Course code InfT2047

Credit points 3

Security testing

Total Hours in Course81

Number of hours for lectures8

Number of hours for seminars and practical classes24

Independent study hours49

Date of course confirmation06.09.2022

Responsible UnitInstitute of Computer Systems and Data Science

Course developers

author Datoru sistēmu un datu zinātnes institūts

Aleksejs Zacepins

Dr. sc. ing.

author lect.

Andrejs Paura

Mg. sc. ing.

author prof.

Gatis Vītols

Dr. sc. ing.

Prior knowledge

DatZ4005, Administration of Computer Networks I

InfT4026, Data Security

Course abstract

The aim of the study course is to prepare specialists with knowledge and competences in the security of information systems, computer systems and computer networks, security testing and security risk management.
The study course examines security issues in various IT spheres, including the security of computer systems, servers, computer networks and web systems. The course examines the methodology of investigating security incidents and their prevention measures, as well as IT security audit, its methodology, paying attention to social engineering as well. During the practical work, computer network security solutions are created and cyber-attack tests are performed both for the virtual systems created within the study course and for the virtual systems created in the "Computer Network Administration" study course.
The course is intended to be implemented as face-to-face lessons, which include lectures, practical work and independent work.

Learning outcomes and their assessment

•students deepen the knowledge acquired in the courses "Administration of computer networks" (DatZ4005, DatZ4007) and "Data protection" (InfT4026) about the methods and means of protection of computer systems and computer networks - passed theory tests;
•students supplement their knowledge of computer network hardware, built-in and additionally installable security solutions of Windows and Linux operating systems - passed theory tests;
•students acquire knowledge about types of cyber-attacks, the concept of security testing, security testing methods and tools - passed theory tests and practical tasks;
•students gain knowledge about the institution's IT security policy, IT security audit and IT system security improvement measures - passed theory tests.
•students are able to develop and implement computer system and computer network protection mechanisms - developed practical works;
•knows how to identify IT security risks and knows how to use computer systems and computer network security state analysis tools - developed practical works;
•students know how to choose, learn and use the computer network security testing tools included in Kali Linux - developed practical works;
•students know how to configure Mikrotik RouterOS, Windows and Linux operating systems to improve router and server security and secure communication - practical and independent work.
•students acquire competencies in the implementation of computer systems and computer network protection mechanisms and are able to advise users and IT specialists on IT security issues - the developed practical and independent works are defended;
•students learn competences in information system security analysis, security testing and security risk management and are able to justify the chosen security testing methods and tools - the developed practical and independent works are defended.

Course Content(Calendar)

1.The concept of IT security, methods and means of protecting computer systems and computer networks, basics of security testing. In the practical work, the creation of a virtual laboratory for testing computer networks. (Lecture 1 hour, practical work 3 hours).
2.Internet protocol security issues, types of IT and computer network attacks - advertising, Trojan horses, ransomware, botnets, backdoor, rootkit, logic bombs, e-mail attacks, Wi-Fi attacks, DoS, DDoS, password attacks, social engineering. A hands-on tutorial on free network security testing tools included with Kali Linux and freely available. (Lecture 1 hour, practical work 3 hours).
3.Review of computer network security testing scenarios and methods. Methods and tools for passive and active information acquisition, scanning and detection of vulnerabilities in IT systems. An overview of publicly available techniques and the possibilities of their use. Passwords as a security measure. Aspect of social engineering, possibilities of their use. In the practical works, the application of Kali Linux distribution tools in security testing of computer systems and computer networks. (Lecture 1 hour, practical work 3 hours).
4.Development, implementation, risk analysis and risk management of the institution's information systems security policy. In practical work, preparation of IT security policy and security audit documentation, control test No.2. (Lecture 1 hour, practical work 3 hours).
5.Review, application and testing of hardware security solutions for local and wireless computer networks. Remote access, VPN and intrusion detection systems. In the practical work, security configuration and testing of the RouterOS operating system of the router developed by Mikrotik. (Lecture 1 hour, practical work 3 hours).
6.Review, application and testing of built-in security solutions for client computers and servers with Windows OS. Windows operating system security configuration and testing in hands-on work. (Lecture 1 hour, practical work 3 hours).
7.Inspection, application and testing of built-in security solutions of client computers and servers with GNU/Linux OS. In practical work configuration and testing security of the Linux operating system. (Lecture 1 hour, practical work 3 hours).
8.Review, application and testing of Internet network data transmission channels, Internet network server security solutions. An overview of website security solutions. Review of security solutions for email systems. In the practical works, control test No.2., defense and discussion of the independent works of the course. (Lecture 1 hour, practical work 3 hours).

