Course detail
Projecting, Administration and Security of Computer Networks
FEKT-MKC-NSBAcad. year: 2022/2023
Modern civilization depends on a correct functioning of computer networks. Significant attention must therefore be paid to the security and design of these networks. On completing the course, students will have a thorough overview of the functioning, security and design of computer networks. Lectures are mainly dedicated to explaining the protocols in particular computer network layers, the principles of securing computer networks, and the design of computer networks. Laboratory exercises are dedicated to the administration and security of linux servers.
Language of instruction
Number of ECTS credits
Mode of study
Guarantor
Department
Learning outcomes of the course unit
• explain the applications of cryptography in computer networks,
• explain the way computer networks in the physical layer function and are secured,
• explain the way computer networks in the link layer function and are secured,
• explain the way computer networks in the network layer function and are secured,
• explain the way computer networks in the transport layer function and are secured,
• explain the way computer networks in the application layer function and are secured,
• explain the general methodology of computer network design,
• deal with the administration and security of linux servers.
Prerequisites
Co-requisites
Planned learning activities and teaching methods
Assesment methods and criteria linked to learning outcomes
Course curriculum
1. Cryptography in computer networks.
2. Physical layer and its protection.
3. Link layer and its protection.
4. Network layer and its protection – protocols.
5. Network layer and its protection – routing.
6. Transport layer and its protection.
7. Application layer and its protection.
8. WLAN networks.
9. Access control.
10. Anonymity network.
11. Design of the WAN network.
12. Evolutionary trends.
13. Reserve.
Laboratory exercises:
1. Server installation.
2. Basics of OS Linux.
3. Remote administration.
4. FTP server configuration.
5. Web server Apache.
6. Firewall configuration - 1. part.
7. Firewall configuration - 2. part.
8. Man-in-the-Middle attack.
9. SSL strip.
10. DoS attacks.
11. System monitoring.
12. Credit exercise.
13. Reserve.
Work placements
Aims
Specification of controlled education, way of implementation and compensation for absences
Recommended optional programme components
Prerequisites and corequisites
Basic literature
Recommended reading
KUROSE, J. F., ROSS, K. W.: Počítačové sítě. Computer Press, Brno 2014. (CS)
Classification of course in study plans
Type of course unit
Lecture
Teacher / Lecturer
Syllabus
2. The structure of computer networks.
3. The design of computer networks.
4. Transmission protocols and their security - IEEE 802.3, TCP/IP.
5. Transmission protocols and their security - IPv6, IPSec, SSL.
6. Transmission protocols and their security - WAP.
7. Administration of linux systems.
8. Security of linux systems.
9. Configuration of network elements.
10.Configuration of network services.
11.The security of network services.
12.Firewalls and communication blocking.
13.Monitoring of network elements and traffics.
Laboratory exercise
Teacher / Lecturer
Syllabus
1. Installation and management of the single-user system.
2. Installation of programs and users.
3. Security settings of the single-user system.
4. Settings of the graphic interface.
5. Installation and management of the server.
6. Security settings of the server.
7. Settings of DNS and FTP services.
8. Settings of email services and web servers.
9. Settings of the SELinux and GRSecurity.
10. Settings of the NFS and PAX.
11. Settings of LDAP and Kerberos.
12. Network monitoring.
13. Final exercise.