Information Systems Security
Punktacja (aktualizacja 15.6.2019).
Classes' forum on Yebood v2
Presentations and examples
- Program of the course
- Information Security
- Cryptography
- PKI and digital certificates
- Identity and Access Management
- OAuth2
- Identity Federation
- Database Security
- IT Infrastructure Security
- Security Architecture
- Cloud Computing Security
- Threat Modeling
Exercises
- Exercises set 1, Information Security, Cryptography
Due date: 12.3.2019
- Exercises set 2, PKI and digital certificates
Due date: 19.3.2019
- Exercises set 3, Authentication, Authorization & Access Control
Due date: 2.4.2019
- Exercises set 4, OAuth2
Due date: 9.4.2019
- Exercises set 5, SAML2, Identity Federation & SSO
Due date: 16.4.2019
- Exercises set 6, Database security
Due date: 30.4.2019
- Exercises set 7, Hardening
Due date: 7.5.2019
- Exercises set 8, Cloud Computing Security
Due date: 28.5.2019
- Exercises set 9, Threat Modeling
Due date: 4.6.2019
- Exercises set 10, Presentation
Due date: 7.6.2019
Roadmap
- 26.2.2019: Information Security, Cryptography
- 5.3.2019: PKI and certificates
- 19.3.2019: Identity & Access Management
- 2.4.2019: OAuth2
- 9.4.2019: Identity Federation
- 16.4.2019: Database Security
- 30.4.2019: IT Infrastructure Security
- 7.5.2019: Security Architecture
- 21.5.2019: Cloud Computing Security
- 28.5.2019: Threat Modeling
- 4.6.2019: Wojciech P., Kamil M., Malware introduction, Karol R., Practical applications of zero-knowledge proofs
- 7.6.2019: Jan M., Introduction to binary exploitation, Bartłomiej N., Data Breaches
- 18.6.2019: EXAM, OWASP Top 10
- 25.6.2019: Verification