Universidad de Jaén

Menú local

Syllabus 2013-14 - 14512014 - Security in Communications Networks (Seguridad en redes de telecomunicación)

Caption
  • Level 1: Tutorial support sessions, materials and exams in this language
  • Level 2: Tutorial support sessions, materials, exams and seminars in this language
  • Level 3: Tutorial support sessions, materials, exams, seminars and regular lectures in this language
DEGREE: Grado en Ingeniería telemática
FACULTY: SCHOOL OF ENGINEERING OF LINARES
ACADEMIC YEAR: 2013-14
COURSE: Security in Communications Networks
SYLLABUS
1. COURSE BASIC INFORMATION
NAME: Security in Communications Networks
CODE: 14512014 ACADEMIC YEAR: 2013-14
LANGUAGE: English LEVEL: 1
ECTS CREDITS: 6.0 YEAR: 4 SEMESTER: PC
2. LECTURER BASIC INFORMATION
3. CONTENT DESCRIPTION

Theory units

Unit 0. Introduction. Attacks on communications. Security policies. 

Unit 1. Network hardware and topology. Introdution. Firewalls. IDSs e IPSs.

Unit 2. Protocolos para comunicaciones seguras. Introducción. SSH. SSL/TLS. IPSec. Protocolos de nivel dos.

Unit 3. Criptography. Introduction. Mathematical knowledge. Simetric key algorithms. Asimetric key algorithms. Hash functions.

 

Practice units

Unit 1. Firewall configuration. Iptables. PIX firewall.

Unit 2. Virtual private networks. SSH. IPSec. 802 technologies.

Unit 3. Crytographic algorithms analysis. Simetric key. Asimetric key. Hash functions.

4. COURSE DESCRIPTION AND TEACHING METHODOLOGY

Theorical units of the subject are covered in A1 activitity timetable.

Pratice units of the subject are covered in A2 activitity timetable.

Students expertise acquired during the course will be asessed in A3 activitity timetable.

Students with special educational needs should contact the Student Attention Service (Servicio de Atención y Ayudas al Estudiante) in order to receive the appropriate academic support

5. ASSESSMENT METHODOLOGY

RD 1125/2003 de 5 de septiembre, por el que se establece el sistema europeo de créditos y el sistema de calificaciones en las titulaciones universitarias de carácter oficial, establishes the general procedure for the student evaluation in this subject.

At the end of the course, each student will be able to choose between a continous evalution option and a non-continous one. This decission will be indicated in the final exam.

Activities S1, S2, S3 and S4, as specified in section 'Sistema de evalución' will be considered for the continuos choice. A final exam on the theorical aspects of the subject -S2 and S3- will be accomplished to evaluate skills and competences defined for the subject. This final exam provides half of the total qualification for aspect S2 and S3 in the course. In order to gain a pass, a qualification equal or greater than 4 in 10 must be obtained in the final exam and in activity S4. Furthermore, an evaluation equal or greater than 5 in 10 must be globally acquired, taking into account the mentioned conditions.

The qualification of a positively evaluated part will be preserved during the academic course.

For the non-continous option, a final exam must be accomplished. The following ratios are established for the exams contents: 7 in 10 for S2 and S3 activities, and 3 in 10 for S4 activity.  An evaluation equal or greater than 5 in 10 must be globally acquired, taking into account the mentioned conditions.   

The qualification of a positively evaluated part will be preserved during the academic course.

6. BOOKLIST
MAIN BOOKLIST:
  • Network security, firewalls, and VPNs [Recurso electrónico]. Edition: -. Author: Stewart, James Michael. Publisher: Sudbury, Mass. : Jones & Bartlett Learning, c2011.  (Library)
  • Understanding Cryptography [Recurso electrónico] : A Textbook for Students and Practitioners. Edition: -. Author: Paar, Christof. Publisher: Berlin, Heidelberg : Springer-Verlag Berlin Heidelberg, 2010  (Library)
ADDITIONAL BOOKLIST:
  • Network security: private communications in a public world. Edition: 2nd. ed. Author: Kaufman, Charlie. Publisher: Upper Saddle River, NJ: Prentice Hall PTR, 2002  (Library)
  • Firewalls and Internet security: repelling the wily hacker. Edition: 2nd ed. Author: Cheswick, William R.. Publisher: Boston, [etc.]: Addison-Wesley, cop. 2003  (Library)