After completing this course successfully, the student can:
• Critically discuss, select and compare security mechanisms in communication protocols on the data link, network, transport and application layer.
• Identify, compare and discuss several security risks and countermeasures at the networked system level and the web.
• Understand attacks on web servers.
According to popular movies, a hacker breaks into the FBI systems for breakfast, gets access to a government’s classified information within seconds and can trace your chat history with just a few clicks of a button. For the most part, those scenarios stay in the movies. But how do network systems prevent these kinds of scenarios from happening?|
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: 1) Internet Security Protocols, 2) Internet Security Attacks and Defense and 3) Web security.
In the first part the following topics will be discussed: WEP/WPA, IPSec, SSH, SSL and HTTPS. The second part discusses topics like scans, intrusions, DDOS attacks and firewalls. The last part focuses on web security, including SQL-injection and X-side scripting attacks.
Teaching method: The course will be organised in the form of a Massive Online Open Course (MOOC) via https://learnintsec.org/. The MOOC will run two times per year: in the first and third quarter. Since 2016-2017 will be the first time that we organise this course in the form of a MOOC, will still provide some (back-up) classical lectures in the first quarter of 2016-2017. Starting from Q3, the course will be provided as “MOOC-only” and also be made available to students outside the UT. The MOOC consists of three modules: 1) Internet Security Protocol (2EC), 2) Internet Security Attacks and Defence (2EC) and 3) Web security (1EC).
Examination: Weekly exercises via the MOOC platform; the web hacking assignment are those from Certified Secure (https://www.certifiedsecure.com). The exercises can be performed twice a year, in the first as well as the third quarter. There is no “classical exam”.
Prerequisite A basic understanding of layered communication protocols/systems. This is covered in Telematicasystemen en Toepassingen (192610000).
Content Introduction, network protocols, IP security, Email security, Web security, secure management, Intruders, Viruses, Firewalls, Privacy
Assumed previous knowledge |Required materials|
Recommended materials-Instructional modes
|Course materialMOOC platform: https://learnintsec.org|
|Lecture and lab assignments|
RemarkVideos and assignments via a MOOC platform, as well as some traditional lectures