IPLUSO 22251
Active Cybersecurity
Cybersecurity
-
ApresentaçãoPresentationImplementation, administration and operation of some of the main Computer Network Security controls that contribute to Cybersecurity.
-
ProgramaProgrammeNetworks, Internet and Cybersecurity (Revision); Cybersecurity Controls; Information Security Incident Management Process; Disaster Recovery Plan (Cyberattacks); Applied Cryptography, Symmetrical Algorithms and Application Examples; Applied Cryptography, Asymmetric Algorithms and Examples of Applications; Identity and Access Management (Application in Operating Systems); Communications Analysis, Wireshark Installation and TCP-IP Protocol Review; Use of Wireshark in the Analysis of some of the Main TCP-IP Stack Protocols (e.g., http; ICMP); Analysis of Communication and Troubleshooting in Local Area Networks (LAN); Firewall Types and Open Source e Commercial Examples (e.g., Fortigate); Implementation and Operation of a Firewall; Threats, Vulnerabilities and Attack Methods; Vulnerability Analysis (e.g., OpenVas); Computational Forensics and Presentation of Student Work.
-
ObjectivosObjectivesOA1: Reference and characterize some of the main security controls of Computer Networks and Cybersecurity. OA2: design of an Information Security incident management process. OA3: Design of a Disaster Recovery Plan. OA4: efficiently use cryptographic controls that ensure confidentiality, integrity and non-repudiation. OA5: analyze communications under the TCP-IP protocol and troubleshoot. OA6: Install, administer and operate a firewall. OA7: Install, administer and operate a vulnerability analysis tool on local networks. OA8: explain the main concerns and actions to be taken in the field of computer forensics.
-
BibliografiaBibliographyBoavida e Bernardes (2019). Introdução à Criptografia, FCA. Zúquete, André (2017). Segurança em Redes Informáticas (3ª ed.), FCA. Sanders, Chris (2017). Practical Packet Analysis & Using Wireshark to Solve Real-World Network Problems, 3th Ed, no starch press. Whitman, Mattord and Green (2012). Guide to Firewalls and VPNs, 3 th Ed, Course Technology & Cengage Learning.
-
MetodologiaMethodologyIt consists of: (1) theoretical - practical sessions lasting four hours, in which teaching has a practical orientation, using the installation, administration and operation of Open Source or Commercial controls/security tools; (2) and teaching uses fundamentally: the expository, demonstrative and simulation pedagogical method. The evaluation is carried out through a group project (40%), an individual evaluation (35%) and a set of small scale/complexity works - continuous evaluation (25%)
-
LínguaLanguagePortuguês
-
TipoTypeSemestral
-
ECTS6
-
NaturezaNatureMandatory
-
EstágioInternshipNão