Course detail

ICT Security 1

FEKT-TIC1CompulsoryBachelor's (1st cycle)Acad. year: 2015/2016Summer semester2. year of study7  credits

The course covers the topics dealing with secure configuration and administration of modern operating systems. In particular, these topics are included: Windows, Linux and OS X encryption, authentication subsystems of Windows, Linux and OS X platforms, network security features of Windows, Linux and OS X platforms, iOS and Android security architecture, virtualization platform specifics and introduction into special security-enhanced operation systems.

Learning outcomes of the course unit

Students will learn the practical knowledge from the modern operating system security. The main stress is put to the most popular OS platforms, namely Windows, Linux and OS X. For each platform, the students learn how to use built-in mechanisms for data encryption, authentication and network security. Students also learn the principles of iOS and Android mobile platform security. After successful completions, the students will be able to:
- Analyze and correctly implement the encryption mechanisms on Windows, Linux and OS X operating systems.
- Analyze and correctly implement the authentication mechanisms on Windows, Linux and OS X operating systems.
- Explain the principles and manage security mechanisms of the network subsystems on Windows, Linux and OS X operating systems.
- Explain the basic principles of the iOS and Android platform security.
- Use the basic security principles in the virtualized environment.


No special prerequisites are required. Only high school knowledge and general PC usage experience is expected.


Not applicable.

Recommended optional programme components

Not applicable.

Recommended or required reading

NORTHRUP, Anthony. Mistrovství v Microsoft Windows 8: kompletní průvodce do posledního detailu. 1. vyd. Brno: Computer Press, 2013, 615 s. ISBN 978-80-251-4111-3.
SCHRODER, Carla. Linux: kuchařka administrátora sítě. Vyd. 1. Brno: Computer Press, 2009, 596 s. ISBN 978-80-251-2407-9.
POGUE, David. Mac OS X Lion: kompletní průvodce. 1. vyd. Brno: Computer Press, 2013, 1040 s. ISBN 978-80-251-3758-1.
STALLINGS, William. Cryptography and network security: principles and practice. Seventh edition. xix, 731 pages. ISBN 01-333-5469-5.

Planned learning activities and teaching methods

Methods of educations are described in the article 7 of the BUT’s Study and Examination Regulation. Teaching methods include lectures, laboratories and individual projects. Course is taking advantage of e-learning (Moodle) system.

Assesment methods and criteria linked to learning outcomes

The maximum of 25 points is given upon completion of the laboratory assignments. The completion of an individual project adds upto 25 points. The requirements on the completion of the tasks in laboratories and projects are described in the annual supervisor’s notice. The maximum of 50 points can be gained during the final exam.

Language of instruction


Work placements

Not applicable.

Course curriculum

1. Operating system security introduction
2. Data protection on OS Windows
3. Network security on OS Windows
4. Authentication on OS Windows
5. Data protection on OS Linux
6. Network security on OS Linux
7. Authentication on OS Linux
8. Data protection on OS X
9. Network security on OS X
10. Authentication on OS X
11. Mobile OS security
12. Security aspects of virtualization platforms
13. Special operating systems


The goal of the course is to provide students with the information about the security architecture of modern operating systems. The students will learn both theoretical and practical aspects of Windows, Linux and OS X security features. The security of mobile and virtualization platforms is also covered in this course.

Specification of controlled education, way of implementation and compensation for absences

The conditions for the successful course completion are stated in the yearly updated supervisor’s notice.

Type of course unit



26 hours, optionally

Teacher / Lecturer

Laboratory exercise

26 hours, compulsory

Teacher / Lecturer

The other activities

26 hours, compulsory

Teacher / Lecturer