2023-2024 / INFO0056-1

Securing Networks

Duration

30h Th, 12h Labo., 30h Proj.

Number of credits

 Master of Science (MSc) in Computer Science and Engineering (Even years, not organized in 2023-2024) 5 crédits 
 Master of Science (MSc) in Computer Science and Engineering (double degree programme with HEC) (Even years, not organized in 2023-2024) 5 crédits 
 Master of Science (MSc) in Computer Science (Even years, not organized in 2023-2024) 5 crédits 
 Master of Science (MSc) in Computer Science (joint-degree programme with HEC) (Even years, not organized in 2023-2024) 5 crédits 

Lecturer

Guy Leduc

Language(s) of instruction

English language

Organisation and examination

Teaching in the second semester

Schedule

Schedule online

Units courses prerequisite and corequisite

Prerequisite or corequisite units are presented within each program

Learning unit contents

The course covers security of computer networks. It is composed of the following chapters:

  • End-point authentication
  • Securing applications (email)
  • Securing DNS (DNSSEC)
  • Securing TCP connections (SSL/TLS)
  • Network-layer Security (IPsec)
  • Securing routing (prefix filtering, RPKI, BGPsec)
  • Securing LANs (WiFi, switched Ethernet)
  • Anonymity (mixers, onion routing, TOR)
  • IPv6 Security (seminar by Eric Vyncke, CISCO Systems)

Learning outcomes of the learning unit

At the end of the course students will understand well the basic concepts of network security.

The projects bring out self-learning and team work capabilities, and help improve the writing skills of the students.

Teaching, and all support material, in English allow students to improve their knowledge and skills in this langage.

This course contributes to the learning outcomes I.1, I.2, II.1, II.2, III.1, III.2, IV.1, IV.2, IV.3, IV.4, VI.1, VI.2, VII.1, VII.2, VII.4, VII.5 of the MSc in computer science and engineering.

Prerequisite knowledge and skills

  • Computer network architecture and protocols (TCP/IP, routing, switching)
  • Secret-key and public-key cryptography principles

Planned learning activities and teaching methods

  • Lectures describing in detail the theoretical and practical concepts of the course.
  • Practical project assignments in groups of 2 students.

Mode of delivery (face to face, distance learning, hybrid learning)

The face-to-face lectures are complemented by a seminar and projects. The latter are mainly carried out remotely.

Recommended or required readings

Reference books:

James F. Kurose and Keith W. Ross. Computer Networking - A Top-Down Approach (Sixth Edition), Addison-Wesley, 2012. Also published by Pearson (ISBN 978-0-273-76896-8).

Charlie Kaufman, Radia Perlman, Mike Speciner. Network Security - PRIVATE Communication in a PUBLIC World (2nd edition). Prentice-Hall, 2002 (ISBN 0-13-046019-2).

Slides are available on ecampus.

Any session :

- In-person

oral exam

- Remote

oral exam

- If evaluation in "hybrid"

preferred in-person


Additional information:

The evaluation is twofold: the projects (weight of 40%) and an oral exam on the theory (60%).
At the oral exam the student has to expose clearly and in a synthetical way one part of the course, and prove his/her in-depth understanding by answering questions. A student who has not completed his/her projects is not allowed to take this exam.
The assessment of the project will be based on (1) the completeness of the software, (2) the quality of the programming, and (3) the quality of the report.
The second exam session (in September) is identical to the first one, with the same weighting. And students may improve their projects.

Work placement(s)

Organisational remarks and main changes to the course

The course is organized during the second term (from February to May), on Tuesdays from 8:30AM to 12:30PM. All lectures in English.

Contacts

Teacher: Guy Leduc, Guy.Leduc@uliege.be

Teaching assistant: Maxime Aerts

Association of one or more MOOCs