Computer Security

Data is displayed for academic year: 2023./2024.

Course Description

The goal of the course is to introduce students to computer security and to give them overview of the problems as well as the solutions used in this area. The goal is also to teach students to think about security so that in their professional work they will design, build and maintain secure systems.

Study Programmes

University undergraduate
[FER3-EN] Computing - study
(6. semester)

Learning Outcomes

  1. explain basic terms and concepts in computer security
  2. describe types of security threats and attacks and most common defense mechanisms
  3. describe the properties of most common cryptographic primitives
  4. explain the role of the public key infrastructure and the TLS protocol
  5. apply basic concepts of defensive programming
  6. describe basic principles of digital forensics
  7. implement an simple exploit of a vulnerable system

Forms of Teaching




Laboratory exercises

Grading Method

Continuous Assessment Exam
Type Threshold Percent of Grade Threshold Percent of Grade
Laboratory Exercises 20 % 20 % 20 % 20 %
Mid Term Exam: Written 40 % 40 % 0 %
Final Exam: Written 40 % 40 %
Exam: Written 50 % 70 %
Exam: Oral 10 %

Week by Week Schedule

  1. Introduction. Basic concepts and introduction into security.
  2. Introduction to cryptography. Classical cryptography. Symmetrical ciphers and AES.
  3. Modes of encryption. Stream ciphers. Cryptanalysis of block ciphers. Hash functions and message integrity codes. Asymmetric ciphers.
  4. Vulnerabilities. Threats and threat sources.
  5. Threats and threat sources. Malware.
  6. Access control. Software security.
  7. Operating systems security. Web security.
  8. Midterm exam
  9. Software security. Network Security.
  10. Network security.
  11. Network security.
  12. Overview of other areas of security.
  13. What's next.
  14. AMA (Ask me anything predavanje).
  15. Final exam


Paul C. van Oorschot (2021.), Computer Security and the Internet: Tools and Jewels from Malware to Bitcoin,, Springer
Harold F. Tipton, Micki Krause Nozaki (2016.), Information Security Management Handbook, Volume 6, CRC Press

For students


ID 209718
  Summer semester
L0 English Level
L1 e-Learning
45 Lectures
0 Seminar
0 Exercises
12 Laboratory exercises
0 Project laboratory

Grading System

88 Excellent
75 Very Good
63 Good
50 Sufficient