1. Introduction to security, network security, scheme for network attack, classification and techniques of attacks.
2. Networks security elements - Juniper, Junos system, emulation of networks elements, system GNS3
3. PKI - Public-Key Infrastructure, Symetric, Asymetric encryption, Hash function, Diffie-Helmann, X.509
4. Secure Sockets Layer, setting up SSL connection, Open SSL library and the using OpenSSL.
5. Security on transport layer and authentication protocol SSH, SSH tunels. Authentication in nettwork, Kerberos system.
6. Secuirty on network layer - IPsec (AH,ESP,IKE, ISAKMP) a transport layer (TLS, WTLS, DTLS)
7. Network security in VSB, national security teams CSIRT and CERT, cyber criminality
8. Security of wireless networks - WiFi, GSM, Bluetooth, Zigbee, UMTS
9. Advances computational methods in cryptography based on GPU and their impact on current used security meaures in communications
10. Firewall - basic classification, methods of filtering on network and transport layers, state inspections and pracitcal solutions with IPtables. Introduction into IPS/IDS
11. Snort - possibility of application in network, components, rules IPS with SnortSam
12. Security in IPtelephony - H.323 and SIp signalling, media security SRTP and ZRTP. Spam in IP telephony and measures of defense
13. Well-known attacks in IPtelephony, penetration testing, DoS on VoIP and IMS Services
14. Fight against criminality on Internet, CERT/CSIRT teams, project INDECT (EU FP 7), CALEA and law framework in EU and information on exam
Exercises
Introduction into course, history and future of cryptography. W1
Network scanning using Nmap and vulnerability tests with Nessus – remote security scanner. W3
Security in 802.11 networks, NetStumbler and Kismet + Essay assignment. W8
Advanced computational methods (CUDA) used in cryptography. W9
Presentation of the essay, work on the project - 5 points. W13
Presentation of the project – 15 points. W14
Labs
Introduction into Juniper security solutions, GNS3 and introduction into JUNOS configuration. W2
Introduction into OpenSSL library, generating a certification authority, public and private keys, signing certificates. W4
Implementation of OpenVPN, design of the network topology. W5
Configuration of the VPN using Juniper emulation in GNS3. W6
VPN tunnel using OpenVPN - 5 points. W7
Introduction into IDS and IPS open-source systems – Snort, Suricata +project assignment. W10
Security rules configuration using Juniper emulation in GNS3. W11
Configuration of the working IDS with Juniper or SNORT, Suricata - 5 points. W12
2. Networks security elements - Juniper, Junos system, emulation of networks elements, system GNS3
3. PKI - Public-Key Infrastructure, Symetric, Asymetric encryption, Hash function, Diffie-Helmann, X.509
4. Secure Sockets Layer, setting up SSL connection, Open SSL library and the using OpenSSL.
5. Security on transport layer and authentication protocol SSH, SSH tunels. Authentication in nettwork, Kerberos system.
6. Secuirty on network layer - IPsec (AH,ESP,IKE, ISAKMP) a transport layer (TLS, WTLS, DTLS)
7. Network security in VSB, national security teams CSIRT and CERT, cyber criminality
8. Security of wireless networks - WiFi, GSM, Bluetooth, Zigbee, UMTS
9. Advances computational methods in cryptography based on GPU and their impact on current used security meaures in communications
10. Firewall - basic classification, methods of filtering on network and transport layers, state inspections and pracitcal solutions with IPtables. Introduction into IPS/IDS
11. Snort - possibility of application in network, components, rules IPS with SnortSam
12. Security in IPtelephony - H.323 and SIp signalling, media security SRTP and ZRTP. Spam in IP telephony and measures of defense
13. Well-known attacks in IPtelephony, penetration testing, DoS on VoIP and IMS Services
14. Fight against criminality on Internet, CERT/CSIRT teams, project INDECT (EU FP 7), CALEA and law framework in EU and information on exam
Exercises
Introduction into course, history and future of cryptography. W1
Network scanning using Nmap and vulnerability tests with Nessus – remote security scanner. W3
Security in 802.11 networks, NetStumbler and Kismet + Essay assignment. W8
Advanced computational methods (CUDA) used in cryptography. W9
Presentation of the essay, work on the project - 5 points. W13
Presentation of the project – 15 points. W14
Labs
Introduction into Juniper security solutions, GNS3 and introduction into JUNOS configuration. W2
Introduction into OpenSSL library, generating a certification authority, public and private keys, signing certificates. W4
Implementation of OpenVPN, design of the network topology. W5
Configuration of the VPN using Juniper emulation in GNS3. W6
VPN tunnel using OpenVPN - 5 points. W7
Introduction into IDS and IPS open-source systems – Snort, Suricata +project assignment. W10
Security rules configuration using Juniper emulation in GNS3. W11
Configuration of the working IDS with Juniper or SNORT, Suricata - 5 points. W12