Course details
Security and Computer Networks
IBS Acad. year 2024/2025 Summer semester 4 credits
Secure Communication on the L2 Layer. Certificates and Digital Signature. Attacks in Computer Networks. Security Protocols, their Analysis, Verification and Design. Application of Security Protocols. Security on the L3 Layer. IPsec and VPN. Security of Network Services. IDS and IPS Systems. Security of Wireless Networks. Security of Sensor Networks.
Guarantor
Course coordinator
Language of instruction
Completion
Time span
- 26 hrs lectures
- 6 hrs laboratories
- 7 hrs projects
Assessment points
- 60 pts final exam (2 pts written part, 6 pts test part)
- 20 pts mid-term test (1 pts written part, 6 pts test part)
- 20 pts projects
Department
Lecturer
Instructor
Learning objectives
The goal of this course is to inform students about the basic principles of network and systems security and relevant protocols and standards. Students are learned to design and manage security technologies.
Student is able to configure secure communication between computers. They have an overview of authentication principles and secure network services and they are able to manage them: SSH, VPN, email services, etc. They have an overview of security technologies used in wireless and sensor networks. Students are able to design and implement secure communication. Students are able to read standards and use them for project implementation.
Recommended prerequisites
Prerequisite knowledge and skills
- Basic skills of operation systems Unix, Windows
- Ability to read study texts in English (standards, RFC documents).
- The architecture of computer networks (ISO/OSI, TCP/IP).
- Overview of link layer protocols and network layer protocols.
Study literature
- Kurose, James F.: Computer networking : a top-down approach. 7th ed., Pearson, Essex, 2017, ISBN 978-1-292-15359-9
- Stallings, W.: Network security essentials : applications and standards. Hoboken, 2016, 978-0-13-452733-8.
- Anderson, Ross J.: Security Engineering: A Guide to Building Dependable Distributed Systems. John Wiley & Sons Inc, 2001, ISBN 0-471-38922-6.
Syllabus of lectures
- Introduction. Overview of computer security.
- Security of the L2 layer (802.1x, PAP, CHAP).
- Certificates. Digital signature (PKI, TKPI). Certification authority. Authentication and authorization in computer networks AAA.
- Attacks in computer networks.
- Security protocols, their analysis and verification.
- Design of security protocols and their application. Payment protocols.
- Security of L3 layer. IPsec and VPN.
- Security of network services. Secure transport (SSL, TLS). Security on the application layer.
- Firewalls. IDS and IPS systems.
- Security of wireless and mobile networks. WEP, WPA.
- Security of sensor networks. ZigBee.
- Security in practice.
- Modern trends of networks security. Course summary.
Syllabus of laboratory exercises
- Practical analysis of security protocol.
- Practical implementation of secure communication.
- Administration of secure communication (SSH, stunel, pgp). Creation of VPN connections. Secure connections testing.
Syllabus - others, projects and individual work of students
Practical analysis of security protocol. Practical implementation and administration of secure communication.
Progress assessment
Mid-term exam and project realization. Exam prerequisites: Students need to earn at least a half of all points during the semester.
Mid-term exam and project realization.
Schedule
Day | Type | Weeks | Room | Start | End | Capacity | Lect.grp | Groups | Info |
---|---|---|---|---|---|---|---|---|---|
Mon | laboratory | lectures | N105 | 09:00 | 10:50 | 20 | 2BIA 2BIB 3BIT | xx | Veselý |
Mon | laboratory | lectures | N105 | 11:00 | 12:50 | 20 | 2BIA 2BIB 3BIT | xx | Veselý |
Mon | laboratory | lectures | N105 | 13:00 | 14:50 | 20 | 2BIA 2BIB 3BIT | xx | Veselý |
Mon | lecture | lectures | G202 | 17:00 | 18:50 | 80 | 2BIA 2BIB 3BIT | xx | Veselý |
Course inclusion in study plans
- Programme BIT, 2nd year of study, Elective
- Programme BIT (in English), 2nd year of study, Elective