Course detail

Network Security

FEKT-CZV-ICTAcad. year: 2024/2025

The course covers topics related to secure configuration of network elements, security protocols, methods providing privacy protection, security testing of network infrastructure and web applications according to available methodologies. Moreover, the course coveres problems of log analysis to detect cyber incidents, performance testing of network infrastructures, analysis of malware and options to defend against it. The last topic is social engineering. 

Language of instruction

Czech

Number of ECTS credits

7

Mode of study

Not applicable.

Entry knowledge

The course requires basic knowledge of operating systems, principles used in a network environment based on TCP/IP and application protocols such as HTTPS. 

Rules for evaluation and completion of the course

The conditions for the successful course completion are stated in the yearly updated supervisor’s notice. 

Aims

The goal of the course is to introduce students to critical areas of network security. This includes the topics of proper setup of modern network elements, deployment of security protocols in networks, log analysis, basic principles of security testing , performance testing of network infrastructures, social engineering, malware analysis and defense against it.

After course completion, the students will be able to:

  • Explain and practically implement the security mechanisms on the network, transport and application layers.
  • Explain and practically implement the security mechanisms for wireless networks.
  • Use the basic techniques of penetration testing for information gathering, vulnerability detection and exploitation.
  • Choose and use suitable tools for infrastructure security testing.
  • Choose and use suitable tools for infrastructure performance testing.
  • Based on result of penetration and performance testing, write a report proposing appropriate countermeasure.
  • Classify the types of malware and use methods for their destruction.
  • Set rules and policies for the limitation of the human factor-based attacks. 

 

 

 

Study aids

Not applicable.

Prerequisites and corequisites

Not applicable.

Basic literature

FADYUSHIN, Vyacheslav. Instant penetration testing: Setting up a test lab how-to. Birmingham: Packt Publishing, 2013, 74 s. : il. ISBN 978-1-84969-412-4. (EN)
PETERSON, Larry L a Bruce S DAVIE. Computer networks: a systems approach. Sixth edition. Cambridge, MA: Morgan Kaufmann Publishers, 2022, xxvi, 817 stran : ilustrace ; 24 cm. ISBN 978-0-12-818200-0. (EN)
BURDA, K. Bezpečnost komunikačních systémů. Bezpečnost komunikačních systémů. Brno: Vysoké učení technické, 2022. S. 1-132. ISBN: 978-80-214-6044-7. (CS)
CHANDRA, Praphul. Wireless security. Amsterdam: Newnes, 2009, xvi, 726 s. : il. ISBN 978-1-85617-529-6. (EN)

Recommended literature

Not applicable.

Classification of course in study plans

  • Programme CZV3-Cyber Lifelong learning - long-term course 1 year of study, summer semester, compulsory

Type of course unit

 

Lecture

26 hod., optionally

Teacher / Lecturer

Syllabus

  1. Introduction to network security, basic concepts, attacks and log analysis
  2. Secure configuration of active network elements (switches and routers, firewalls)
  3. Secure configuration of wireless networks
  4. Security in WANs, optical networks and mobile networks
  5. Network security protocols (MACsec, IPsec, TLS, DNSSEC)
  6. Anonymization tools and protocols in networks
  7. Penetration testing, methodologies
  8. Web application security
  9. Stress testing, DoS and DDoS, NGFW
  10. Forensic analysis of malicious code and soc. engineering
 

Laboratory exercise

13 hod., compulsory

Teacher / Lecturer

Syllabus