|
|
Module code: KI430 |
|
2V+2P (4 hours per week) |
4 |
Semester: 4 |
Mandatory course: yes |
Language of instruction:
German |
Assessment:
Written examination 90 min.
[updated 08.05.2008]
|
KI430 (P222-0041) Computer Science and Communication Systems, Bachelor, ASPO 01.10.2014
, semester 4, mandatory course
PIB423 (P221-0040, P610-0528) Applied Informatics, Bachelor, ASPO 01.10.2011
, semester 4, mandatory course
|
60 class hours (= 45 clock hours) over a 15-week period. The total student study time is 120 hours (equivalent to 4 ECTS credits). There are therefore 75 hours available for class preparation and follow-up work and exam preparation.
|
Recommended prerequisites (modules):
KI260 Mathematics 2 KI320 Computer Networks
[updated 10.04.2013]
|
Recommended as prerequisite for:
KI500 Internet Technologies KI593 Introduction to Parallel Programming with CUDA KI600 Laboratory Course in Information and Communication KI614 Web Security Project KI616 Information Security KI633 IT Security Project KI690 IT Forensics
[updated 30.03.2020]
|
Module coordinator:
Prof. Dr. Damian Weber |
Lecturer: Prof. Dr. Damian Weber Dipl.-Inform. Marion Bohr (practical training) Dipl.-Ing. Michael Sauer (practical training)
[updated 10.04.2013]
|
Lab:
IT-security lab (5103/2)
|
Learning outcomes:
After completing this course, students will be able to act as system administrators for networked Unix systems. They will understand how to configure and operate such systems reliably. They will be able to protect the network from random errors or from deliberate hostile attacks and be able to respond to critical system states.
[updated 08.05.2008]
|
Module content:
1. The UNIX philosophy 2. Files and inodes 3. Shells 4. Processes 5. User IDs 6. File systems 7. Bootstrapping 8. The operating system kernel 9. System messages 10. Network configuration 11. Status and statistics of the system state 12. Security aspects 13. System protection 14. Local security 15. Network security In the problem-solving sessions, students will have the opportunity to modify the operating system, the network configuration and the user management system, as well as simulating local and network attacks. The configuration of typical security measures such as firewalls and virtual private networks will be studied both theoretically and in practice, and the capabilities and limits of currently available network tools discussed and examined.
[updated 08.05.2008]
|
Recommended or required reading:
WThe FreeBSD Project: http://www.freebsd.org/ The SANS Institute: http://www.sans.org/ McCLURE, SCAMBRAY, KURTZ: Hacking Exposed, McGraw-Hill
[updated 08.05.2008]
|
Module offered in:
SS 2018,
SS 2017,
SS 2016,
SS 2015,
SS 2014,
...
|