Course syllabus for Network security

Course syllabus adopted 2023-02-04 by Head of Programme (or corresponding).

Overview

  • Swedish nameNätverkssäkerhet
  • CodeEDA491
  • Credits7.5 Credits
  • OwnerMPCSN
  • Education cycleSecond-cycle
  • Main field of studyComputer Science and Engineering, Software Engineering
  • DepartmentCOMPUTER SCIENCE AND ENGINEERING
  • GradingTH - Pass with distinction (5), Pass with credit (4), Pass (3), Fail

Course round 1

  • Teaching language English
  • Application code 12119
  • Maximum participants120 (at least 10% of the seats are reserved for exchange students)
  • Block schedule
  • Open for exchange studentsYes

Credit distribution

0107 Examination 6 c
Grading: TH
6 c
  • 02 Jun 2025 am J DIG
  • 11 Okt 2024 pm J DIG
  • 28 Aug 2025 pm J DIG
0207 Laboratory 1.5 c
Grading: UG
1.5 c

In programmes

Examiner

Go to coursepage (Opens in new tab)

Eligibility

General entry requirements for Master's level (second cycle)
Applicants enrolled in a programme at Chalmers where the course is included in the study programme are exempted from fulfilling the requirements above.

Specific entry requirements

English 6 (or by other approved means with the equivalent proficiency level)
Applicants enrolled in a programme at Chalmers where the course is included in the study programme are exempted from fulfilling the requirements above.

Course specific prerequisites

The course EDA343/344 Computer communication or equivalent is required. The course EDA263 in Computer Security or similar is desirable to gain a full understanding of the course content.

Aim

Almost all computer systems and applications today are highly distributed and use networks for communication and network security has therefore become an increasingly important topic. Knowledge about possible threats and countermeasures are important not only for the network security specialist but also for application programmers and everyone who wants to be able to assess and evaluate the level of security a system or application can offer. This course covers the underlying principles and techniques for network and communication security. Practical examples of security problems and principles for countermeasures are given. The course also surveys cryptographic and other tools used to provide security and reviews how these tools are utilized in protocols and applications.

Learning outcomes (after completion of the course the student should be able to)

  • Have a good understanding of how applications can communicate securely and what tools and protocols exist in order to offer different levels of security
  • Have detailed knowledge and the ability to critically analyse and design secure networks, applications and systems
  • Have a fundamental understanding of what makes systems vulnerable and be able to predict new attack methods before they become a reality
  • Have enough knowledge to evaluate protocols and ability to draw conclusions about the level of security they can offer
  • Understand what impact the selection of different protocols and security architectures can have to an application or a system
  • Have an understanding of research work in the field by reading conference and research reports in related areas

Content

The course covers many topics related to communications and network security:
  • Network attacks, encryption and random number generation
  • Analysis of weaknesses and attacks against common protocols such as TCP, UDP, IP, and ICMP
  • Denial of service (DoS) attacks, host and network scanning and operating system fingerprinting
  • Access control, authentication mechanisms, passwords, Radius, AAA, PKI, key distribution, Kerberos
  • Identity management, certificates, X.509, certificate revocation, LDAP
  • Security protocols such as IPSec , SSL and SSH
  • Security in wireless networks, WEP, WPA, WPA2, IEEE 802.1X, EAP
  • Network design, firewalls, proxies, NAT, ingress and egress filtering
  • Virtual private networks (VPN), tunnelling protocols, network segmentation and remote access
  • Link level security, VLAN technology, security in ARP, DHCP and DNS

Organisation

The course consists of a series of lectures and laborative exercises. The laborative exercises gives a deeper understanding of network security weaknesses and protection tools by working with network scanning, configuring firewalls and intrusion detection systems (IDS) and practical work with analysing the SSL protocol.

Literature

A course book which is complemented with research papers and articles covering important topics in the field. For details, see separate literature list on course home page.

Examination including compulsory elements

Written exam and passed laboratory assignments. The final grade, according to the scale Fail (U) or Pass (3, 4, 5), is given based on the grades for the written exam.

The course examiner may assess individual students in other ways than what is stated above if there are special reasons for doing so, for example if a student has a decision from Chalmers on educational support due to disability.