Requirements for awarding credit points

In order to receive a credit for the course with a grade, it is necessary to develop (credit) the practical work, develop and present the independent work and pass two theory tests on the topics discussed in the lectures.
Theory tests are prepared in the e-study environment, tests are performed by the student during practical work, tests are evaluated in a 10-point system, the test can be passed if at least 40% of the test questions are answered correctly, if the student repeats the test, the grade is reduced by 1 point.
Laboratory practical work is counted without a grade, and for each practical work developed and completed on time, the student receives an additional 0.1 points to the grade of the study course.
For each practical and independent work in the LLU e-study environment, a task and a description of the evaluation criteria for the results to be achieved are posted.

Description of the organization and tasks of students’ independent work

During the course, the independent work must be developed, the independent work is evaluated with a grade, as part of the independent work, the student must choose an IT system, create a system prototype in the virtual environment, prepare security policy documentation, perform system security testing with the chosen methodology and set of tools, record the work progress and present the result in the audience (as an alternative to independent work, the student can do the security hackathon offered by Accenture).
Independently read literary sources, study informative materials available on the Internet and prepare for tests.

Criteria for Evaluating Learning Outcomes

The course grade is created as a cumulative grade. The grade is calculated as the arithmetic mean of the marks of two tests and independent work, to which additional points for the practical works are added.

Compulsory reading

1. Stallings W. Cryptography and Network Security: Principles and Practice. 8th edition. Pearson Education Limited, 2022. 832 p.
2. Davis R. Art of Network Penetration Testing: Free practice environment. Manning Publications, 2021. 375 p.
3. Graham D. Ethical Hacking: A Hands-on Introduction to Breaking. No Starch Press,US, 2021. 352 p.
4. Kali K. G. Linux Penetration Testing Bible. John Wiley & Sons Inc, 2021. 512 p.
5. Singh G. D. Learn Kali Linux 2019: Perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark. Packt Publishing Limited, 2019. 550 p.
6. OccupyTheWeb. Linux Basics For Hackers: Getting Started with Networking, Scripting, and Security in Kali. No Starch Press,US, 2018. 248 p.

Further reading

1. Beaver K. Hacking For Dummies. 7th Edition. John Wiley & Sons Inc, 2022. 416 p.
2. Chantzis F., Deirme E., Stais I. Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things. No Starch Press,US, 2021. 460 p.
3. Clarke G. E. CompTIA Pentestplus Certification For Dummies. 2nd Edition. John Wiley & Sons Inc, 2022. 528 p.
4. Forshaw J. Attacking Network Protocols: A Hacker’s Guide to Capture, Analysis, and Exploitation. No Starch Press,US, 2017. 408 p.
5. Gregg M. The Network Security Test Lab: A Step-by-Step Guide. John Wiley & Sons Inc, 2015. 480 p.
6. Kizza J. M. Guide to Computer Network Security. 5th ed. Springer Nature Switzerland AG, 2020. 595 p.
7. Computer and information security handbook. Edited by J.R. Vacca. 3rd edition. Cambridge, MA: Morgan Kaufmann Publishers, 2017. 1237 p.

Periodicals and other sources

1. Valsts informācijas sistēmu likums. Pieņemts: 02.05.2002.
2. Elektronisko sakaru likums. Pieņemts: 28.10.2004.
3. Informācijas tehnoloģiju un drošības risku pārvaldības normatīvie noteikumi. Pieņemts: 08.09.2020.
4. Eiropas Parlamenta un Padomes direktīva par uzbrukumiem informācijas sistēmām. 2013/40/ES
5. Eiropas Parlamenta un Padomes Regula (ES) 2016/679 (2016. gada 27. aprīlis) par fizisku personu aizsardzību attiecībā uz personas datu apstrādi un šādu datu brīvu apriti (Vispārīgā datu aizsardzības regula) 2016/679.
6. CERT. Pieejams:
7. Esi drošs. Pieejams:


Mandatory course in the bachelor's study program of professional higher education "Information technologies for sustainable development" and the bachelor's study program "Computer science and computer management".