Main page | Study Branches/Specializations | Groups of Courses | All Courses | Roles                Instructions

A course is the basic teaching unit, it's design as a medium for a student to acquire comprehensive knowledge and skills indispensable in the given field. A course guarantor is responsible for the factual content of the course.
For each course, there is a department responsible for the course organisation. A person responsible for timetabling for a given department sets a time schedule of teaching and for each class, s/he assigns an instructor and/or an examiner.
Expected time consumption of the course is expressed by a course attribute extent of teaching. For example, extent = 2 +2 indicates two teaching hours of lectures and two teaching hours of seminar (lab) per week.
At the end of each semester, the course instructor has to evaluate the extent to which a student has acquired the expected knowledge and skills. The type of this evaluation is indicated by the attribute completion. So, a course can be completed by just an assessment ('pouze zápočet'), by a graded assessment ('klasifikovaný zápočet'), or by just an examination ('pouze zkouška') or by an assessment and examination ('zápočet a zkouška') .
The difficulty of a given course is evaluated by the amount of ECTS credits.
The course is in session (cf. teaching is going on) during a semester. Each course is offered either in the winter ('zimní') or summer ('letní') semester of an academic year. Exceptionally, a course might be offered in both semesters.
The subject matter of a course is described in various texts.

MI-SIB.16 Network Security Extent of teaching: 2P+1C
Instructor: Completion: Z,ZK
Department: 18106 Credits: 5 Semester: L

Annotation:
The students will gain theoretical and practical knowledge and experience in the area of current security threats in computer networks, specifically about detection and defense. The course explains basic pricipals of security monitoring, packet-based and flow-based analysis, in order to detect anomalies and suspicious network traffic. The course focuses on explanation and practical examples of various mechanisms of securing network infrastructure and detection in real time. The course covers general principals of handling detected security events (i.e. incident handling and incident response).

Lecture syllabus:
1. Introduction, Selected Network Protocols and Their Security Weaknesses
2. Network attacks 1 (Introduction)
3. Network attacks 2 ((D)DoS, Scanning, Brute-Force)
4. Network attacks 3 (Covert Channels, MitM, Poisoning, L7 threats)
5. Remote Access
6. Active Defense, Cyber Deception
7. Data mining
8. Statistical methodology for anomaly detection
9. Intrusion Detection Systems
10. Incident response
11. Penetration testing
12. Reserved (Social Engineering)

Seminar syllabus:
1. ARP Man-in-the-Middle (MitM) and Scapy
2. (Distributed) Denial of Service
3. Packet-Based Network Analysis
4. Flow-Based Network Analysis
5. Network Scanning and Vulnerability testing

Literature:
1. Kaufman, Perlman & Speciner, Network Security, Private Communication in a Public World, 2nd Edition. Prentice Hall, 2002, ISBN: 0130460192.
2. Stallings, Cryptography and Network Security: Principles and Practice', 5th Edition. Prentice Hall, 2010, ISBN: 0-13-869017-0.
3. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems, Wiley Publishing, 2008, ISBN: 0470068523.
4. Mitnick, Simon, Wozniak, The Art of Deception: Controlling the Human Element of Security, Wiley, 2003, ISBN: 076454280X.

Requirements:
General knowledge about the functioning of computer networks and systems. Basics from programming.

Informace o předmětu a výukové materiály naleznete na https://courses.fit.cvut.cz/MI-SIB/ //
Tento předmět obsahově navazuje na magisterský předmět Systémová bezpečnost.

The course is also part of the following Study plans:
Study Plan Study Branch/Specialization Role Recommended semester
MI-ZI.2016 Knowledge Engineering V 3
MI-ZI.2018 Knowledge Engineering V 3
MI-WSI-SI.2016 Web and Software Engineering V 3
MI-WSI-ISM.2016 Web and Software Engineering V 3
MI-SP-TI.2016 System Programming V 3
MI-NPVS.2016 Design and Programming of Embedded Systems V 3
MI-PB.2016 Computer Security PO 3
MI-SP-SP.2016 System Programming V 3
MI-WSI-WI.2016 Web and Software Engineering V 3
MI-SPOL.2016 Unspecified Branch/Specialisation of Study VO 3
MI-PSS.2016 Computer Systems and Networks PO 3
NI-TI.2018 Computer Science V 3


Page updated 20. 4. 2024, semester: L/2023-4, L/2020-1, L/2022-3, L/2021-2, Z/2019-20, Z/2022-3, Z/2020-1, Z/2023-4, L/2019-20, Z/2021-2, Z/2024-5, Send comments to the content presented here to Administrator of study plans Design and implementation: J. Novák, I. Halaška