Network Security
Code | Completion | Credits | Range | Language |
---|---|---|---|---|
MI-SIB | Z,ZK | 4 | 2+1 | Czech |
- Lecturer:
- Rudolf Blažek (gar.)
- Tutor:
- Rudolf Blažek (gar.)
- Supervisor:
- Department of Computer Systems
- Synopsis:
-
The students will gain theoretical and practical experience with technologies and systems for detection of intrusions in large-scale high-speed networks. They will also learn basic concepts of statistical modeling of communication protocols. Students will also gain basic theoretical and practical skills required to perform realistic simulations of computer networks. They will also be introduced to basic psychological aspects of network security and the role of the human factor in attacks on information systems.
- Requirements:
-
Basic general knowledge about the functioning of computer networks and systems. Basics from probability and statistics. Programming in any computer language.
- Syllabus of lectures:
-
1. Selected network protocols and their security aspects.
2. Basic cryptography for protection of communication protocols.
3. Technical and sociological methods of attacks on information networks and systems.
4. Technologies and systems for detection and prevention of network intrusions.
5. Monitoring of network traffic in high-speed networks.
6. Basic probabilistic aspects of modeling large-scale high-speed networks.
7. Realistic simulations of information networks.
8. Statistical methods for detection of network intrusions.
- Syllabus of tutorials:
- Study Objective:
-
he goal of the course is to teach the students basic security aspects of communication protocols in wired, optical, and wireless networks. Emphasis is put on detection and prevention of attacks on resources and information systems in wired computer networks.
- Study materials:
-
1. Kaufman, Perlman & Speciner, Network Security, Private Communication in a Public World, 2nd Edition. Prentice Hall, 2002, ISBN: 0130460192.
2. Stallings, Cryptography and Network Security: Principles and Practice', 5th Edition. Prentice Hall, 2010, ISBN: 0-13-869017-0.
3. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems, Wiley Publishing, 2008, ISBN: 0470068523.
4. Mitnick, Simon, Wozniak, The Art of Deception: Controlling the Human Element of Security, Wiley, 2003, ISBN: 076454280X.
- Note:
- Time-table for winter semester 2011/2012:
-
06:00–08:0008:00–10:0010:00–12:0012:00–14:0014:00–16:0016:00–18:0018:00–20:0020:00–22:0022:00–24:00
Mon Tue Fri Thu Fri - Time-table for summer semester 2011/2012:
- Time-table is not available yet
- The course is a part of the following study plans:
-
- Computer Security, Version for Students who Enrolled in 2010, Presented in Czech (compulsory course of the specialization)
- Computer Systems and Networks, Version for Students who Enrolled in 2010, Presented in Czech (compulsory course of the specialization)
- Master Informatics, Version for Students who Enrolled in 2010, Presented in Czech (VO)
- Master Informatics, Presented in Czech, Version for Students who Enrolled in 2011 (VO)
- Computer Security, Presented in Czech, Version for Students who Enrolled in 2011 (compulsory course of the specialization)
- Computer Systems and Networks, Presented in Czech, Version for Students who Enrolled in 2011 (compulsory course of the specialization)
- Master Informatics, Presented in Czech, Version for Students who Enrolled in 2012 (VO)
- Computer Security, Presented in Czech, Version for Students who Enrolled in 2012 (compulsory course of the specialization)
- Computer Systems and Networks, Presented in Czech, Version for Students who Enrolled in 2012 (compulsory course of the specialization)