Image for
Home

Information system security 2

  • Class 30
  • Practice 30
  • Independent work 90
Total 150

Course title

Information system security 2

Lecture type

Elective

Course code

21-00-543

Semester

5

ECTS

5

Lecturers and associates

Course overview

This module builds on the knowledge and understanding of the Information System Security 1 module giving students more practical knowledge in a Cyber security field.
This module encourages students to apply the theory taught in the rest of the programme in a practical situation.

Students will learn:
• About threats and protection methods for modern information systems
• How to check and implement web security and the security of mobile applications
• Security aspects of cloud computing, social networks and Internet of Things
• The steps in execution of attacks on information systems

This module will help students to gain confidence in specific fields that will build them as Cyber security practitioners.

Literature

Essential reading:
1. Rhodes-Ousley, M. (2013) Information Security: The Complete Reference. 2nd edn. New York: McGraw-Hill Education.
2. Liu, V. and Sullivan, B. (2011) Web Application Security, A Beginner’s Guide. New York: McGraw-Hill Education.

Recommended reading:
1. Chell, D. (2015) The Mobile Application Hacker’s Handbook. Indianapolis: John Wiley and Sons.
2. Kim, P. (2018) the Hacker Playbook 3. Arlington: Createspace.

Minimal learning outcomes

  • Determine the most significant threats for information systems of electronic business
  • Understand the most significant threats for the security of web and mobile applications and the mechanisms of their protection
  • Define security aspects of cloud computing, social networks, and the Internet of Things
  • Evaluate methods of security checks (penetration testing) of information systems

Preferred learning outcomes

  • Evaluate and apply methods of protection on information systems in electronic business
  • Apply different attack and protections tactics to web and mobile applications
  • Explain security aspects of cloud computing, social networks, and Internet of Things
  • Apply appropriate safety check methods (penetration testing) of information systems
Preuzmi vodič za studente
Share: Facebook Twitter