THE UNIVERSITY OF CRIMINAL INVESTIGATION AND POLICE STUDIES

MASTER ACADEMIC STUDIES

INFORMATION TECHNOLOGY

Course:

Antihacker Tools

Course Code: 11.181

ECTS: 6

Course Status:

Elective

Number of Effective Classes (Per Week): 2 + 2 + 1

Theoretical Education:

Practical Training:

Research Study Project:

2

2

1

Prerequisite/s: None

Educational Objective: Familiarizing with security issues in network environment with an analysis of different attack mechanisms and the corresponding protective solutions.

Projected Outcome: Understanding the security requirements for working in a network environment. Mastering the necessary knowledge and skills for prevention and detection of attacks and the use of appropriate protective tools.

Course Contents/Structure

Theoretical education: Introductory considerations related to security in a network environment, attacks and threats. Exploration techniques of potential victims of the attack: Recording the system; Scanning; Overview. Attack techniques to the system in Windows and Unix environment. Attacking network devices. Attack on wireless networks. Firewalls. Attack on the software. Attack on the Web servers and applications. Weakness of client software for the Internet. Identity Theft. Malicious applications. Countermeasure analysis for each of the described attack techniques. Overview of Intrusion Prevention System. System Overview for Intrusion detection system. Tools for environment virtualization. Forensic tools.

Practical training: Practical acquaintance with tools for performance analysis and network environment protection with DOS, Windows and Linux operating systems. Virtualization (VMware, Sun Virtal Box, etc.). Working with available tools for port scanning, packet analysis, monitoring, intrusion detection, file integrity checking, forensics, and more. (Nmap, Wireshark, Keylogger, Snort, HashCalc, BackTrack, Caine ....).

Teaching Methods: lectures, exercises, laboratory exercises, projects, colloquiums, consultations, seminary papers, examination (practical and theoretical).

Assessment (Maximum Number of Points: 100)

Pre-Exam Obligations

No. of Points

Final Examination

No. of Points

Active participation in classes

10

Examination

50

Practical teaching

20

 

 

Seminary paper

20

 

 

Textbook/s

1. McClure, Stuart; Scambray, Joel; Kurtz, George: Hakerske tajne: zaštita mrežnih sistema, Beograd: Mikro knjiga, 2006.

2. Boyle, Randall. Applied networking labs: a hands-on guide to networking and server management, Upper Saddle River, NY: Prentice Hall, 2011.

3. Boyle, Randall. Applied information security: a hands-on guide to information security software, Boston: Prentice Hall, 2010.