Course title | Security in Communications Networks |
---|---|
Course code | AUIUI/AE8BK |
Organizational form of instruction | Lecture + Lesson |
Level of course | Master |
Year of study | not specified |
Semester | Summer |
Number of ECTS credits | 4 |
Language of instruction | Czech, English |
Status of course | unspecified |
Form of instruction | Face-to-face |
Work placements | This is not an internship |
Recommended optional programme components | None |
Lecturer(s) |
---|
|
Course content |
Topics: 1. Network topologies and their influence on traffic safety. 2. Network protocols, their structure and security of transmitted data. 3. Possibilities of data capture and their reconstruction in wired networks. 4. Intruder detection in wireless networks. 5. Possibilities of data capture and their reconstruction on wireless networks. 6. Manipulation of network traffic and intruder detection. 7. VLAN and network isolation, blacklisting, whitelisting. 8. Network infrastructure monitoring. 9. Detection of incidents in a network environment. 10. Active elements of infrastructure defense. 11. VPN and TOR networks 12. Design of secure infrastructure. 13. Design safety testing. 14. Introduction to network infrastructure penetration tests.
|
Learning activities and teaching methods |
Lecturing, Demonstration, E-learning
|
prerequisite |
Knowledge |
Basic orientation in MS Windows and Linux operating systems. Basic orientation in the field of LAN / WAN networks. |
Basic orientation in MS Windows and Linux operating systems. Basic orientation in the field of LAN / WAN networks. |
learning outcomes |
Describe network topologies and their impact on the security of traffic. |
Describe network topologies and their impact on the security of traffic. |
Explain the configuration of network elements using the CLI. |
Explain the configuration of network elements using the CLI. |
Describe network protocols, their structure and security of transmitted data. |
Describe network protocols, their structure and security of transmitted data. |
Explain the principles of secure LAN design. |
Explain the principles of secure LAN design. |
Describe data capture and reconstruction options for wired networks. |
Describe data capture and reconstruction options for wired networks. |
Skills |
Design a secure network infrastructure. |
Design a secure network infrastructure. |
To implement large scale network management. |
To implement large scale network management. |
Configure network devices using the CLI. |
Configure network devices using the CLI. |
Apply authentication models in a network environment. |
Apply authentication models in a network environment. |
Design network segmentation in a corporate environment to implement. |
Design network segmentation in a corporate environment to implement. |
Evaluate the security of a network infrastructure. |
Evaluate the security of a network infrastructure. |
teaching methods |
Knowledge |
E-learning |
E-learning |
Lecturing |
Demonstration |
Lecturing |
Demonstration |
assessment methods |
Composite examination (Written part + oral part) |
Composite examination (Written part + oral part) |
Recommended literature |
|
Study plans that include the course |
Faculty | Study plan (Version) | Category of Branch/Specialization | Recommended semester |
---|