FI:PA197 Secure Network Design - Course Information
PA197 Secure Network Design
Faculty of InformaticsSpring 2022
- Extent and Intensity
- 2/2/2. 5 credit(s) (plus extra credits for completion). Type of Completion: zk (examination).
- Teacher(s)
- prof. RNDr. Luděk Matyska, CSc. (lecturer)
doc. RNDr. Eva Hladká, Ph.D. (lecturer)
Mgr. Marek Sýs, Ph.D. (lecturer)
doc. RNDr. Petr Švenda, Ph.D. (lecturer)
RNDr. Marek Kumpošt, Ph.D. (lecturer)
RNDr. Karolina Dočkalová Burská, Ph.D. (seminar tutor)
Mgr. Pavel Novák (seminar tutor)
doc. RNDr. Radek Ošlejšek, Ph.D. (seminar tutor)
Bc. Lin Pavelů (seminar tutor)
RNDr. Lukáš Ručka (seminar tutor) - Guaranteed by
- doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Wed 16. 2. to Wed 18. 5. Wed 10:00–11:50 A217
- Timetable of Seminar Groups:
PA197/Short_CTF_02: No timetable has been entered into IS. K. Dočkalová Burská, R. Ošlejšek
PA197/Short_CTF_03: No timetable has been entered into IS. K. Dočkalová Burská, R. Ošlejšek - Prerequisites
- PA191 Advanced Computer Networking || PA159 Net-Centric Computing I || PA151 Pokročilé počítačové sítě
Basic knowledge of computer networks. Basic knowledge in applied cryptography and IT security. User-level experience with Windows and Linux OS, ability to configure tools and/or interfaces. Practical experience in programming with imperative languages like C/C++ or Java. - Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 65 student(s).
Current registration and enrolment status: enrolled: 2/65, only registered: 0/65, only registered with preference (fields directly associated with the programme): 0/65 - fields of study / plans the course is directly associated with
- Image Processing and Analysis (programme FI, N-VIZ)
- Bioinformatics and systems biology (programme FI, N-UIZD)
- Computer Games Development (programme FI, N-VIZ_A)
- Computer Graphics and Visualisation (programme FI, N-VIZ_A)
- Computer Networks and Communications (programme FI, N-PSKB_A)
- Cybersecurity Management (programme FI, N-RSSS_A)
- Formal analysis of computer systems (programme FI, N-TEI)
- Graphic design (programme FI, N-VIZ)
- Graphic Design (programme FI, N-VIZ_A)
- Hardware Systems (programme FI, N-PSKB_A)
- Hardware systems (programme FI, N-PSKB)
- Image Processing and Analysis (programme FI, N-VIZ_A)
- Information security (programme FI, N-PSKB)
- Information Security (programme FI, N-PSKB_A)
- Quantum and Other Nonclassical Computational Models (programme FI, N-TEI)
- Computer graphics and visualisation (programme FI, N-VIZ)
- Computer Networks and Communications (programme FI, N-PSKB)
- Principles of programming languages (programme FI, N-TEI)
- Cybersecurity management (programme FI, N-RSSS)
- Services development management (programme FI, N-RSSS)
- Software Systems Development Management (programme FI, N-RSSS)
- Services Development Management (programme FI, N-RSSS_A)
- Software Systems Development Management (programme FI, N-RSSS_A)
- Software Systems (programme FI, N-PSKB_A)
- Software systems (programme FI, N-PSKB)
- Machine learning and artificial intelligence (programme FI, N-UIZD)
- Computer Games Development (programme FI, N-VIZ)
- Processing and analysis of large-scale data (programme FI, N-UIZD)
- Natural language processing (programme FI, N-UIZD)
- Course objectives
- At the end of the course the students will be able to: understand the methods and technologies that are at the base of secure network design; design architecture of network; deploy securely sensor networks.
- Learning outcomes
- At the end of the course the students will be able to: understand the methods and technologies that are at the base of secure network design; design architecture of network; deploy securely sensor networks.
- Syllabus
- Basic design requirements and principles (basic network architecture and functions, general requirements on the security and reliability). Network specific faults, threats, and attacks. Security architectures (Secure and resilient routing, secure DNS, secure channels, trusted network access, resilient architectures). Operational security management – how to design and manage reliable networks. Network monitoring and defence mechanisms (firewalls, IDS, netflow). Penetration testing. WiFi networks and security. (Wireless) personal area networks. Wireless Sensor Networks (WSN). Cryptographic aspects of WSN.
- Literature
- recommended literature
- Lee Allen. Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide. ISBN-10:1849517746.
- Holger Karl. Andreas Willig. Protocols and Architectures for Wireless Sensor Network. Wiley-Interscience. 2007. ISBN-10: 0470519231.
- HUNT, Craig. TCP/IP network administration. Beijing: O'Reilly & Associates, 2002, xvii, 724. ISBN 0596002971. info
- Teaching methods
- Lectures, seminars in computer lab, home assignments, project.
- Assessment methods
- Written test. Home assignments in seminars. Project.
- Language of instruction
- English
- Follow-Up Courses
- Further Comments
- Study Materials
- Enrolment Statistics (Spring 2022, recent)
- Permalink: https://is.muni.cz/course/fi/spring2022/PA197