Knowledge and understanding: The student is required to know and understand the security issues affecting computer networks, communication protocols and any infrastructure whose operation relies on Information Technologies. Applying knowledge and understanding: The student is required to have the capability of performing the security analysis of a computer network, identifying the possible vulnerabilities, developing prevention and detection measures against cyber-attacks, and implementing countermeasures to mitigate attack effects. Making judgements: The student is required to be able to autonomously analyse process and techniques for assessing the risk level of a computer network, improving security awareness, simulating attack scenarios, and adopting adequate protection measures. Communication skills: The student is required to have the capability of clearly explaining network security technical concepts and scientific topics. Learning skills: The student has to be capable of integrating the knowledge from several and different sources, such as books, papers, technical reports, conference proceedings) in order to acquire the necessary skill to participate in courses, seminars, and Masters on network security.
The knowledge of notions and concepts of computer networks, particularly the details of the network and transport level protocols of ISO/OSI model, is strongly required.
Risk management (ISO/IEC 27005 risk management standard); 8 hours
Vulnerability Assessment; 8 hours
Dorking; 2 hours
Crawling; 2 hours
Sniffing; 4 hours
Scannìng; 4 hours
Fingerprinting; 4 hours
• Remote to Local, 1 hour
• User to Root, 1 hour
• Spoofing, 1 hour
• ARP Poisoning, 1 hour
• Distributed Denial of Service, 1 hour
• Low-rate attacks, 1 hour
• Session Hijacking, 1 hour
• Man In The Middle, 1 hour
• Malware , 1 hour
• Botnets, 1 hour
• SQL Injection, 6 hours
• Attacks to web applications, 2 hours
• Cross Site Scripting, 2 hours
• Man in the Browser, 2 hours
• Routing attacks. 2 hours
Peer-to-peer network security: 2 hours
Firewalling: 6 hours
Access Control Lists; 2 hours
Intrusion Detection Systems; 4 hours
Security Information and Event Management; 4 hours
Basics of Cryptography; 6 hours
Secure Shell; 8 hours
IPSEC; 4 hours
TLS/SSL; 2 hours
VoIP application security. 2 hours
The course addresses the following topics: tools for vulnerability identification and assessment, classes of cyber-attacks, cyber-risk management, risk assessment methodologies, intrusion prevention systems, configuration of firewalls, NAT, intrusion detection systems, SIEM (Security Information and Event Management) systems, fundamentals of cryptography, IPSec, SSH, malware.
Textbook: CRYPTOGRAPHY AND NETWORK SECURITY, SIXTH EDITION, W.Stallings
Discussion of a project work, oral exam.
The goal of the exam is to verify the level of achievement of the course objectives.
The exam is composed of two parts, that take place the same day.
The first part is focused on the discussion of the project work prepared by the student on a topic provided by the teacher. The discussion aims at assessing whether the student is able to analyse a network system, identify possible vulnerabilities and develop methods and techniques to protect it from cyber-threats. In case the student demonstrates during the discussion his/her capability of understanding the addressed security issues and identifying solutions, then he/she can access the second step, that is the oral exam. During the oral exam the capability of the student to link and compare the different aspects and topics addressed in the framework of the course is evaluated. The final vote is the outcome of the overall evaluation of the knowledge exhibited by the student during the two parts of the exam.