Course Contents/Structure
Theoretical education: Introductory considerations related to security in a network environment, attacks and threats. Exploration techniques of potential victims of the attack: Recording the system; Scanning; Overview. Attack techniques to the system in Windows and Unix environment. Attacking network devices. Attack on wireless networks. Firewalls. Attack on the software. Attack on the Web servers and applications. Weakness of client software for the Internet. Identity Theft. Malicious applications. Countermeasure analysis for each of the described attack techniques. Overview of Intrusion Prevention System. System Overview for Intrusion detection system. Tools for environment virtualization. Forensic tools.
Practical training: Practical acquaintance with tools for performance analysis and network environment protection with DOS, Windows and Linux operating systems. Virtualization (VMware, Sun Virtal Box, etc.). Working with available tools for port scanning, packet analysis, monitoring, intrusion detection, file integrity checking, forensics, and more. (Nmap, Wireshark, Keylogger, Snort, HashCalc, BackTrack, Caine ....).
|
Teaching Methods: lectures, exercises, laboratory exercises, projects, colloquiums, consultations, seminary papers, examination (practical and theoretical).
|
1. McClure, Stuart; Scambray, Joel; Kurtz, George: Hakerske tajne: zaštita mrežnih sistema, Beograd: Mikro knjiga, 2006.
2. Boyle, Randall. Applied networking labs: a hands-on guide to networking and server management, Upper Saddle River, NY: Prentice Hall, 2011.
3. Boyle, Randall. Applied information security: a hands-on guide to information security software, Boston: Prentice Hall, 2010.
|