2021-2022 / INFO0056-1

Securing Networks


30h Th, 12h Labo., 30h Proj.

Number of credits

 Master of Science (MSc) in Computer Science and Engineering5 crédits 
 Master of Science (MSc) in Computer Science and Engineering (double diplômation avec HEC)5 crédits 
 Master of Science (MSc) in Computer Science5 crédits 
 Master of Science (MSc) in Computer Science (double diplômation avec HEC)5 crédits 


Language(s) of instruction

English language

Organisation and examination

Teaching in the second semester


Schedule online

Units courses prerequisite and corequisite

Prerequisite or corequisite units are presented within each program

Learning unit contents

The course covers security of computer networks. It is composed of the following chapters:

  • End-point authentication
  • Securing applications (email)
  • Securing DNS (DNSSEC)
  • Securing TCP connections (SSL/TLS)
  • Network-layer Security (IPsec)
  • Securing routing (prefix filtering, RPKI, BGPsec)
  • Securing LANs (WiFi, switched Ethernet)
  • Anonymity (mixers, onion routing, TOR)
  • IPv6 Security (seminar by Eric Vyncke, CISCO Systems)

Learning outcomes of the learning unit

At the end of the course students will understand well the basic concepts of network security.
The projects bring out self-learning and team work capabilities, and help improve the writing skills of the students.
Teaching, and all support material, in English allow students to improve their knowledge and skills in this langage.

Prerequisite knowledge and skills

  • Computer network architecture and protocols (TCP/IP, routing, switching)
  • Secret-key and public-key cryptography principles

Planned learning activities and teaching methods

  • Lectures (30 hours) describing in detail the theoretical and practical concepts of the course.
  • Practical project assignments in groups of 2 students.

Mode of delivery (face to face, distance learning, hybrid learning)

The face-to-face lectures are complemented by a seminar and projects. The latter are mainly carried out remotely.

Recommended or required readings

Reference books:
James F. Kurose and Keith W. Ross. Computer Networking - A Top-Down Approach (Sixth Edition), Addison-Wesley, 2012. Also published by Pearson (ISBN 978-0-273-76896-8).
Charlie Kaufman, Radia Perlman, Mike Speciner. Network Security - PRIVATE Communication in a PUBLIC World (2nd edition). Prentice-Hall, 2002 (ISBN 0-13-046019-2).
Slides : http://www.montefiore.ulg.ac.be/~leduc/cours/ISIR.html

Assessment methods and criteria

Any session :

- In-person

oral exam

- Remote

oral exam

- If evaluation in "hybrid"

preferred in-person

Additional information:

The evaluation is twofold: the projects (weight of 40%) and an oral exam on the theory (60%).
At the oral exam the student has to expose clearly and in a synthetical way one part of the course, and prove his/her in-depth understanding by answering questions. A student who has not completed his/her projects is not allowed to take this exam.
The assessment of the project will be based on (1) the completeness of the software, (2) the quality of the programming, and (3) the quality of the report.
The second exam session (in September) is identical to the first one, with the same weighting. And students may improve their projects.

Work placement(s)

Organizational remarks

The course is organized during the second term (from February to May), on Tuesdays from 8:30AM to 12:30PM. All lectures in English.


Teacher: Guy Leduc, Guy.Leduc@uliege.be
Teaching assistants:

  • Cyril Soldani,  Cyril.Soldani@uliege.be
  • Sam Hiard, S.Hiard@uliege.be