Syllabus for |
|
EDA491 - Network security |
|
Syllabus adopted 2013-02-05 by Head of Programme (or corresponding) |
Owner: MPCSN |
|
7,5 Credits |
Grading: TH - Five, Four, Three, Not passed |
Education cycle: Second-cycle |
Major subject: Computer Science and Engineering, Information Technology
|
Department: 37 - COMPUTER SCIENCE AND ENGINEERING
|
Teaching language: English
Open for exchange students
Block schedule:
B
Course module |
|
Credit distribution |
|
Examination dates |
Sp1 |
Sp2 |
Sp3 |
Sp4 |
Summer course |
No Sp |
0107 |
Examination |
6,0 c |
Grading: TH |
|
|
|
|
6,0 c
|
|
|
|
26 May 2014 am M, |
13 Jan 2014 pm M, |
29 Aug 2014 pm M |
0207 |
Laboratory |
1,5 c |
Grading: UG |
|
|
|
|
1,5 c
|
|
|
|
|
In programs
MPALG COMPUTER SCIENCE - ALGORITHMS, LANGUAGES AND LOGIC, MSC PROGR, Year 1 (elective)
MPALG COMPUTER SCIENCE - ALGORITHMS, LANGUAGES AND LOGIC, MSC PROGR, Year 2 (elective)
MPCOM COMMUNICATION ENGINEERING, MSC PROGR, Year 1 (compulsory elective)
MPCSN COMPUTER SYSTEMS AND NETWORKS, MSC PROGR, Year 1 (compulsory elective)
TKITE SOFTWARE ENGINEERING, Year 3 (elective)
Examiner:
Docent
Tomas Olovsson
Replaces
EDA490
Network security
Course evaluation:
http://document.chalmers.se/doc/340fa134-3229-4d97-bf1f-2fc96c2eca50
Go to Course Homepage
Eligibility:
For single subject courses within Chalmers programmes the same eligibility requirements apply, as to the programme(s) that the course is part of.
Course specific prerequisites
The course EDA343 Computer communication or equivalent is required. The course EDA263 Computer security or equivalent is required.
Aim
Almost all computer systems and applications today are highly distributed and use networks for communication and network security has therefore become an increasingly important topic. Knowledge about possible threats and countermeasures are important not only for the network security specialist but also for application programmers and everyone who wants to be able to assess and evaluate the level of security a system or application can offer. This course covers the underlying principles and techniques for network and communication security. Practical examples of security problems and principles for countermeasures are given. The course also surveys cryptographic and other tools used to provide security and reviews how these tools are utilized in protocols and applications.
Learning outcomes (after completion of the course the student should be able to)
* Have a good understanding of how applications can communicate securely and what tools and protocols exist in order to offer different levels of security
* Have detailed knowledge and the ability to critically analyse and design secure networks, applications and systems
* Have a fundamental understanding of what makes systems vulnerable and be able to predict new attack methods before they become a reality
* Have the knowledge to evaluate protocols and ability to draw conclusions about the level of security they can offer
* Understand what impact the selection of different protocols and security architectures can have to an application or a system
Content
The course covers many topics related to communications and network security:
* Network attacks, encryption and random number generation
* Analysis of weaknesses and attacks against common protocols such as TCP, UDP, IP, and ICMP
* Denial of service (DoS) attacks, host and network scanning and operating system fingerprinting
* Access control, authentication mechanisms, passwords, Radius, AAA, PKI, key distribution, Kerberos
* Identity management, certificates, X.509, certificate revocation, LDAP
* Security protocols such as IPSec , SSL and SSH
* Security in wireless networks, WEP, WPA, WPA2, IEEE 802.1X, EAP
* Network design, firewalls, proxies, NAT, ingress and egress filtering
* Virtual private networks (VPN), tunnelling protocols, network segmentation and remote access
* Link level security, VLAN technology, security in ARP, DHCP and DNS
Organisation
The course consists of a series of lectures and laborative exercises. The laborative exercises gives a deeper understanding of network security weaknesses and protection tools by working with network scanning, configuring firewalls and intrusion detection systems (IDS) and practical work with analysing the SSL protocol.
Literature
A course book which is complemented with research papers and articles covering important topics in the field.
For details, see separate literature list on course home page.
Examination
Written exam and passed laboratory exercises.