Instance: 2019/2020 - 2S
Cycles of Study/Courses
Teaching Staff - Responsibilities
Teaching - Hours
|Theoretical and practical :
Last updated on 2020-02-14.
Fields changed: Calculation formula of final grade, Obtenção de frequência, Bibliografia Complementar, Bibliografia Obrigatória, Componentes de Avaliação e Ocupação
Suitable for English-speaking students
The course aims to introduce students to the concepts and problems of security in communication networks. Throughout the course, the students will review the basics of networks allowing a discussion from the point of view of security of communication protocols. Analysis and design of network architecture aiming at a high degree of safety will be developed, using techniques for monitoring and traffic analysis. Network tools will be presented and used to achieve those goals. Web security and attacks to its applications will also be addressed.
Learning outcomes and competences
After the course, the students should be knowledgeable on the main security problems with communication networks. They should be able to identify, assess and diagnose possible risks and vulnerabilities in data networsk. Given this assessment the students should be able to choose, deploy and configure correct software and hardware tools so that the system presents the adequate security.
Pre-requirements (prior knowledge) and co-requirements (common knowledge)
- Operating systems
- System administration
- Network administration
- Basic concepts of networks, protocols;
- Network tools;
- Security Protocols:
- Network Authentication;
- Security protocols Standards (IPsec, TLS, Kerberos, SSH);
- Security in computer networks: vulnerabilities in communication protocols;
- Network monitoring, packet and traffic analysis;
- Network intrusion and prevention systems;
- DDOS Attacks
- Web security and vulnerabilities ;
- Security in wireless networks:802.11, GSM, UMTS
William Stallings; Cryptography and network security
. ISBN: 9780138690175
Stamp Mark; Information security
. ISBN: 9780470626399 hbk
McClure Stuart; Hacking exposed 7
. ISBN: 9780071780285
Stallings William; Network security essentials
. ISBN: 9780273793366
William Stallings; Computer security
. ISBN: 978-0-13-600424-0
Comments from the literature
Seminal and actual articles in network security will also be used as reference.
Teaching methods and learning activities
In the lectures the essential concepts are presented so to understand the network security tools that will be used to audit computer networks in a lab controlled environment. This environment hosts a service and network infrastructure, based on virtual machines, where vulnerabilities will be explored, tested and controlled with the security tools discussed in the lectures.
This infrastructure will be used in the lab classes and on one of the assignments.
The other assignment will involve research on on subject among the list proposed by the lecturer.
Technological sciences > Technology > Computer technology > Control techniques
Distributed evaluation with final exam
Amount of time allocated to each course unit
|Frequência das aulas
Eligibility for exams
- Minimum grade of 35% on lab assignments
- Minimum grade of 35% in exam
Note: both minimums should be met.
Class attendance is not recorded.
Calculation formula of final grade
Final grade will be based on assignment grade and exam grade, using the following expression: (AG x 10 + EG x 10) / 20
- EG = exam grade (0-20)
- AG = assignment grade (0-20)
- assignments are weighted equally (50%)
This applies for all the exams (normal, recourse, grade improvement or special term)
Special assessment (TE, DA, ...)
Students wishing to improve their grades from the previous year may do so to both components by re-doing the one(s) they wish to improve.
This weighting applies to all exams: normal, "recurso", special season, last year student or grade improvement.
See grade calculation above.