|Course title||Computer Network Security|
|Organizational form of instruction||Lecture + Exercise|
|Level of course||Master|
|Year of study||not specified|
|Number of ECTS credits||4|
|Language of instruction||Czech|
|Status of course||Compulsory, Compulsory-optional, Optional|
|Form of instruction||Face-to-face|
|Work placements||This is not an internship|
|Recommended optional programme components||None|
The course begins with the introduction to the security of TCP/IP networks in general and the methods of network scanning including demonstration of various attacks. Examination of methods of (Internet) network securing going from traffic filtration, over proxies and address translation, firewall, so far to tunnelling and VPN, then the introduction to electronic certificates and PKI infrastructure, its application, and in the end of the course the selected encrypted aplication protocols like eg. IPsec, DNSSec, SSL/TLS (OpenSSL) or SSH are covered. In practices students first try to do some simple attack on non-secured (local) network and then they learn how to apply the methods of its securing and deploying secured protocols. 1. Intro: intro to cryptography and authentization, network secutiry (TCP/IP) in general, attacks (DoS), detection of attacks (IDS) 2. Security of network technologies: network scanning (Wireshark, nmap), data integrity, attacks, wireless networks (WiFi), tunnelling, VPN 3. Internet security: filtration, proxies, address translation (NAT), firewall and DMZ 4. Internet security: tunnelling, VPN, aplication proxies and gates, SOCKS 5. PKI infrastructure: certificates, certificate authorities and PKI infrastructure 6. Application of PKI: elektronic signature and banking 7. Encrypted and authentization protocols: IPsec, RADIUS, LDAP, Kerberos, DNSSec 8. Encrypted and authentization protokols: SSL/TLS (OpenSSL), S/MIME, SSH
|Learning activities and teaching methods|
The students become familiar with basic concepts of computer network security.
3. Application: your knowledge in securing a computer network.
|Assessment methods and criteria|
Oral exam, Written exam
Active participation in class. Completion of assigned homeworks. Passing the oral (or written) exam.
|Study plans that include the course|
|Faculty||Study plan (Version)||Branch of study Category||Recommended year of study||Recommended semester|
|Faculty of Science||Applied Computer Science (1)||Informatics courses||1||Summer|
|Faculty of Science||Teaching Training in Computer Science for Secondary Schools (1)||Pedagogy, teacher training and social care||1||Summer|
|Faculty of Science||Computer Science (2015)||Informatics courses||1||Summer|