Search course

Use the search function to find more information about the study programmes and courses available at Chalmers. When there is a course homepage, a house symbol is shown that leads to this page.

Graduate courses

Departments' graduate courses for PhD-students.

​​​​
​​

Syllabus for

Academic year
EDA490 - Network security
 
Owner: TDATA
4,0 Credits (ECTS 6)
Grading: TH - Five, Four, Three, Not passed
Level: C
Department: 37 - COMPUTER SCIENCE AND ENGINEERING


Teaching language: Swedish

Course module   Credit distribution   Examination dates
Sp1 Sp2 Sp3 Sp4 No Sp
0104 Laboratory 1,0c Grading: UG   1,0c    
0204 Examination 3,0c Grading: TH   3,0c   21 Dec 2006 pm V,  12 Apr 2007 am V,  Contact examiner

In programs

TITEA SOFTWARE ENGINEERING, Year 4 (elective)
TITEA SOFTWARE ENGINEERING, Year 3 (elective)
DCMAS MSc PROGR IN DEPENDABLE COMPUTER SYSTEMS - Dependable Programming, Year 1 (elective)
DCMAS MSc PROGR IN DEPENDABLE COMPUTER SYSTEMS - Dependable Architectures, Year 1 
TDATA COMPUTER SCIENCE AND ENGINEERING - Engineering of Computer-Based Systems, Year 4 (elective)
TDATA COMPUTER SCIENCE AND ENGINEERING - Communications System, Year 4 (elective)
TDATA COMPUTER SCIENCE AND ENGINEERING - Computer security, Year 4 (compulsory)

Examiner:

Docent  Tomas Olovsson



Eligibility:

For single subject courses within Chalmers programmes the same eligibility requirements apply, as to the programme(s) that the course is part of.

Course specific prerequisites

Prior courses in Datacommunication and Computer security are presupposed.

Aim

The course aims to cover those aspects of network security, that have not been covered in previous courses. The emphasis is on the underlying principles and techniques, focusing in particular on the security aspects of networking, the Internet, the web and wireless networks. Practical applications of the techniques and principles are given. It surveys cryptographic and other tools used to provide security and reviews how these tools are utilized in protocols and applications. The course will give the student the necessary knowledge to critically analyze and design secure networks.

Goal

After completing the course, the students shall be able to analyze a network with respect to security and reliability and understand what problems different protocols and architectures can cause. The course also looks at application security and how an applications way to communicate can affect the overall security level it can offer and what possible tools exist for the application to offer different levels of security.

The course contains practical examples where existing vulnerabilities are examined to make it possible for the students after the course to draw their own conclusions and understand what makes systems vulnerable and even be able to predict new attack methods before they become a reality.

Content

Introduction to network security, network attacks, encryption and random number generation

Analysis of weaknesses and attacks against common protocols such as TCP, UDP, IP, and ICMP, denial of service (DOS) attacks. Scanning and operating system fingerprinting

Access control, authentication mechanisms, passwords, Radius, AAA, PKI, key distribution, Kerberos

Identity management, certificates, X.509, revocation, smart cards, LDAP, OCSP

Security protocols such as IPSec , SSL and SSH

Security in wireless networks, WEP, WPA, IEEE 802.1x, EAP, TKIP

Network design, firewalls, packet filters, proxies, NAT, tunneling, ingress and egress filtering

Virtual private networks (VPN), tunneling protocols, segmentation and remote access

Logs, alarms, syslog, SNMP

Link level security, VLAN technology, security in ARP, DHCP and DNS

Organisation

The course consists of a series of lectures and laborative exercises. The laborative exercises focus on network scanning and study of common security protocols such as SSL.

Literature

Please see course home page for details.

Examination

Written exam and pass on laboratory exercises.


Page manager Published: Thu 04 Feb 2021.