Course: Computer Network Security

« Back
Course title Computer Network Security
Course code KMI/BEPS
Organizational form of instruction Lecture + Exercise
Level of course Master
Year of study not specified
Semester Summer
Number of ECTS credits 4
Language of instruction Czech
Status of course Compulsory, Compulsory-optional, Optional
Form of instruction Face-to-face
Work placements This is not an internship
Recommended optional programme components None
  • Outrata Jan, doc. Mgr. Ph.D.
  • Trnečka Martin, Mgr. Ph.D.
Course content
The course begins with the introduction to the security of TCP/IP networks in general and the methods of network scanning including demonstration of various attacks. Examination of methods of (Internet) network securing going from traffic filtration, over proxies and address translation, firewall, so far to tunnelling and VPN, then the introduction to electronic certificates and PKI infrastructure, its application, and in the end of the course the selected encrypted aplication protocols like eg. IPsec, DNSSec, SSL/TLS (OpenSSL) or SSH are covered. In practices students first try to do some simple attack on non-secured (local) network and then they learn how to apply the methods of its securing and deploying secured protocols. 1. Intro: intro to cryptography and authentization, network secutiry (TCP/IP) in general, attacks (DoS), detection of attacks (IDS) 2. Security of network technologies: network scanning (Wireshark, nmap), data integrity, attacks, wireless networks (WiFi), tunnelling, VPN 3. Internet security: filtration, proxies, address translation (NAT), firewall and DMZ 4. Internet security: tunnelling, VPN, aplication proxies and gates, SOCKS 5. PKI infrastructure: certificates, certificate authorities and PKI infrastructure 6. Application of PKI: elektronic signature and banking 7. Encrypted and authentization protocols: IPsec, RADIUS, LDAP, Kerberos, DNSSec 8. Encrypted and authentization protokols: SSL/TLS (OpenSSL), S/MIME, SSH

Learning activities and teaching methods
Lecture, Demonstration
Learning outcomes
The students become familiar with basic concepts of computer network security.
3. Application: your knowledge in securing a computer network.

Assessment methods and criteria
Oral exam, Written exam

Active participation in class. Completion of assigned homeworks. Passing the oral (or written) exam.
Recommended literature
  • Barken L. (2004). Wi-Fi: jak zabezpečit bezdrátovou síť (How secure is your wireless network?). Computer Press.
  • Cole E. (2009). Network Security Bible. Wiley.
  • Dostálek L. a kolektiv. (2003). Velký průvodce protokoly TCP/IP: Bezpečnost (2. aktualizované vydání). Computer Press.
  • Dostálek L., Vohnoutová M. (2010). Velký průvodce infrastrukturou PKI a technologií elektronického podpisu (2. aktualizované vydání). Computer Press.
  • Kizza J. M. (2005). Computer network security. Springer.
  • Kretchmar J. M., Dostálek L. (2004). Administrace a diagnostika sítí pomocí OpenSource utilit a nástrojů (Open source network administration). Computer Press.
  • Orebaugh A. (2008). Wireshark a Ethereal: kompletní průvodce analýzou a diagnostikou sítí (Wireshark & Ethereal network protocol analyzer toolkit). Computer Press.
  • Satrapa P. (2008). Internetový protokol IPv6 (2. vydání). CZ.NIC.
  • Scambray J., McClure S., Kurtz G. (2001). acking bez tajemství (Hacking exposed : network security secrets and solutions). Computer Press.
  • Stallings W. (2010). Network Security Essentials: Applications and Standards (4th Edition). Prentice Hall.

Study plans that include the course
Faculty Study plan (Version) Branch of study Category Recommended year of study Recommended semester
Faculty of Science Applied Computer Science (1) Informatics courses 1 Summer
Faculty of Science Teaching Training in Computer Science for Secondary Schools (1) Pedagogy, teacher training and social care 1 Summer
Faculty of Science Computer Science (2015) Informatics courses 1 Summer