Lecturer(s)
|
-
Břehovský Petr, Ing.
-
Vohnout Rudolf, Ing. Ph.D.
|
Course content
|
Content of lectures: 0. Introduction to network infrastructure hardening, solution overview. 1. Network attack types. 2. Access layer (physical) network security. 3. Link (switching) layer network security. 4. Network layer security. 5. Higher layers network security. 6. Wireless security and network traffic monitoring. 7. IDS and IPS: principles, implementation and integration. 8. SNORT and IPTables based IDS/IPS. 9. Honeypot and honeynet: known and not yet known attacks analysing. 10. WAF: WEB Application Firewall and WEB application protection. 11. WAF based on Apache module mod_security. 12. Integration with SIEM. Content of practicals: DHCP spoofing, MAC address flooding, VLAN hopping, ARP spoofing/poisoning, Network storms Network devices security, access port security, port ACL. IEEE 802.1x, MAC security. Standard and extended ACL and their application, NAT, VLAN ACL. DHCP Snooping, IP Source Guard, Firewalls and their configurations, IPSec + VPN. Configuration and analysis of IDS/IPS based on Snort and IPtables. Configuration and analysis of honeyd and dionaea honeypots. Configuration and analysis of mod_security based WAF.
|
Learning activities and teaching methods
|
Monologic (reading, lecture, briefing), Dialogic (discussion, interview, brainstorming), Demonstration, Laboratory, Practical training, Group work
- Class attendance
- 42 hours per semester
- Preparation for exam
- 42 hours per semester
- Preparation for classes
- 41 hours per semester
|
Learning outcomes
|
This course aims at advanced methods of infrastructure security. To acquaint students with a modern infrastructure securities on all network layers, as well as on end devices and other components.
The student will have a comprehensive knowledge of computer infrastructure management and security both at the network and application level.
|
Prerequisites
|
Mandatory prerequisites: UAI 717, UAI 707. Basic knowledge of network and application infrastructure and protocols.
|
Assessment methods and criteria
|
Oral examination, Student performance assessment, Combined exam
Submission of exercise assignments, and preparation of a term paper.
|
Recommended literature
|
-
Carl ENDORF, Eugen SCHULTZ, Jim Mellander Detekce a prevence počítačového útoku, ISBN 80-247-1035-8.
-
FRAHIM Jazib, Omar SANTOS and Andrew OSSIPOV. Cisco ASA: All-in-one Next-Generation Firewall, IPS, and VPN Services, Version 3. 2014. ISBN 978-1587143076..
|