Course Unit Code | 440-4117/01 |
---|
Number of ECTS Credits Allocated | 5 ECTS credits |
---|
Type of Course Unit * | Compulsory |
---|
Level of Course Unit * | Second Cycle |
---|
Year of Study * | First Year |
---|
Semester when the Course Unit is delivered | Winter Semester |
---|
Mode of Delivery | Face-to-face |
---|
Language of Instruction | Czech |
---|
Prerequisites and Co-Requisites | There are no prerequisites or co-requisites for this course unit |
---|
Name of Lecturer(s) | Personal ID | Name |
---|
| VOZ29 | prof. Ing. Miroslav Vozňák, Ph.D. |
| REZ106 | Ing. Filip Řezáč, Ph.D. |
Summary |
---|
The course will provide an explanation of advanced mechanisms for securing communication networks regardless of the transmission medium. The student will get acquainted with modern cryptographic tools and protocols, which they will learn to apply mainly in the practical level to new or existing network infrastructures. |
Learning Outcomes of the Course Unit |
---|
Learning outcomes are set so that students are able to identify, apply and solve problems in the field of advanced cyber security and understand in detail modern methods of securing metallic, wireless and optical communications. |
Course Contents |
---|
1. Introduction to security, history of network security, development and modern trends in security.
2. Distribution of modern ciphers - symmetric / asymmetric, block / stream, cipher modes, key distribution options - DH.
3. Hash functions and one-way modern ciphers - MD5 and SHA1 vs. SHA2, SHA3, BLAKE2 - principle of function, vulnerabilities, implementation, use.
4. PKI - certificates, PGP, X.509, elliptic curves, digital signature.
5. SSL / TLS libraries - configurations and designs over the CA domain - self-sign, revocation, root and intermediate certificates, wildcard certificates.
6. SSH - version, description, advanced configuration - file exchange, traffic tunneling.
7. VPN - principle, TUN / TAP modes, IPsec vs. TLS. Modern approaches - OVPN vs. Wireguard.
8. Tools for analysis of network elements and network traffic - IOS Diagnostic Tools, Packet Capturing, SNMP and NetFlow, signature-based traffic analysis, advanced behavioral analysis from NetFlow.
9. Security in wireless networks - security protocols WPA2, WPA3 and their modes - PSK, EAP, IoT security and security of mobile networks - A3, A5, A8, MILENAGE.
10. Authentication, multifactor authentication (RADIUS, DIAMETER, KERBEROS), single sign-on (SSO) systems.
11. Selected parts of biometric authentication.
12. Interferometry, Raman, Brillouin and Rayleigh scattering and the use of fiber optic sensors in security applications.
13. Principles of key distribution using physical principles of quantum mechanics (QKD), protocols QKD - BB84, SARG04 and E91, QKD in quantum networks.
14. Introduction to penetration and performance testing - security auditing, testing methodologies and security analysis and certification - Common Criteria, JISE, FIPS, EAL. |
Recommended or Required Reading |
---|
Required Reading: |
---|
1. Yuri Diogenes, Erdal Ozkaya, Cybersecurity: Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals, 2nd Edition, 2019, ASIN: B081SSGKF5. |
1. ŘEZÁČ, F., VOZŇÁK, M., ROZHON, J.: Bezpečnost v komunikacích, 2013, vysokoškolská skripta
2. Yuri Diogenes, Erdal Ozkaya, Cybersecurity: Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals, 2nd Edition, 2019, ASIN: B081SSGKF5 |
Recommended Reading: |
---|
1. Steve Suehring, Linux Firewalls: Enhancing Security with nftables and Beyond, 2015, ASIN: B00SN5JYTW
2. Ivan Ristic, Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications, 2014, ISBN-13: 978-1907117046 |
1. Steve Suehring, Linux Firewalls: Enhancing Security with nftables and Beyond, 2015, ASIN: B00SN5JYTW
2. Jan Kolouch, CyberSecurity, 2019, ISBN 9788088168317
3. Jan Kolouch, CyberCrime, 2017, ISBN 978-80-88168-15-7 |
Planned learning activities and teaching methods |
---|
Lectures, Tutorials, Experimental work in labs, Project work |
Assesment methods and criteria |
---|
Task Title | Task Type | Maximum Number of Points (Act. for Subtasks) | Minimum Number of Points for Task Passing |
---|
Credit and Examination | Credit and Examination | 100 (100) | 51 |
Credit | Credit | 40 (40) | 25 |
Projekt | Project | 15 | 0 |
Referát/esej | Other task type | 10 | 0 |
Laboratorní úloha 1 | Laboratory work | 5 | 0 |
Laboratorní úloha 2 | Laboratory work | 5 | 0 |
Laboratorní úloha 3 | Laboratory work | 5 | 0 |
Examination | Examination | 60 (60) | 26 |
Test | Written examination | 30 | 0 |
Praktická část | Other task type | 20 | 0 |
Ústní zkouška | Oral examination | 10 | 0 |