1. The introduction to communications security concerns, technology overview, the relation to other subjects and topics.
2. Wireless networks vulnerabilities, CUDA-base WiFi network penetration tests.
3. Security concerns of wireless sensor networks, message delivery blocking, message faking and eavesdropping, sensor manipulation.
4. Mobile networks vulnerabilities, active GSM network jamming, UMTS and LTE jamming resilience, base station faking and scanning, IMSI and content sniffing.
5. Eavesdropping in the mobile networks and its detection, encryption profiles in various technologies, known security weaknesses of GSM (A5 cipher), location and traffic data mining.
6. Principles of transmitter location in the radio networks, beacon-based in-building location and orientation, possible ways for mobile network device location, movement monitoring and practical implementation.
7. An invited lecture on practical communication security incidents.
8. Interferometry, Raman, Brillouin and Rayleigh dispersion and their usage in optical fiber detectors.
9. Principles of key distribution using quantum mechanics (QKD), QKD protocols - BB84, SARG04 and E91, QKD in quantum networks.
10. Network traffic analysis tools - IOS Diagnostic Tools, Packet Capturing, SNMP and Netflow. Traffic analysis based on signatures, advanced behavioral analysis of Netflow data.
11. VoIP security concerns, eavesdropping, content modification, DoS, deliberate service termination and quality degradation. Recommended measures.
12. Honeypots and Honeynets. Design of VoIP Honeypot.
13. Authentication, multifactor authentication, single-sign-on systems and authorization system design based on OpenAuth.
14. Emerging technologies and discussions on future security trends.
2. Wireless networks vulnerabilities, CUDA-base WiFi network penetration tests.
3. Security concerns of wireless sensor networks, message delivery blocking, message faking and eavesdropping, sensor manipulation.
4. Mobile networks vulnerabilities, active GSM network jamming, UMTS and LTE jamming resilience, base station faking and scanning, IMSI and content sniffing.
5. Eavesdropping in the mobile networks and its detection, encryption profiles in various technologies, known security weaknesses of GSM (A5 cipher), location and traffic data mining.
6. Principles of transmitter location in the radio networks, beacon-based in-building location and orientation, possible ways for mobile network device location, movement monitoring and practical implementation.
7. An invited lecture on practical communication security incidents.
8. Interferometry, Raman, Brillouin and Rayleigh dispersion and their usage in optical fiber detectors.
9. Principles of key distribution using quantum mechanics (QKD), QKD protocols - BB84, SARG04 and E91, QKD in quantum networks.
10. Network traffic analysis tools - IOS Diagnostic Tools, Packet Capturing, SNMP and Netflow. Traffic analysis based on signatures, advanced behavioral analysis of Netflow data.
11. VoIP security concerns, eavesdropping, content modification, DoS, deliberate service termination and quality degradation. Recommended measures.
12. Honeypots and Honeynets. Design of VoIP Honeypot.
13. Authentication, multifactor authentication, single-sign-on systems and authorization system design based on OpenAuth.
14. Emerging technologies and discussions on future security trends.