Search programme

​Use the search function to search amongst programmes at Chalmers. The study programme and the study programme syllabus relating to your studies are generally from the academic year you began your studies.

Syllabus for

Academic year
EDA491 - Network security  
Nätverkssäkerhet
 
Syllabus adopted 2015-02-10 by Head of Programme (or corresponding)
Owner: MPCSN
7,5 Credits
Grading: TH - Five, Four, Three, Fail
Education cycle: Second-cycle
Major subject: Computer Science and Engineering, Information Technology
Department: 37 - COMPUTER SCIENCE AND ENGINEERING


Teaching language: English
Open for exchange students: Yes
Block schedule: B+

Course elements   Credit distribution   Examination dates
Sp1 Sp2 Sp3 Sp4 Summer course No Sp
0107 Examination 6,0c Grading: TH   6,0c   03 Jun 2019 am M   12 Oct 2018 pm M   30 Aug 2019 pm SB_M  
0207 Laboratory 1,5c Grading: UG   1,5c    

In programs

MPCOM COMMUNICATION ENGINEERING, MSC PROGR, Year 1 (compulsory elective)
MPCSN COMPUTER SYSTEMS AND NETWORKS, MSC PROGR, Year 1 (compulsory elective)
MPSOF SOFTWARE ENGINEERING AND TECHNOLOGY, MSC PROGR, Year 1 (compulsory elective)
TKITE SOFTWARE ENGINEERING, Year 3 (elective)
MPALG COMPUTER SCIENCE - ALGORITHMS, LANGUAGES AND LOGIC, MSC PROGR, Year 1 (elective)

Examiner:

Tomas Olovsson

  Go to Course Homepage

Replaces

EDA490   Network security


 

Eligibility:


In order to be eligible for a second cycle course the applicant needs to fulfil the general and specific entry requirements of the programme that owns the course. (If the second cycle course is owned by a first cycle programme, second cycle entry requirements apply.)
Exemption from the eligibility requirement: Applicants enrolled in a programme at Chalmers where the course is included in the study programme are exempted from fulfilling these requirements.

Course specific prerequisites

The courses EDA343 Computer communication or equivalent and EDA263 Computer security or equivalent are required.

Aim

Almost all computer systems and applications today are highly distributed and use networks for communication and network security has therefore become an increasingly important topic. Knowledge about possible threats and countermeasures are important not only for the network security specialist but also for application programmers and everyone who wants to be able to assess and evaluate the level of security a system or application can offer. This course covers the underlying principles and techniques for network and communication security. Practical examples of security problems and principles for countermeasures are given. The course also surveys cryptographic and other tools used to provide security and reviews how these tools are utilized in protocols and applications.

Learning outcomes (after completion of the course the student should be able to)

  • Have a good understanding of how applications can communicate securely and what tools and protocols exist in order to offer different levels of security
  • Have detailed knowledge and the ability to critically analyse and design secure networks, applications and systems
  • Have a fundamental understanding of what makes systems vulnerable and be able to predict new attack methods before they become a reality
  • Have enough knowledge to evaluate protocols and ability to draw conclusions about the level of security they can offer
  • Understand what impact the selection of different protocols and security architectures can have to an application or a system
  • Have an understanding of research work in the field by reading conference and research reports in related areas

Content

The course covers many topics related to communications and network security:
  • Network attacks, encryption and random number generation
  • Analysis of weaknesses and attacks against common protocols such as TCP, UDP, IP, and ICMP
  • Denial of service (DoS) attacks, host and network scanning and operating system fingerprinting
  • Access control, authentication mechanisms, passwords, Radius, AAA, PKI, key distribution, Kerberos
  • Identity management, certificates, X.509, certificate revocation, LDAP
  • Security protocols such as IPSec , SSL and SSH
  • Security in wireless networks, WEP, WPA, WPA2, IEEE 802.1X, EAP
  • Network design, firewalls, proxies, NAT, ingress and egress filtering
  • Virtual private networks (VPN), tunnelling protocols, network segmentation and remote access
  • Link level security, VLAN technology, security in ARP, DHCP and DNS

Organisation

The course consists of a series of lectures and laborative exercises. The laborative exercises gives a deeper understanding of network security weaknesses and protection tools by working with network scanning, configuring firewalls and intrusion detection systems (IDS) and practical work with analysing the SSL protocol.

Literature

A course book which is complemented with research papers and articles covering important topics in the field.
For details, see separate literature list on course home page.

Examination including compulsory elements

Written exam and passed laboratory exercises.


Published: Fri 18 Dec 2009. Modified: Mon 28 Nov 2016