Course syllabus adopted 2021-02-26 by Head of Programme (or corresponding).
Overview
- Swedish nameNätverkssäkerhet
- CodeEDA491
- Credits7.5 Credits
- OwnerMPCSN
- Education cycleSecond-cycle
- Main field of studyComputer Science and Engineering, Software Engineering
- DepartmentCOMPUTER SCIENCE AND ENGINEERING
- GradingTH - Pass with distinction (5), Pass with credit (4), Pass (3), Fail
Course round 1
- Teaching language English
- Application code 12111
- Maximum participants120
- Block schedule
- Open for exchange studentsYes
Credit distribution
Module | Sp1 | Sp2 | Sp3 | Sp4 | Summer | Not Sp | Examination dates |
---|---|---|---|---|---|---|---|
0107 Examination 6 c Grading: TH | 6 c |
| |||||
0207 Laboratory 1.5 c Grading: UG | 1.5 c |
In programmes
- MPALG - COMPUTER SCIENCE - ALGORITHMS, LANGUAGES AND LOGIC, MSC PROGR, Year 1 (elective)
- MPCSN - COMPUTER SYSTEMS AND NETWORKS, MSC PROGR, Year 1 (compulsory elective)
- MPICT - INFORMATION AND COMMUNICATION TECHNOLOGY, MSC PROGR, Year 1 (compulsory elective)
- MPSOF - SOFTWARE ENGINEERING AND TECHNOLOGY, MSC PROGR, Year 1 (compulsory elective)
Examiner
- Tomas Olovsson
- Head of Division, Computer and Network Systems, Computer Science and Engineering
Eligibility
General entry requirements for Master's level (second cycle)Applicants enrolled in a programme at Chalmers where the course is included in the study programme are exempted from fulfilling the requirements above.
Specific entry requirements
English 6 (or by other approved means with the equivalent proficiency level)Applicants enrolled in a programme at Chalmers where the course is included in the study programme are exempted from fulfilling the requirements above.
Course specific prerequisites
The courses EDA343 Computer communication or equivalent and EDA263 Computer security or equivalent are required.Aim
Almost all computer systems and applications today are highly distributed and use networks for communication and network security has therefore become an increasingly important topic. Knowledge about possible threats and countermeasures are important not only for the network security specialist but also for application programmers and everyone who wants to be able to assess and evaluate the level of security a system or application can offer. This course covers the underlying principles and techniques for network and communication security. Practical examples of security problems and principles for countermeasures are given. The course also surveys cryptographic and other tools used to provide security and reviews how these tools are utilized in protocols and applications.Learning outcomes (after completion of the course the student should be able to)
- Have a good understanding of how applications can communicate securely and what tools and protocols exist in order to offer different levels of security
- Have detailed knowledge and the ability to critically analyse and design secure networks, applications and systems
- Have a fundamental understanding of what makes systems vulnerable and be able to predict new attack methods before they become a reality
- Have enough knowledge to evaluate protocols and ability to draw conclusions about the level of security they can offer
- Understand what impact the selection of different protocols and security architectures can have to an application or a system
- Have an understanding of research work in the field by reading conference and research reports in related areas
Content
The course covers many topics related to communications and network security:- Network attacks, encryption and random number generation
- Analysis of weaknesses and attacks against common protocols such as TCP, UDP, IP, and ICMP
- Denial of service (DoS) attacks, host and network scanning and operating system fingerprinting
- Access control, authentication mechanisms, passwords, Radius, AAA, PKI, key distribution, Kerberos
- Identity management, certificates, X.509, certificate revocation, LDAP
- Security protocols such as IPSec , SSL and SSH
- Security in wireless networks, WEP, WPA, WPA2, IEEE 802.1X, EAP
- Network design, firewalls, proxies, NAT, ingress and egress filtering
- Virtual private networks (VPN), tunnelling protocols, network segmentation and remote access
- Link level security, VLAN technology, security in ARP, DHCP and DNS
Organisation
The course consists of a series of lectures and laborative exercises. The laborative exercises gives a deeper understanding of network security weaknesses and protection tools by working with network scanning, configuring firewalls and intrusion detection systems (IDS) and practical work with analysing the SSL protocol.
Literature
A course book which is complemented with research papers and articles covering important topics in the field. For details, see separate literature list on course home page.
Examination including compulsory elements
Written exam and passed laboratory exercises.
The course examiner may assess individual students in other ways than what is stated above if there are special reasons for doing so, for example if a student has a decision from Chalmers on educational support due to disability.