After completing this course successfully, the student can:
• Critically discuss, select and compare security mechanisms in communication protocols on the data link, network, transport and application layer.
• Identify, compare and discuss several security risks and countermeasures at the networked system level and the web.
• Understand attacks on web servers.
|
|
According to popular movies, a hacker breaks into the FBI systems for breakfast, gets access to a government’s classified information within seconds and can trace your chat history with just a few clicks of a button. For the most part, those scenarios stay in the movies. But how do network systems prevent these kinds of scenarios from happening?
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: 1) Internet Security Protocols, 2) Internet Security Attacks and Defense and 3) Web security.
In the first part the following topics will be discussed: WEP/WPA, IPSec, SSH, SSL and HTTPS. The second part discusses topics like scans, intrusions, DDOS attacks and firewalls. The last part focuses on web security, including SQL-injection and X-side scripting attacks.
Teaching method: The course will be organised in the form of a Massive Online Open Course (MOOC) via https://learnintsec.org/, augmented with in class Question & Answer sessions. The MOOC will run in the third quarter. The course will offer a series of guest lectures from industry and academic experts in the field of Internet Security. The MOOC consists of three modules: 1) Internet Security Protocol (2EC), 2) Internet Security Attacks and Defence (2EC) and 3) Web security (1EC).
Examination: Weekly exercise and written exam. Weekly exercises via the MOOC platform; the web hacking assignment are those from Certified Secure (https://www.certifiedsecure.com).
Prerequisite A basic understanding of layered communication protocols/systems. This is covered in Telematicasystemen en Toepassingen (192610000).
Content Introduction, network protocols, IP security, Email security, Web security, secure management, Intruders, Viruses, Firewalls, Privacy
|
 |
|