Security Threats on the Internet

Course Description

Advanced Persistent Threats. Cybercrime. Analysis of significant security incidents. Dark web and deep web. Anonymity and privacy on the Internet. Data protection on the Internet. Denial of service attacks. Botnets. Spam. Zero-day vulnerabilities and examples. Offensive software markets. Cyber ​​Threat Intelligence.

Learning Outcomes

  1. Analyze security incidents
  2. Protect data on the Internet
  3. Perform cyber threat intelligence
  4. Estimate the level of protection of data on the Internet

Forms of Teaching

Lectures

Independent assignments

Laboratory

Week by Week Schedule

  1. Attacker goals, capabilities, and motivations (e.g., underground economy, digital espionage, cyberwarfare, insider threats, hacktivism, advanced persistent threats)
  2. Attacker goals, capabilities, and motivations (e.g., underground economy, digital espionage, cyberwarfare, insider threats, hacktivism, advanced persistent threats)
  3. Examples of malware (e.g., viruses, worms, spyware, botnets, Trojan horses or rootkits)
  4. Examples of malware (e.g., viruses, worms, spyware, botnets, Trojan horses or rootkits)
  5. Denial of Service (DoS) and Distributed Denial of Service (DDoS)
  6. Denial of Service (DoS) and Distributed Denial of Service (DDoS)
  7. Denial of Service (DoS) and Distributed Denial of Service (DDoS)
  8. Midterm exam
  9. Social engineering (e.g., phishing)
  10. Social engineering (e.g., phishing)
  11. User identity management on Internet: unauthorized access to user data and confidentiality
  12. User identity management on Internet: unauthorized access to user data and confidentiality
  13. Regulatory environments - responsibility, liability and self-determination
  14. Guest Lecturer from Industry - overview of current procedures and practices
  15. Final exam

Study Programmes

University graduate
Audio Technologies and Electroacoustics (profile)
Free Elective Courses (1. semester)
Communication and Space Technologies (profile)
Free Elective Courses (1. semester)
Computational Modelling in Engineering (profile)
Free Elective Courses (1. semester)
Computer Engineering (profile)
Free Elective Courses (1. semester)
Computer Science (profile)
Free Elective Courses (1. semester)
Control Systems and Robotics (profile)
Free Elective Courses (1. semester)
Data Science (profile)
Free Elective Courses (1. semester)
Electrical Power Engineering (profile)
Free Elective Courses (1. semester)
Electric Machines, Drives and Automation (profile)
Free Elective Courses (1. semester)
Electronic and Computer Engineering (profile)
Free Elective Courses (1. semester)
Electronics (profile)
Free Elective Courses (1. semester)
Information and Communication Engineering (profile)
Free Elective Courses (1. semester)
Network Science (profile)
Elective Courses of the Profile (1. semester)
Software Engineering and Information Systems (profile)
Free Elective Courses (1. semester)

Literature

(.), W. Stallings. Network Security Essentials: Applications and Standards, Prentice Hall,
(.), Man Young Rhee. Internet Security: Cryptographic Principles, Algorithms and Protocols. Man Young Rhee,
(.), Scott J. Roberts, Rebekah Brown. Intelligence-Driven Incident Response: Outwitting the Adversary.,

For students

General

ID 222654
  Winter semester
5 ECTS
L0 English Level
L1 e-Learning
30 Lectures
12 Laboratory exercises

Grading System

Excellent
Very Good
Good
Acceptable