{"id":2187,"date":"2020-03-17T07:05:21","date_gmt":"2020-03-17T07:05:21","guid":{"rendered":"https:\/\/isf.tvz.hr\/?p=2187"},"modified":"2020-04-07T11:49:34","modified_gmt":"2020-04-07T11:49:34","slug":"integrated-systems-of-information-security","status":"publish","type":"post","link":"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/17\/integrated-systems-of-information-security\/","title":{"rendered":"Integrated Systems of Information Security"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\"  style='background-color: rgba(255,255,255,0);background-position: center center;background-repeat: no-repeat;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;'><div class=\"fusion-builder-row fusion-row \"><div  class=\"fusion-layout-column fusion_builder_column fusion_builder_column_1_3 fusion-builder-column-0 fusion-one-third fusion-column-first 1_3\"  style='margin-top:10px;margin-bottom:10px;width:33.33%;width:calc(33.33% - ( ( 4% ) * 0.3333 ) );margin-right: 4%;'><div class=\"fusion-column-wrapper\" style=\"padding: 0px 0px 0px 0px;background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;\"   data-bg-url=\"\"><span class=\"fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img loading=\"lazy\" src=\"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/03\/covjek_stoji_450.jpg\" data-orig-src=\"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/03\/covjek_stoji_450.jpg\" width=\"450\" height=\"686\" alt=\"\" title=\"covjek_stoji_450\" class=\"lazyload img-responsive wp-image-2264\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27450%27%20height%3D%27686%27%20viewBox%3D%270%200%20450%20686%27%3E%3Crect%20width%3D%27450%27%20height%3D%273686%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/03\/covjek_stoji_450-200x305.jpg 200w, https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/03\/covjek_stoji_450-400x610.jpg 400w, https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/03\/covjek_stoji_450.jpg 450w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1000px) 100vw, 450px\" \/><\/span><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div  class=\"fusion-layout-column fusion_builder_column fusion_builder_column_2_3 fusion-builder-column-1 fusion-two-third fusion-column-last 2_3\"  style='margin-top:10px;margin-bottom:10px;width:66.66%;width:calc(66.66% - ( ( 4% ) * 0.6666 ) );'><div class=\"fusion-column-wrapper\" style=\"padding: 0px 0px 0px 0px;background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;\"   data-bg-url=\"\"><style type=\"text\/css\"><\/style><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"margin-top:0px;margin-bottom:30px;\"><h3 class=\"title-heading-left\" style=\"margin:0;color:#d20000;\">Semester 2 \/ ECTS Credits: 6 ECTS<\/h3><\/div><div class=\"fusion-text\"><h3><strong>Course Description:<\/strong><\/h3>\n<p>The main objective of this course is to give a short and focused introduction to Integrated Systems of Information Security, with particular emphasis on Cybersecurity and the Security Operations Centers (SOCs).<\/p>\n<p>Students will gain comprehensive knowledge and practical skills of the topic covered with the theories, concepts, and hands-on exercises.<\/p>\n<p>Throughout this course, integration capability and matures levels model of SOC (SOC-CMMi) will discussed in conjunction to different types of SOC and its basic elements (personnel, business processes, technologies, tools, and platforms).<\/p>\n<p>Also, different SOC implementation will be presented with practical examples of integration practices in the SAD, the Germany, and the Croatia, also in the EU and the NATO. It will cover SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation, and Response) in the field of Integrated Systems of Information Security.<\/p>\n<p>A overview and the goal of the simulation exercise in field of the Cyber Security will be explained via these practical examples: the Cyber Shield 2019, the Cyber Coalition, and the Trident Juncture.<\/p>\n<p>Students will gain knowledge about the most important steps in build the Security Operations Centre and examples of best practices.<\/p>\n<p>Practical skills will be obtained during lab work using Splunk as an SOC investigative tool by working on real-life scenarios.