Duration
30h Th, 12h Labo., 30h Proj.
Number of credits
Lecturer
Language(s) of instruction
English language
Organisation and examination
Teaching in the second semester
Schedule
Units courses prerequisite and corequisite
Prerequisite or corequisite units are presented within each program
Learning unit contents
The course covers security of computer networks. It is composed of the following chapters:
- End-point authentication
- Securing applications (email)
- Securing DNS (DNSSEC)
- Securing TCP connections (SSL/TLS)
- Network-layer Security (IPsec)
- Securing routing (prefix filtering, RPKI, BGPsec)
- Securing LANs (WiFi, switched Ethernet)
- Anonymity (mixers, onion routing, TOR)
- IPv6 Security (seminar by Eric Vyncke, CISCO Systems)
Learning outcomes of the learning unit
At the end of the course students will understand well the basic concepts of network security.
The projects bring out self-learning and team work capabilities, and help improve the writing skills of the students.
Teaching, and all support material, in English allow students to improve their knowledge and skills in this langage.
This course contributes to the learning outcomes I.1, I.2, II.1, II.2, III.1, III.2, IV.1, IV.2, IV.3, IV.4, VI.1, VI.2, VII.1, VII.2, VII.4, VII.5 of the MSc in computer science and engineering.
Prerequisite knowledge and skills
- Computer network architecture and protocols (TCP/IP, routing, switching)
- Secret-key and public-key cryptography principles
Planned learning activities and teaching methods
- Lectures describing in detail the theoretical and practical concepts of the course.
- Practical project assignments in groups of 2 students.
Mode of delivery (face to face, distance learning, hybrid learning)
The face-to-face lectures are complemented by a seminar and projects. The latter are mainly carried out remotely.
Course materials and recommended or required readings
Reference books:
James F. Kurose and Keith W. Ross. Computer Networking - A Top-Down Approach (Sixth Edition), Addison-Wesley, 2012. Also published by Pearson (ISBN 978-0-273-76896-8).
Charlie Kaufman, Radia Perlman, Mike Speciner. Network Security - PRIVATE Communication in a PUBLIC World (2nd edition). Prentice-Hall, 2002 (ISBN 0-13-046019-2).
Slides are available on ecampus.
Any session :
- In-person
oral exam
- Remote
oral exam
- If evaluation in "hybrid"
preferred in-person
Additional information:
The evaluation is twofold: the projects (weight of 40%) and an oral exam on the theory (60%).
At the oral exam the student has to expose clearly and in a synthetical way one part of the course, and prove his/her in-depth understanding by answering questions. A student who has not completed his/her projects is not allowed to take this exam.
The assessment of the project will be based on (1) the completeness of the software, (2) the quality of the programming, and (3) the quality of the report.
The second exam session (in September) is identical to the first one, with the same weighting. And students may improve their projects.
Work placement(s)
Organisational remarks and main changes to the course
The course is organized during the second term (from February to May), on Tuesdays from 8:30AM to 12:30PM. All lectures in English.
Contacts
Teacher: Guy Leduc, Guy.Leduc@uliege.be
Teaching assistant: Lev Malcev, lev.malcev@uliege.be