The first half of this course focuses on cryptographic technologies. The functions and mechanisms of cryptographic technologies such as cryptosystems and authentication scheme that are used in the Internet are explained. The latter half focuses on network security. Various attack techniques, Web security, DNS/Email security, and techniques for defense are explained.
Threat to communication networks grows every year, and a variety of security technologies are investigated to defend networks. Still, they are not defended completely. Learning the security technologies, students are expected to be able to investigate and analyze appropriately the situation.
At the end of this course, students will be able to :
1) have an understanding of fundamental knowledge to defend networks from threat,
2) appropriately investigate and analyze the situation of networks,
3) select and use appropriate security technologies.
Cryptosystem, authentication, digital signature, PKI, access control, malicious software, port scan, DoS attack, firewall, Anti-Virus Software
✔ Specialist skills | Intercultural skills | Communication skills | Critical thinking skills | ✔ Practical and/or problem-solving skills |
In the first half, mainly the lecturer introduces various techniques using slides.
The latter half includes practical training using computers.
Course schedule | Required learning | |
---|---|---|
Class 1 | History of cryptosystem and private-key cryptosystem | In daily life, have an interest in security and the technology used there . |
Class 2 | Message authentication | |
Class 3 | DH Key exchange and public-key cryptosystem | |
Class 4 | Digital signature and Public-key infrastructure | |
Class 5 | User authentication | |
Class 6 | Other cryptographic technologies | |
Class 7 | Summary of first half and intermidiate examination | |
Class 8 | Overview of network security 1 : vulnerability, outline of attacks and access control | |
Class 9 | Overview of network security 1 : vulnerability and malicious softwares | |
Class 10 | Various attack techniques 1: port scanning, DoS attack, etc. | |
Class 11 | Various attack techniques 1: session hijacking,, social engineering, etc. | |
Class 12 | Security on Web | |
Class 13 | Security on DNS and Email | |
Class 14 | Defence techniques 1 : firewall, Anti-Virus Software, etc. | |
Class 15 | Defence techniques 2 : advanced defence techniques and privacy protection |
none
The teaching materials will be distributed in each class.
Students will be assessed on their understanding of fundamental concepts and usage of cryptographic techniques and network security, and their ability to investigate and analyse current security situation.
Students' course scores are based on intermidiate exam (50%) and reports (50%).
No prerequisites.