<\/p>\n<h3><strong>Learning Outcomes:<\/strong><\/h3>\n<ol>\n<li>Understand the terminology from \/ (in) the field of the Integrated Systems of Information Security.<\/li>\n<li>Compare different methods, architects, and types of Integrated Systems of Information Security.<\/li>\n<li>Independently collect, analysis, and visualization of data in SOC..<\/li>\n<li>Apply tools for management of Integrated Systems of Information Security.<\/li>\n<li>Assessment capability and matures levels of Integrated Systems of Information Security.<\/li>\n<li>Understand the organization and activities in the cyberspace.<\/li>\n<\/ol>\n<h3><strong>Course content lectures:<\/strong><\/h3>\n<ol>\n<li>Introduction to the Integrated Systems of Information Security<\/li>\n<li>Integrated Systems of Information security<\/li>\n<li>Cyber Security as a part of the Homeland Security<\/li>\n<li>The Security Operations Center (SOC)<\/li>\n<li>The Personnel in the SOC<\/li>\n<li>The Business Processes in the SOC<\/li>\n<li>The Technologies, Tools, and Platforms in the SOC<\/li>\n<li>The Security Information and Event Management (SIEM)<\/li>\n<li>The Program Tool; SPLUNK<\/li>\n<li>Integration capabilities and matures levels model of the SOC<\/li>\n<li>The Security Orchestration, and Automation, and Response (SOAR)<\/li>\n<li>The SOC in EU and NATO<\/li>\n<li>The organization of SOC in the USA, the Germany, and the Croatia<\/li>\n<li>The Exercises in field of the Cyber Security in the Cyberspace<\/li>\n<li>The Examples of best practices in the SOC<\/li>\n<\/ol>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><style type=\"text\/css\">.fusion-fullwidth.fusion-builder-row-1 a:not(.fusion-button):not(.fusion-builder-module-control):not(.fusion-social-network-icon):not(.fb-icon-element):not(.fusion-countdown-link):not(.fusion-rollover-link):not(.fusion-rollover-gallery):not(.fusion-button-bar):not(.add_to_cart_button):not(.show_details_button):not(.product_type_external):not(.fusion-quick-view):not(.fusion-rollover-title-link):not(.fusion-breadcrumb-link) , .fusion-fullwidth.fusion-builder-row-1 a:not(.fusion-button):not(.fusion-builder-module-control):not(.fusion-social-network-icon):not(.fb-icon-element):not(.fusion-countdown-link):not(.fusion-rollover-link):not(.fusion-rollover-gallery):not(.fusion-button-bar):not(.add_to_cart_button):not(.show_details_button):not(.product_type_external):not(.fusion-quick-view):not(.fusion-rollover-title-link):not(.fusion-breadcrumb-link):before, .fusion-fullwidth.fusion-builder-row-1 a:not(.fusion-button):not(.fusion-builder-module-control):not(.fusion-social-network-icon):not(.fb-icon-element):not(.fusion-countdown-link):not(.fusion-rollover-link):not(.fusion-rollover-gallery):not(.fusion-button-bar):not(.add_to_cart_button):not(.show_details_button):not(.product_type_external):not(.fusion-quick-view):not(.fusion-rollover-title-link):not(.fusion-breadcrumb-link):after {color: #d20000;}.fusion-fullwidth.fusion-builder-row-1 a:not(.fusion-button):not(.fusion-builder-module-control):not(.fusion-social-network-icon):not(.fb-icon-element):not(.fusion-countdown-link):not(.fusion-rollover-link):not(.fusion-rollover-gallery):not(.fusion-button-bar):not(.add_to_cart_button):not(.show_details_button):not(.product_type_external):not(.fusion-quick-view):not(.fusion-rollover-title-link):not(.fusion-breadcrumb-link):hover, .fusion-fullwidth.fusion-builder-row-1 a:not(.fusion-button):not(.fusion-builder-module-control):not(.fusion-social-network-icon):not(.fb-icon-element):not(.fusion-countdown-link):not(.fusion-rollover-link):not(.fusion-rollover-gallery):not(.fusion-button-bar):not(.add_to_cart_button):not(.show_details_button):not(.product_type_external):not(.fusion-quick-view):not(.fusion-rollover-title-link):not(.fusion-breadcrumb-link):hover:before, .fusion-fullwidth.fusion-builder-row-1 a:not(.fusion-button):not(.fusion-builder-module-control):not(.fusion-social-network-icon):not(.fb-icon-element):not(.fusion-countdown-link):not(.fusion-rollover-link):not(.fusion-rollover-gallery):not(.fusion-button-bar):not(.add_to_cart_button):not(.show_details_button):not(.product_type_external):not(.fusion-quick-view):not(.fusion-rollover-title-link):not(.fusion-breadcrumb-link):hover:after {color: #d20000;}.fusion-fullwidth.fusion-builder-row-1 .pagination