Logo ČVUT
CZECH TECHNICAL UNIVERSITY IN PRAGUE
STUDY PLANS
2024/2025

Network Security

Login to KOS for course enrollment Display time-table
Code Completion Credits Range Language
NI-SIB Z,ZK 5 2P+1C Czech
Course guarantor:
Jiří Dostál
Lecturer:
Jiří Dostál, Martin Šutovský
Tutor:
Jiří Dostál, Simona Fornůsek, Martin Šutovský
Supervisor:
Department of Information Security
Synopsis:
Requirements:

General knowledge about the functioning of computer networks and systems. Basics from programming.

Syllabus of lectures:

1. Introduction, Selected Network Protocols and Their Security Weaknesses

2. Network attacks 1 (Introduction)

3. Network attacks 2 ((D)DoS, Scanning, Brute-Force)

4. Network attacks 3 (Covert Channels, MitM, Poisoning, L7 threats)

5. Remote Access

6. Active Defense, Cyber Deception

7. Data mining

8. Statistical methodology for anomaly detection

9. Intrusion Detection Systems

10. Incident response

11. Penetration testing

12. Reserved (Social Engineering)

Syllabus of tutorials:

1. ARP Man-in-the-Middle (MitM) and Scapy

2. (Distributed) Denial of Service

3. Packet-Based Network Analysis

4. Flow-Based Network Analysis

5. Network Scanning and Vulnerability testing

Study Objective:

he goal of the course is to teach the students basic security aspects of communication protocols in wired, optical, and wireless networks. Emphasis is put on detection and prevention of attacks on resources and information systems in wired computer networks.

Study materials:

1. Stallings, W. : Cryptography and Network Security: Principles and Practice (7th Edition). Pearson, 2016. ISBN 978-0134444284.

2. Stallings, W. : Cryptography and Network Security: Principles and Practice (5th Edition). Prentice Hall, 2010. ISBN 0-13-869017-0.

3. Anderson, R. : Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley, 2008. ISBN 0470068523.

4. Mitnick, K. D. - Simon, W. L. - Wozniak, K. W. : The Art of Deception: Controlling the Human Element of Security. Wiley, 2003. ISBN 076454280X.

5. Kaufman, Ch. - Perlman, R. - Speciner, M. : Network Security, Private Communication in a Public World (2nd Edition). Prentice Hall, 2002. ISBN 0130460192.

Note:
Further information:
https://courses.fit.cvut.cz/MI-SIB/
Time-table for winter semester 2024/2025:
Time-table is not available yet
Time-table for summer semester 2024/2025:
06:00–08:0008:00–10:0010:00–12:0012:00–14:0014:00–16:0016:00–18:0018:00–20:0020:00–22:0022:00–24:00
Mon
roomTK:PU1
Dostál J.
18:00–19:30
(lecture parallel1)
Dejvice
Tue
Wed
Thu
roomT9:301

14:30–16:00
EVEN WEEK

(lecture parallel1
parallel nr.101)

Dejvice
roomT9:301

16:15–17:45
EVEN WEEK

(lecture parallel1
parallel nr.102)

Dejvice
Fri
The course is a part of the following study plans:
Data valid to 2025-01-21
For updated information see http://bilakniha.cvut.cz/en/predmet6115206.html