Sök i programutbudet

Använd sökfunktionen för att leta efter kurser och program i Chalmers utbildningsutbud. Den programplan och utbildningsplan som avser dina studier är i allmänhet från det läsår du började dina studier.

​​​​​​​​​​​​​

Kursplan för

Läsår
EDA491 - Network security
 
Kursplanen fastställd 2012-02-18 av programansvarig (eller motsvarande)
Ägare: MPCSN
7,5 Poäng
Betygskala: TH - Fem, Fyra, Tre, Underkänt
Utbildningsnivå: Avancerad nivå
Huvudområde: Datateknik, Informationsteknik
Institution: 37 - DATA- OCH INFORMATIONSTEKNIK


Undervisningsspråk: Engelska
Sökbar för utbytesstudenter
Blockschema: B

Modul   Poängfördelning   Tentamensdatum
Lp1 Lp2 Lp3 Lp4 Sommarkurs Ej Lp
0107 Tentamen 6,0 hp Betygskala: TH   6,0 hp   27 Maj 2013 fm M,  15 Jan 2013 em V,  30 Aug 2013 em V
0207 Laboration 1,5 hp Betygskala: UG   1,5 hp    

I program

TKITE INFORMATIONSTEKNIK, CIVILINGENJÖR, Årskurs 3 (valbar)
MPCOM COMMUNICATION ENGINEERING, MSC PROGR, Årskurs 1 (obligatoriskt valbar)
MPCSN COMPUTER SYSTEMS AND NETWORKS, MSC PROGR, Årskurs 1 (obligatoriskt valbar)

Examinator:

Docent  Tomas Olovsson


Ersätter

EDA490   Nätverkssäkerhet

Kursutvärdering:

http://document.chalmers.se/doc/b8dbf1bc-4908-4858-a742-6951dc4adc2b


  Gå till kurshemsida

Behörighet:

För kurser inom Chalmers utbildningsprogram gäller samma behörighetskrav som till de(t) program kursen ingår i.

Kursspecifika förkunskaper

The course EDA343 Computer communication or equivalent is required. A course in computer security is recommended but not required.

Syfte

Almost all computer systems and applications today are highly distributed and use networks for communication and network security has therefore become an increasingly important topic. Knowledge about possible threats and countermeasures are important not only for the network security specialist but also for application programmers and everyone who wants to be able to assess and evaluate the level of security a system or application can offer. This course covers the underlying principles and techniques for network and communication security. Practical examples of security problems and principles for countermeasures are given. The course also surveys cryptographic and other tools used to provide security and reviews how these tools are utilized in protocols and applications.

Lärandemål (efter fullgjord kurs ska studenten kunna)


* Have a good understanding of how applications can communicate securely and what tools and protocols exist in order to offer different levels of security
* Have detailed knowledge and the ability to critically analyse and design secure networks, applications and systems
* Have a fundamental understanding of what makes systems vulnerable and be able to predict new attack methods before they become a reality
* Have the knowledge to evaluate protocols and ability to draw conclusions about the level of security they can offer
* Understand what impact the selection of different protocols and security architectures can have to an application or a system

Innehåll

The course covers many topics related to communications and network security:

* Network attacks, encryption and random number generation
* Analysis of weaknesses and attacks against common protocols such as TCP, UDP, IP, and ICMP
* Denial of service (DoS) attacks, host and network scanning and operating system fingerprinting
* Access control, authentication mechanisms, passwords, Radius, AAA, PKI, key distribution, Kerberos
* Identity management, certificates, X.509, certificate revocation, LDAP
* Security protocols such as IPSec , SSL and SSH
* Security in wireless networks, WEP, WPA, WPA2, IEEE 802.1X, EAP
* Network design, firewalls, proxies, NAT, ingress and egress filtering
* Virtual private networks (VPN), tunnelling protocols, network segmentation and remote access
* Link level security, VLAN technology, security in ARP, DHCP and DNS


Organisation

The course consists of a series of lectures and laborative exercises. The laborative exercises gives a deeper understanding of network security weaknesses and protection tools by working with network scanning, configuring firewalls and intrusion detection systems (IDS) and practical work with analysing the SSL protocol.

Litteratur

See separate literature list on course home page.

Examination

Written exam and passed laboratory exercises.


Sidansvarig Publicerad: on 24 jan 2018.