a.inactive:hover, .fusion-fullwidth.fusion-builder-row-1 .fusion-filters .fusion-filter.fusion-active a {border-color: #d20000;}.fusion-fullwidth.fusion-builder-row-1 .pagination .current {border-color: #d20000; background-color: #d20000;}.fusion-fullwidth.fusion-builder-row-1 .fusion-filters .fusion-filter.fusion-active a, .fusion-fullwidth.fusion-builder-row-1 .fusion-date-and-formats .fusion-format-box, .fusion-fullwidth.fusion-builder-row-1 .fusion-popover, .fusion-fullwidth.fusion-builder-row-1 .tooltip-shortcode {color: #d20000;}#main .fusion-fullwidth.fusion-builder-row-1 .post .blog-shortcode-post-title a:hover {color: #d20000;}<\/style>\n","protected":false},"excerpt":{"rendered":"<p>Semester 2 \/ ECTS Credits: 6 ECTS<\/p>\n","protected":false},"author":1,"featured_media":2416,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[20],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Integrated Systems of Information Security - TVZ - Information Security and Digital Forensics<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/17\/integrated-systems-of-information-security\/\" \/>\n<meta property=\"og:locale\" content=\"hr_HR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Integrated Systems of Information Security - TVZ - Information Security and Digital Forensics\" \/>\n<meta property=\"og:description\" content=\"Semester 2 \/ ECTS Credits: 6 ECTS\" \/>\n<meta property=\"og:url\" content=\"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/17\/integrated-systems-of-information-security\/\" \/>\n<meta property=\"og:site_name\" content=\"TVZ - Information Security and Digital Forensics\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-17T07:05:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-04-07T11:49:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/03\/semester_2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Napisao\/la\" \/>\n\t<meta name=\"twitter:data1\" content=\"webadmin1\" \/>\n\t<meta name=\"twitter:label2\" content=\"Procijenjeno vrijeme \u010ditanja\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minuta\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/isf.tvz.hr\/#website\",\"url\":\"https:\/\/isf.tvz.hr\/\",\"name\":\"TVZ - Information Security and Digital Forensics\",\"description\":\"Study Programme\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/isf.tvz.hr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"hr\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/17\/integrated-systems-of-information-security\/#primaryimage\",\"inLanguage\":\"hr\",\"url\":\"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/03\/semester_2.jpg\",\"contentUrl\":\"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/03\/semester_2.jpg\",\"width\":800,\"height\":400},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/17\/integrated-systems-of-information-security\/#webpage\",\"url\":\"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/17\/integrated-systems-of-information-security\/\",\"name\":\"Integrated Systems of Information Security - TVZ - Information Security and Digital Forensics\",\"isPartOf\":{\"@id\":\"https:\/\/isf.tvz.hr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/17\/integrated-systems-of-information-security\/#primaryimage\"},\"datePublished\":\"2020-03-17T07:05:21+00:00\",\"dateModified\":\"2020-04-07T11:49:34+00:00\",\"author\":{\"@id\":\"https:\/\/isf.tvz.hr\/#\/schema\/person\/10016457ba19578af899f6dfefacbf35\"},\"breadcrumb\":{\"@id\":\"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/17\/integrated-systems-of-information-security\/#breadcrumb\"},\"inLanguage\":\"hr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/17\/integrated-systems-of-information-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/17\/integrated-systems-of-information-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/isf.tvz.hr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Integrated Systems of Information Security\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/isf.tvz.hr\/#\/schema\/person\/10016457ba19578af899f6dfefacbf35\",\"name\":\"webadmin1\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/isf.tvz.hr\/#personlogo\",\"inLanguage\":\"hr\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ea28ae2a1a9b191433250aaaffa620a3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ea28ae2a1a9b191433250aaaffa620a3?s=96&d=mm&r=g\",\"caption\":\"webadmin1\"},\"url\":\"https:\/\/isf.tvz.hr\/index.php\/author\/webadmin1\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Integrated