pete Herzog OSSTMM. Ispanija: Ispanijos saugumo universitetas, 2011 2. CVSS, U.S. Department of Homeland Security library, February 2012. 3. The Business Model for Information Security. ISACA 2010 4. Mobile Application Security. - Himanshu Dwivedi, Chris Clark, David Thiel 2010 5. Securing WebGoat using ModSecurity -OWASP Foundation 2011 6. OWASP Application Security Verification Standard - Paulo Coimbra, 2011