Course: Computer Network Security

« Back
Course title Computer Network Security
Course code KMI/BEPS
Organizational form of instruction Lecture + Exercise
Level of course Master
Year of study 1
Semester Summer
Number of ECTS credits 4
Language of instruction Czech
Status of course Compulsory, Compulsory-optional, Optional
Form of instruction Face-to-face
Work placements This is not an internship
Recommended optional programme components None
Lecturer(s)
  • Trnečka Martin, RNDr. Ph.D.
  • Outrata Jan, doc. Mgr. Ph.D.
  • Trnečková Markéta, Mgr. Ph.D.
  • Janoštík Radek, Mgr. Ph.D.
  • Panchártek Karel, MDDr.
Course content
The course begins with the introduction to the security of TCP/IP networks in general and the methods of network scanning including demonstration of various attacks. Examination of methods of (Internet) network securing going from traffic filtration, over proxies and address translation, firewall, so far to tunnelling and VPN, then the introduction to electronic certificates and PKI infrastructure, its application, and in the end of the course the selected encrypted aplication protocols like eg. IPsec, DNSSec, SSL/TLS (OpenSSL) or SSH are covered. In practices students first try to do some simple attack on non-secured (local) network and then they learn how to apply the methods of its securing and deploying secured protocols. 1. Intro: intro to cryptography and authentization, network secutiry (TCP/IP) in general, attacks (DoS), detection of attacks (IDS) 2. Security of network technologies: network scanning (Wireshark, nmap), data integrity, attacks, wireless networks (WiFi), tunnelling, VPN 3. Internet security: filtration, proxies, address translation (NAT), firewall and DMZ 4. Internet security: tunnelling, VPN, aplication proxies and gates, SOCKS 5. PKI infrastructure: certificates, certificate authorities and PKI infrastructure 6. Application of PKI: elektronic signature and banking 7. Encrypted and authentization protocols: IPsec, RADIUS, LDAP, Kerberos, DNSSec 8. Encrypted and authentization protokols: SSL/TLS (OpenSSL), S/MIME, SSH

Learning activities and teaching methods
Lecture, Demonstration
Learning outcomes
The students become familiar with basic concepts of computer network security.
3. Application: your knowledge in securing a computer network.
Prerequisites
unspecified

Assessment methods and criteria
Oral exam, Written exam

Active participation in class. Completion of assigned homeworks. Passing the oral (or written) exam.
Recommended literature
  • Barken L. (2004). Wi-Fi: jak zabezpečit bezdrátovou síť (How secure is your wireless network?). Computer Press.
  • Cole E. (2009). Network Security Bible. Wiley.
  • Dostálek L. a kolektiv. (2003). Velký průvodce protokoly TCP/IP: Bezpečnost (2. aktualizované vydání). Computer Press.
  • Dostálek L., Vohnoutová M. (2010). Velký průvodce infrastrukturou PKI a technologií elektronického podpisu (2. aktualizované vydání). Computer Press.
  • Kizza J. M. (2005). Computer network security. Springer.
  • Kretchmar J. M., Dostálek L. (2004). Administrace a diagnostika sítí pomocí OpenSource utilit a nástrojů (Open source network administration). Computer Press.
  • Orebaugh A. (2008). Wireshark a Ethereal: kompletní průvodce analýzou a diagnostikou sítí (Wireshark & Ethereal network protocol analyzer toolkit). Computer Press.
  • Satrapa P. (2019). Internetový protokol IPv6 (4. vydání). CZ.NIC.
  • Scambray J., McClure S., Kurtz G. (2001). acking bez tajemství (Hacking exposed : network security secrets and solutions). Computer Press.
  • William Stallings. (2016). Network Security Essentials: Applications and Standards (6th Edition). Pearson.
  • Wm. Arthur Conklin, Greg White, Chuck Cothren, Roger L. Davis, Dwayne Williams. (2015). Principles of Computer Security, Fourth Edition (Official Comptia Guide) 4th Edition. McGraw-Hill Education.


Study plans that include the course
Faculty Study plan (Version) Category of Branch/Specialization Recommended year of study Recommended semester
Faculty: Faculty of Science Study plan (Version): Computer Science - Specialization in Artificial Intelligence (2020) Category: Informatics courses 1 Recommended year of study:1, Recommended semester: Summer
Faculty: Faculty of Science Study plan (Version): Applied Computer Science - Specialization in Software Development (2024) Category: Informatics courses 1 Recommended year of study:1, Recommended semester: Summer
Faculty: Faculty of Science Study plan (Version): Computer Science - Specialization in General Computer Science (2020) Category: Informatics courses 1 Recommended year of study:1, Recommended semester: Summer
Faculty: Faculty of Science Study plan (Version): Teaching Training in Computer Science for Secondary Schools (2019) Category: Pedagogy, teacher training and social care 1 Recommended year of study:1, Recommended semester: Summer
Faculty: Faculty of Science Study plan (Version): Applied Computer Science - Specialization in Computer Systems and Technologies (2024) Category: Informatics courses 1 Recommended year of study:1, Recommended semester: Summer