Systems of Information Security - TVZ - Information Security and Digital Forensics","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/17\/integrated-systems-of-information-security\/","og_locale":"hr_HR","og_type":"article","og_title":"Integrated Systems of Information Security - TVZ - Information Security and Digital Forensics","og_description":"Semester 2 \/ ECTS Credits: 6 ECTS","og_url":"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/17\/integrated-systems-of-information-security\/","og_site_name":"TVZ - Information Security and Digital Forensics","article_published_time":"2020-03-17T07:05:21+00:00","article_modified_time":"2020-04-07T11:49:34+00:00","og_image":[{"width":800,"height":400,"url":"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/03\/semester_2.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Napisao\/la":"webadmin1","Procijenjeno vrijeme \u010ditanja":"6 minuta"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/isf.tvz.hr\/#website","url":"https:\/\/isf.tvz.hr\/","name":"TVZ - Information Security and Digital Forensics","description":"Study Programme","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/isf.tvz.hr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"hr"},{"@type":"ImageObject","@id":"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/17\/integrated-systems-of-information-security\/#primaryimage","inLanguage":"hr","url":"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/03\/semester_2.jpg","contentUrl":"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/03\/semester_2.jpg","width":800,"height":400},{"@type":"WebPage","@id":"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/17\/integrated-systems-of-information-security\/#webpage","url":"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/17\/integrated-systems-of-information-security\/","name":"Integrated Systems of Information Security - TVZ - Information Security and Digital Forensics","isPartOf":{"@id":"https:\/\/isf.tvz.hr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/17\/integrated-systems-of-information-security\/#primaryimage"},"datePublished":"2020-03-17T07:05:21+00:00","dateModified":"2020-04-07T11:49:34+00:00","author":{"@id":"https:\/\/isf.tvz.hr\/#\/schema\/person\/10016457ba19578af899f6dfefacbf35"},"breadcrumb":{"@id":"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/17\/integrated-systems-of-information-security\/#breadcrumb"},"inLanguage":"hr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/isf.tvz.hr\/index.php\/2020\/03\/17\/integrated-systems-of-information-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/17\/integrated-systems-of-information-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/isf.tvz.hr\/"},{"@type":"ListItem","position":2,"name":"Integrated Systems of Information Security"}]},{"@type":"Person","@id":"https:\/\/isf.tvz.hr\/#\/schema\/person\/10016457ba19578af899f6dfefacbf35","name":"webadmin1","image":{"@type":"ImageObject","@id":"https:\/\/isf.tvz.hr\/#personlogo","inLanguage":"hr","url":"https:\/\/secure.gravatar.com\/avatar\/ea28ae2a1a9b191433250aaaffa620a3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ea28ae2a1a9b191433250aaaffa620a3?s=96&d=mm&r=g","caption":"webadmin1"},"url":"https:\/\/isf.tvz.hr\/index.php\/author\/webadmin1\/"}]}},"_links":{"self":[{"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/posts\/2187"}],"collection":[{"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/comments?post=2187"}],"version-history":[{"count":6,"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/posts\/2187\/revisions"}],"predecessor-version":[{"id":2514,"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/posts\/2187\/revisions\/2514"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/media\/2416"}],"wp:attachment":[{"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/media?parent=2187"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/categories?post=2187"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/tags?post=2187"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}