Projecting, Administration and Security of Computer Networks
FEKT-MPA-NSBAcad. year: 2020/2021
Modern civilization depends on a correct functioning of computer networks. Significant attention must therefore be paid to the security and design of these networks. On completing the course, students will have a thorough overview of the functioning, security and design of computer networks. Lectures are mainly dedicated to explaining the protocols in particular computer network layers, the principles of securing computer networks, and the design of computer networks. Laboratory exercises are dedicated to the administration and security of linux servers.
Learning outcomes of the course unit
A student who completes the course will be able to:
• explain the applications of cryptography in computer networks,
• explain the way computer networks in the physical layer function and are secured,
• explain the way computer networks in the link layer function and are secured,
• explain the way computer networks in the network layer function and are secured,
• explain the way computer networks in the transport layer function and are secured,
• explain the way computer networks in the application layer function and are secured,
• explain the general methodology of computer network design,
• deal with the administration and security of linux servers.
No special knowledge is required.
Recommended optional programme components
Recommended or required reading
Kurose J., Ross K.: Computer Networking: A Top-Down Approach. Pearson, Boston 2016. (EN)
Forouzan B. A.: Data Communications and Networking. McGraw-Hill Education, N. York 2012. (EN)
Planned learning activities and teaching methods
Techning methods include lectures and computer laboratories. Course is taking advantage of e-learning system
Assesment methods and criteria linked to learning outcomes
20 points can be obtained for fulfilling the tasks in laboratory exercises and 80 points can be obtained for the examination. The examination is a written one and it is to check whether the student is able to explain the functioning and security of computer networks in different layers of the RM-OSI model.
Language of instruction
1. Cryptography in computer networks.
2. Physical layer and its protection.
3. Link layer and its protection.
4. Network layer and its protection – protocols.
5. Network layer and its protection – routing.
6. Transport layer and its protection.
7. Application layer and its protection.
8. WLAN networks.
9. Access control.
10. Anonymity network.
11. Design of the WAN network.
12. Evolutionary trends.
1. Server installation.
2. Basics of OS Linux.
3. Remote administration.
4. FTP server configuration.
5. Web server Apache.
6. Firewall configuration - 1. part.
7. Firewall configuration - 2. part.
8. Man-in-the-Middle attack.
9. SSL strip.
10. DoS attacks.
11. System monitoring.
12. Credit exercise.
The goal of the course is to provide students with a good insight into the branch of designing and securing computer networks and their functioning.
Specification of controlled education, way of implementation and compensation for absences
Attendance at Laboratory exercises is obligatory.
Classification of course in study plans
- Programme MPA-EAK Master's, 1. year of study, summer semester, 5 credits, compulsory