Admission requirements
Admission only after intake, see the website of the Cyber Security Academy.
Admission only for those students who are enrolled in the technical track
Description
This course deals with hardware, software and network security.
The first part deals with security, functions and operating systems. Also, attention will be paid to application security as well as secure software development.
In the second part attention will be paid to specific security threats. The trade-off between security risks and technical requirements will actively being weighed. We consider the identity and characteristics of hackers and the hacking techniques they are using. The various types of attacks, varying from password cracking, malicious code among others, to identity theft, are analysed. Finally we briefly consider the practical aspects of security in networks and communication, also attention is paid to forensics.
Course objectives
Participants have:
a more detailed understanding of security functions and operating systems, application security and secure software development.
a general overview of security threats, different types of security attacks and understanding of the identity and characteristics of various types of attackers
understanding of the most common technical solutions taking the security threats into account
understanding of the importance of trade-off between security risks and technical requirements (more particularly weigh security risks versus technical requirements)
Participants are able to:define technical requirements with respect to security solutions.
communicate about the chosen technical requirements with non-technical stake- and shareholders within organisations
Timetable
7 days from 9.30 until 17.00
Thursday December 7, 2017
Friday December 8, 2017
Friday December 15, 2017
Friday December 22, 2017
Friday January 12, 2018
Friday January 19, 2018
Friday January 26, 2018 (assessment)
Mode of instruction
Lectures, seminars, exercises, class discussion
Lecturers: dr Jan van der Lubbe (TUD), dr. Christian Doerr (TUD) and others
Course Load
5 EC
Assessment method
Assignment (60%), written exam (40%)
No compensation is possible for assignments of 30% or more. Therefore these should be passed.
Blackboard
Yes, for posting slides of lectures, relevant literature and assignments
Reading list
Compulsory literature and literature for further consultation will be announced via Blackboard
Registration
No registration is required for lectures and exams.
Contact
Dr. Jan van der Lubbe (TUD) Drs. Mireille Snels, programme manager
Remarks
For more information, see the website of the Cyber Security Academy.