Skip to main content
Skip header
Terminated in academic year 2023/2024

Security in Communications

Type of study Follow-up Master
Language of instruction Czech
Code 440-4113/01
Abbreviation BvK
Course title Security in Communications
Credits 4
Coordinating department Department of Telecommunications
Course coordinator prof. Ing. Miroslav Vozňák, Ph.D.

Subject syllabus

1. Introduction to security, network security, scheme for network attack, classification and techniques of attacks.

2. Networks security elements - Juniper, Junos system, emulation of networks elements, system GNS3

3. PKI - Public-Key Infrastructure, Symetric, Asymetric encryption, Hash function, Diffie-Helmann, X.509

4. Secure Sockets Layer, setting up SSL connection, Open SSL library and the using OpenSSL.

5. Security on transport layer and authentication protocol SSH, SSH tunels. Authentication in nettwork, Kerberos system.

6. Secuirty on network layer - IPsec (AH,ESP,IKE, ISAKMP) a transport layer (TLS, WTLS, DTLS)

7. Network security in VSB, national security teams CSIRT and CERT, cyber criminality

8. Security of wireless networks - WiFi, GSM, Bluetooth, Zigbee, UMTS

9. Advances computational methods in cryptography based on GPU and their impact on current used security meaures in communications

10. Firewall - basic classification, methods of filtering on network and transport layers, state inspections and pracitcal solutions with IPtables. Introduction into IPS/IDS

11. Snort - possibility of application in network, components, rules IPS with SnortSam

12. Security in IPtelephony - H.323 and SIp signalling, media security SRTP and ZRTP. Spam in IP telephony and measures of defense

13. Well-known attacks in IPtelephony, penetration testing, DoS on VoIP and IMS Services

14. Fight against criminality on Internet, CERT/CSIRT teams, project INDECT (EU FP 7), CALEA and law framework in EU and information on exam

Exercises
Introduction into course, history and future of cryptography. W1
Network scanning using Nmap and vulnerability tests with Nessus – remote security scanner. W3
Security in 802.11 networks, NetStumbler and Kismet + Essay assignment. W8
Advanced computational methods (CUDA) used in cryptography. W9
Presentation of the essay, work on the project - 5 points. W13
Presentation of the project – 15 points. W14

Labs
Introduction into Juniper security solutions, GNS3 and introduction into JUNOS configuration. W2
Introduction into OpenSSL library, generating a certification authority, public and private keys, signing certificates. W4
Implementation of OpenVPN, design of the network topology. W5
Configuration of the VPN using Juniper emulation in GNS3. W6
VPN tunnel using OpenVPN - 5 points. W7
Introduction into IDS and IPS open-source systems – Snort, Suricata +project assignment. W10
Security rules configuration using Juniper emulation in GNS3. W11
Configuration of the working IDS with Juniper or SNORT, Suricata - 5 points. W12

Literature

STALLINGS W. Cryptography and Network Security: Principles and Practice. Pearson: 8
edition, 2020. ISBN 9780135764039 .

Advised literature

GUPTA B. B. et al. Handbook of computer networks and cyber security: Principles and paradigms, Springer, 2019. ISBN 9783030222772 .
COLLIER,M.,ENDLER,D. Hacking VoIP exposed. New York: McGraww-Hill, 2007. ISBN 9780072263640 .