Course detail

Projecting, Administration and Security of Computer Networks

FEKT-MNSBAcad. year: 2017/2018

Modern civilization depends on a correct functioning of computer networks. Significant attention must therefore be paid to the security and design of these networks. On completing the course, students will have a thorough overview of the functioning, security and design of computer networks. Lectures are mainly dedicated to explaining the protocols in particular computer network layers, the principles of securing computer networks, and the design of computer networks. Laboratory exercises are dedicated to the administration and security of linux servers.

Learning outcomes of the course unit

A student who completes the course will be able to:
• explain the applications of cryptography in computer networks,
• explain the way computer networks in the physical layer function and are secured,
• explain the way computer networks in the link layer function and are secured,
• explain the way computer networks in the network layer function and are secured,
• explain the way computer networks in the transport layer function and are secured,
• explain the way computer networks in the application layer function and are secured,
• explain the general methodology of computer network design,
• deal with the administration and security of linux servers.

Prerequisites

No special knowledge is required.

Co-requisites

Not applicable.

Recommended optional programme components

Not applicable.

Recommended or required reading

Dostálek, L. - Kabelová, A.: Velký průvodce protokoly TCP/IP. Computer Press, Brno 2005. (CS)
Graham, S. - Shah, S.: Administrace systému Linux. Grada, Praha 2003. (CS)
Kállay, F. - Peniak, P.: Počítačové sítě a jejich aplikace. Grada, Praha 2003. (CS)
BURDA, K. Návrh, správa a bezpečnost počítačových sítí. Brno: VUT v Brně, 2014. s. 1-171.

Planned learning activities and teaching methods

Techning methods include lectures and computer laboratories. Course is taking advantage of e-learning system

Assesment methods and criteria linked to learning outcomes

10 points can be obtained for fulfilling the tasks in laboratory exercises and 90 points can be obtained for the examination. The examination is a written one and it is to check whether the student is able to explain the functioning and security of computer networks in different layers of the RM-OSI model.

Language of instruction

Czech

Work placements

Not applicable.

Course curriculum

Lectures:
1. Cryptography in computer networks.
2. Physical layer and its protection.
3. Link layer and its protection.
4. Network layer and its protection – protocols.
5. Network layer and its protection – routing.
6. Transport layer and its protection.
7. Application layer and its protection.
8. WLAN networks.
9. Protection of LAN networks.
10. Network security.
11. Design of the WAN network.
12. IPv6 protocol.
13. Prospective evolutionary trends.

Laboratory exercises:
1. Server installation.
2. Basics of OS Linux.
3. Remote administration.
4. Firewall configuration.
5. FTP server configuration.
6. System monitoring.
7. Web server Apache I.
8. Web server Apache II.
9. Mail server I.
10. Mail server II.
11. Demonstration of selected attacks.
12. Reserved.
13. Credit exercise.

Aims

The goal of the course is to provide students with a good insight into the branch of designing and securing computer networks and their functioning.

Specification of controlled education, way of implementation and compensation for absences

Attendance at Laboratory exercises is obligatory.

Classification of course in study plans

  • Programme EEKR-M1 Master's

    branch M1-TIT , 2. year of study, summer semester, 5 credits, optional specialized

  • Programme EEKR-CZV lifelong learning

    branch ET-CZV , 1. year of study, summer semester, 5 credits, optional specialized

Type of course unit

 

Lecture

26 hours, optionally

Teacher / Lecturer

Laboratory exercise

26 hours, compulsory

Teacher / Lecturer