Course: Security in Communications Networks

» List of faculties » FAI » AUIUI
Course title Security in Communications Networks
Course code AUIUI/AE8BK
Organizational form of instruction Lecture + Lesson
Level of course Master
Year of study not specified
Semester Summer
Number of ECTS credits 4
Language of instruction Czech, English
Status of course unspecified
Form of instruction Face-to-face
Work placements This is not an internship
Recommended optional programme components None
Lecturer(s)
  • Malaník David, Ing. Ph.D.
Course content
Topics: 1. Network topologies and their influence on traffic safety. 2. Network protocols, their structure and security of transmitted data. 3. Possibilities of data capture and their reconstruction in wired networks. 4. Intruder detection in wireless networks. 5. Possibilities of data capture and their reconstruction on wireless networks. 6. Manipulation of network traffic and intruder detection. 7. VLAN and network isolation, blacklisting, whitelisting. 8. Network infrastructure monitoring. 9. Detection of incidents in a network environment. 10. Active elements of infrastructure defense. 11. VPN and TOR networks 12. Design of secure infrastructure. 13. Design safety testing. 14. Introduction to network infrastructure penetration tests.

Learning activities and teaching methods
Lecturing, Demonstration, E-learning
  • Home preparation for classes - 30 hours per semester
prerequisite
Knowledge
Basic orientation in MS Windows and Linux operating systems. Basic orientation in the field of LAN / WAN networks.
Basic orientation in MS Windows and Linux operating systems. Basic orientation in the field of LAN / WAN networks.
learning outcomes
Describe network topologies and their impact on the security of traffic.
Describe network topologies and their impact on the security of traffic.
Explain the configuration of network elements using the CLI.
Explain the configuration of network elements using the CLI.
Describe network protocols, their structure and security of transmitted data.
Describe network protocols, their structure and security of transmitted data.
Explain the principles of secure LAN design.
Explain the principles of secure LAN design.
Describe data capture and reconstruction options for wired networks.
Describe data capture and reconstruction options for wired networks.
Skills
Design a secure network infrastructure.
Design a secure network infrastructure.
To implement large scale network management.
To implement large scale network management.
Configure network devices using the CLI.
Configure network devices using the CLI.
Apply authentication models in a network environment.
Apply authentication models in a network environment.
Design network segmentation in a corporate environment to implement.
Design network segmentation in a corporate environment to implement.
Evaluate the security of a network infrastructure.
Evaluate the security of a network infrastructure.
teaching methods
Knowledge
E-learning
E-learning
Lecturing
Demonstration
Lecturing
Demonstration
assessment methods
Composite examination (Written part + oral part)
Composite examination (Written part + oral part)
Recommended literature
  • BOYC, Gregory. Linux networking cookbook. Packt Publishing Limited, 2016. ISBN 9781785287916.
  • Emmett DULANEY. Linux all-in-one for dummies. 5th ed.. Hoboken, NJ, 2014. ISBN 9781118844359.
  • HORÁK, J. a M. KERŠLÁGER. Počítačové sítě pro začínající správce.. Brno: Computer Press, 2011. ISBN 9788025131763.
  • Jan Kolouch. CyberCrime. Praha, 2016. ISBN 9788088168157.
  • John VACCA. Computer and information security handbook. Second edition. Amsterdam: Morgan Kaufmann, an imprint of Elsevier, 2013. ISBN 9780123943972.
  • KUROSE, J. F. a K. W. ROSS. Počítačové sítě.. Brno: Computer Press, 2014. ISBN 9788025138250.


Study plans that include the course
Faculty Study plan (Version) Category of Branch/Specialization Recommended year of study Recommended semester