Faculty of Information Technology, BUT

Course details

Security and Computer Networks

IBS Acad. year 2018/2019 Summer semester 4 credits

Secure Communication on the L2 Layer. Certificates and Digital Signature. Attacks in Computer Networks. Security Protocols, their Analysis, Verification and Design. Application of Security Protocols. Security on the L3 Layer. IPsec and VPN. Security of Network Services. IDS and IPS Systems. Security of Wireless Networks. Security of Sensor Networks.

Guarantor

Deputy Guarantor

Language of instruction

Czech

Completion

Credit+Examination (written)

Time span

26 hrs lectures, 6 hrs laboratories, 7 hrs projects

Assessment points

60 exam, 20 half-term test, 20 projects

Department

Lecturer

Instructor

Subject specific learning outcomes and competences

Student are able to configure secure communication between computers. They have an overview of authentication principles and secure network services and they are able to manage them: SSH, VPN, email services, etc. They have overview of security technologies used in wireless and sensor networks. Students are able to design and implement secure communication. Students are able to read standards and use them for project implementation.

Learning objectives

The goal of this course is to inform students about basic principles of network and systems security and relevant protocols and standards. Students are learned to design and manage security technologies.

Why is the course taught

Complementing for IT graduates to understand the principles of computer network security, i.e. how the security mechanisms in computer networks work, how they are configured.

Prerequisites

Prerequisite kwnowledge and skills

  • Basic skills of operation systems Unix, Windows
  • Ability to read study texts in English (standards, RFC documents).
  • Architecture of computer networks (ISO/OSI, TCP/IP).
  • Overview of link layer protocols and network layer protocols.

Study literature

  • Lecture notes in electronic form.

Fundamental literature

  • Kurose, James F.: Computer networking : a top-down approach. 7th ed., Pearson, Essex, 2017, ISBN 978-1-292-15359-9
  • Stallings, W.: Network security essentials : applications and standards. Hoboken, 2016, 978-0-13-452733-8.
  • Schneider, S.A., Ryan, P.Y.A.: Modelling and Analysis of Security Protocols. Addison Wesley, Boston, 2000, ISBN 0-201-67471-8.
  • Bishop, M.: Computer security: Art & Science. Addison-Wesley, Boston, 2003, ISBN 0-201-44099-7.
  • Anderson, Ross J.: Security Engineering: A Guide to Building Dependable Distributed Systems. John Wiley & Sons Inc, 2001, ISBN 0-471-38922-6.
  • Menezes, A. J., Oorschot, P.C. van, Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, 1996, ISBN 0-8493-8523-7, http://www.cacr.math.uwaterloo.ca/hac/
  • Tanenbaum, A.S.: Computer Networks. Fourth Edition, Prentice Hall, 2003, ISBN 0-13-066102-3.
  • Standardy IETF RFC.

Syllabus of lectures

  1. Introduction. Overview of computer security.
  2. Security of L2 layer (802.1x, PAP, CHAP).
  3. Certificates. Digital signature (PKI, TKPI). Certification authority. Authentication and authorization in computer networks AAA.
  4. Attacks in computer networks.
  5. Security protocols, their analysis and verification.
  6. Design of security protocols and their application. Payment protocols.
  7. Security of L3 layer. IPsec and VPN.
  8. Security of network services. Secure transport (SSL, TLS). Security on the application layer.
  9. Firewalls. IDS and IPS systems.
  10. Security of wireless and mobile networks. WEP, WPA.
  11. Security of sensor networks. ZigBee.
  12. Security in practice.
  13. Modern trends of networks security. Course summary.

Syllabus - others, projects and individual work of students

Practical analysis of security protocol. Practical implementation and administration of secure communication.

Progress assessment

Mid-term exam and project realization.

Controlled instruction

Mid-term exam and project realization.

Exam prerequisites

Students need to earn at least a half of all points during the semester.

Schedule

DayTypeWeeksRoomStartEndLect.grpGroupsInfo
Monotherlectures N104 09:0010:50Konzultace
Monlaboratory9., 10., 13. of lectures O205 13:0014:50
Monexam2019-05-06 A112 14:0015:50 2BIA 2BIB 3BIT řádná
Monlaboratory9., 10., 13. of lectures O205 15:0016:50
Monlecturelectures A112 17:0018:50 2BIA 2BIB 3BIT xx
Monotherlectures A112 19:0019:50Konzultace
Thuexam2019-05-23 E105 16:0017:50 2BIA 2BIB 3BIT 1. oprava
Friexam2019-05-31 E104 13:0014:50 2BIA 2BIB 3BIT 2. oprava

Course inclusion in study plans

  • Programme BIT, 2nd year of study, Elective
  • Programme IT-BC-3, field BIT, any year of study, Elective
  • Programme IT-BC-3, field BIT, 2nd year of study, Elective
Back to top