Inhalt

[ 921NESESYSK13 ] KV Systems Security

Versionsauswahl
Workload Education level Study areas Responsible person Hours per week Coordinating university
3 ECTS M1 - Master's programme 1. year Computer Science René Mayrhofer 2 hpw Johannes Kepler University Linz
Detailed information
Pre-requisites Verpflichtend: VO UE Computernetzwerke (aus Bachelor Informatik) oder Zulassung zum Masterstudium Computer Science
Original study plan Master's programme Computer Science 2025W
Learning Outcomes
Competences
Students are able to understand and describe basic security concepts and controls used to mitigate threats targeting IT-, IoT-, OT systems, and mobile devices. They can apply certain mitigation techniques, such as hardening, conduct various security tests, and find evidence as part of an incident response plan.
Skills Knowledge
  • Systematically address, assess, and communicate security aspects by using threat modeling and risk management approaches (K4,K5)
  • Describe vulnerabilities by using CVE, CWE, CVSS, or OWASP (K2,K3)
  • Choose, deploy, or create proper hardening measures for Linux systems with focus on Discretionary Access Control (DAC), Mandatory Access Control (MAC), and fail2ban (K3,K5,K6)
  • Conduct basic reverse engineering techniques, port scans, and brute-force/dictionary attacks to find weaknesses within a system or program while sticking to IEEE code of ethics (K3,K4)
  • Understand the basics of an incident response plan (K2)
  • Find evidence of an incident in a log file (K3, K4)
  • Analyze and evaluate basic security concepts of network architectures (K4,K5)
  • Understand basic security aspects in special environments, such as mobile systems, Internet-of-Things, and Industrial Control Systems (K2)
  • Differentiate IT and OT security requirements (K2)
  • Threats, vulnerabilities, and risks
  • Vulnerability frameworks and scoring systems (e.g., CVE, CWE, CVSS, OWASP)
  • Access control models like DAC and MAC
  • Public-key cryptography
  • Phases of a penetration test, including test types
  • Incident response life cycle
  • Malware types
  • Steps how attackers design malware
  • Basic network security concepts (e.g., DMZ, VLAN)
  • OWASP (Mobile) Top 10
  • Differentiation between IT and OT with regards to security
Criteria for evaluation Grading is based on two components: A theoretical exam to prove knowledge and understanding and practical exercises to verify that students possess the skills to put their knowledge into practice. Both parts must be completed successfully to complete the course.
Methods Theory is mostly taught by lectures. Practical tasks may require students to research solutions on their own.
Language English
Study material Presentation slides Additional supplementary material will be announced each semester
Changing subject? No
Further information https://www.jku.at/en/institute-of-networks-and-security/
On-site course
Maximum number of participants -
Assignment procedure Direct assignment