Information Systems Security

Information Systems Security

Punktacja (aktualizacja 15.6.2019).

Classes' forum on Yebood v2

Presentations and examples

  1. Program of the course
  2. Information Security
  3. Cryptography
  4. PKI and digital certificates
  5. Identity and Access Management
  6. OAuth2
  7. Identity Federation
  8. Database Security
  9. IT Infrastructure Security
  10. Security Architecture
  11. Cloud Computing Security
  12. Threat Modeling

Exercises

  1. Exercises set 1, Information Security, Cryptography
    Due date: 12.3.2019
  2. Exercises set 2, PKI and digital certificates
    Due date: 19.3.2019
  3. Exercises set 3, Authentication, Authorization & Access Control
    Due date: 2.4.2019
  4. Exercises set 4, OAuth2
    Due date: 9.4.2019
  5. Exercises set 5, SAML2, Identity Federation & SSO
    Due date: 16.4.2019
  6. Exercises set 6, Database security
    Due date: 30.4.2019
  7. Exercises set 7, Hardening
    Due date: 7.5.2019
  8. Exercises set 8, Cloud Computing Security
    Due date: 28.5.2019
  9. Exercises set 9, Threat Modeling
    Due date: 4.6.2019
  10. Exercises set 10, Presentation
    Due date: 7.6.2019

Roadmap

  • 26.2.2019: Information Security, Cryptography
  • 5.3.2019: PKI and certificates
  • 19.3.2019: Identity & Access Management
  • 2.4.2019: OAuth2
  • 9.4.2019: Identity Federation
  • 16.4.2019: Database Security
  • 30.4.2019: IT Infrastructure Security
  • 7.5.2019: Security Architecture
  • 21.5.2019: Cloud Computing Security
  • 28.5.2019: Threat Modeling
  • 4.6.2019: Wojciech P., Kamil M., Malware introduction, Karol R., Practical applications of zero-knowledge proofs
  • 7.6.2019: Jan M., Introduction to binary exploitation, Bartłomiej N., Data Breaches
  • 18.6.2019: EXAM, OWASP Top 10
  • 25.6.2019: Verification