The course is included in these curricula and study modules

It 2001 - 2004 - Network master

Level/category

Extension studies

Teaching language

Swedish

Type of course

Compulsory

Recommended year of study

3

Total number of ECTS

4 cr

Competency aims

Basic knowledge and basic skill in networlk security

Learning outcomes

Ability to analyze the security of computer systems and computer networks, ability to configure and to program secure computer systems and computer networks, and skills to find and implement solutions to information security problems.

Course contents

Information Security Threats
- intrusion
- eavesdropping
- damage
Information Security Administration
- information security policy
- management of risks and vulnerabilities
- intrusion detection and management of intrusion attempts
- training and education of users
- information security standards
Antivirus Protection
Firewalls
Cryptography
- theoretical foundations
- cryptographic algorithms and protocols
- management of cryptographic keys (KDC, certificates, PKI)
Information Security Software
- secure remote access and secure network connections (SSH)
- virtual private networks (VPN) and IPSec
- Transport Layer Security/Secure Sockel Layer (TLS/SSL)
- TLS/SSL basd software (secure web, secure e-mail client software, etc)
- e-mail security (PGP, S/MIME)
- e-commerce
- secure network administration, secure DNS, secure time synchronization (NTP)
- hardware/software of cryptographic tokens (smart cards, SIM cards, USB tokens, etc.)
- secure software design
Security of Wireless and Mobile Networks

Prerequisites and co-requisites

Computer Network Protocols, Applications and Network Programming

Previous course names

There are no such courses

Additional information

every exercise to hand in has a deadline published on the home page of the course

Recommended or required reading

Stallings, W.: "Cryptography and Network Security,Principles and Practice", Third Edition, Prentice-Hall, USA, 2002, ISBN 0-13-111502-2(En tidigare upplaga av denna bok har utsetts till bästa datatekniska lärobok i en tävling i USA år 1999. Boken har en egen www-hemsida, där bl.a. publiceras ett rikligt urval av högklassigt utbildningsmaterial i tillämpad kryptografi - An earlier edition of this book is winner of the 1999 TEXTY award in USA for the best computer science and engineering testbook. The book has an own www home page with high quality educational material in applied cryptography.

Viega, J. and McGraw, G.: "Building Secure Software" Addison-Wesley, USA, 2002, ISBN 0-201-72152-X

På webben publicerat material (se kursens hensida)/Material published on the web (see home page of the course)

Study activities

  • Lectures - 60 hours
  • Exercise based learning - 30 hours
  • Individual studies - 30 hours

Workload

  • Total workload of the course: 120 hours
  • Of which autonomous studies: 30 hours
  • Of which scheduled studies: 90 hours

Mode of Delivery

Multiform education

Assessment methods

  • Exams
  • Reports and productions

Teacher

Pulkkis Göran

Examiner

Pulkkis Göran

Group size

No limit

Assignments valid until

Until further notice

The timetable of the course

januari-maj (vårterminen)

Assessment methods

  • 2006-05-24 - Exams
  • 2006-05-24 - Reports and productions

Course and curriculum search