Projecting, Administration and Security of Computer Networks
FEKT-MPA-NSBAcad. year: 2022/2023
Modern civilization depends on a correct functioning of computer networks. Significant attention must therefore be paid to the security and design of these networks. On completing the course, students will have a thorough overview of the functioning, security and design of computer networks. Lectures are mainly dedicated to explaining the protocols in particular computer network layers, the principles of securing computer networks, and the design of computer networks. Laboratory exercises are dedicated to the administration and security of linux servers.
Learning outcomes of the course unit
• explain the applications of cryptography in computer networks,
• explain the way computer networks in the physical layer function and are secured,
• explain the way computer networks in the link layer function and are secured,
• explain the way computer networks in the network layer function and are secured,
• explain the way computer networks in the transport layer function and are secured,
• explain the way computer networks in the application layer function and are secured,
• explain the general methodology of computer network design,
• deal with the administration and security of linux servers.
Recommended optional programme components
Forouzan B. A.: Data Communications and Networking. McGraw-Hill Education, N. York 2012. (EN)
Planned learning activities and teaching methods
Assesment methods and criteria linked to learning outcomes
Language of instruction
1. Cryptography in computer networks.
2. Physical layer and its protection.
3. Link layer and its protection.
4. Network layer and its protection – protocols.
5. Network layer and its protection – routing.
6. Transport layer and its protection.
7. Application layer and its protection.
8. WLAN networks.
9. Access control.
10. Anonymity network.
11. Design of the WAN network.
12. Evolutionary trends.
1. Server installation.
2. Basics of OS Linux.
3. Remote administration.
4. FTP server configuration.
5. Web server Apache.
6. Firewall configuration - 1. part.
7. Firewall configuration - 2. part.
8. Man-in-the-Middle attack.
9. SSL strip.
10. DoS attacks.
11. System monitoring.
12. Credit exercise.
Specification of controlled education, way of implementation and compensation for absences
Classification of course in study plans
- Programme MPA-EAK Master's, 1. year of study, summer semester, 5 credits, compulsory