440-6010/02 – Security of Communication Technology (BKT)
Gurantor department | Department of Telecommunications | Credits | 10 |
Subject guarantor | doc. Ing. Jaroslav Zdrálek, Ph.D. | Subject version guarantor | doc. Ing. Jaroslav Zdrálek, Ph.D. |
Study level | postgraduate | Requirement | Choice-compulsory |
Year | | Semester | winter + summer |
| | Study language | English |
Year of introduction | 2010/2011 | Year of cancellation | |
Intended for the faculties | FEI | Intended for study types | Doctoral |
Subject aims expressed by acquired skills and competences
The goal of this subject is to present to students with the security of communication networks and with the design of networks that are resistant to attacks and abusing data.
Teaching methods
Lectures
Individual consultations
Experimental work in labs
Project work
Summary
Security of communication is main goal of protection information, belongings and people. There use many principes for ensure this goal. First is search possibilty the threats from network users. Second are protocols to prohibitive intrusion to communication.
Compulsory literature:
Mansfield K. C. Jr., Antonakos J. L.: Computer Networking for LANs to WANs: Hardware, Software and Security (Networking (Course Technology)). 1 edition Delmar Cengage Learning 2009, 1024 pages, ISBN-13: 978-1423903161.
Hogg S., Vyncke E.: IPv6 Security. 1 edition Cisco Press 2008, 576 pages, ISBN-13: 978-1587055942.
Recommended literature:
Northcutt S., Zeltser L., Winters S, Kent K., Ritchey R. W.: Inside Network Perimeter Security (2nd Edition). Amazon, 768pp. ISBN-10: 0672327376, ISBN-13: 978-0672327377
Mansfield K. C. Jr., Antonakos J. L.: Computer Networking for LANs to WANs: Hardware, Software and Security (Networking (Course Technology)). 1 edition Delmar Cengage Learning 2009, 1024 pages, ISBN-13: 978-1423903161.
Way of continuous check of knowledge in the course of semester
During the study the thematically oriented works are processed, the content and accuracy is consulted within individual lessons.
E-learning
Other requirements
The knowledge of network services is required.
Prerequisities
Subject has no prerequisities.
Co-requisities
Subject has no co-requisities.
Subject syllabus:
Autentization and authorization.
UTM devices - Unified threat management.
Cryptography and basic properties.
Safety transfer of data.
Protocols for security data transfer.
Electronic signature.
Certification.
Project INDECT.
Social engeneering.
Audit of security network and data.
Conditions for subject completion
Occurrence in study plans
Occurrence in special blocks