Educational guide
IDENTIFYING DATA 2023_24
Subject SECURITY IN COMMUNICATION NETWORKS Code 00709030
Study programme
0709 - GRADO EN INGENIERÍA INFORMÁTICA
Descriptors Credit. Type Year Period
6 Optional Third Second
Language
Castellano
Prerequisites
Department ING.ELECTR.DE SIST. Y AUTOMATI
Coordinador
GARCÍA RODRÍGUEZ , ISAÍAS
E-mail igarr@unileon.es
mcbenc@unileon.es
javem@unileon.es
-
Lecturers
BENAVIDES CUÉLLAR , MARÍA DEL CARMEN
GARCÍA RODRÍGUEZ , ISAÍAS
AVELEIRA MATA , JOSE ANTONIO
BENITEZ ANDRADES , MIGUEL ANGEL
Web http://agora.unileon.es
General description The student will learn about the different threats that can be faced in a communication network, stressing the case of Internet. This study will be achieved by means of different security models. The student will also gain skills neccesary to know, configure, manage and use different security tools.
Tribunales de Revisión
Tribunal titular
Cargo Departamento Profesor
Presidente ING.ELECTR.DE SIST. Y AUTOMATI DIEZ DIEZ , ANGELA
Secretario ING.ELECTR.DE SIST. Y AUTOMATI FERNANDEZ LOPEZ , CARLOS
Vocal ING.ELECTR.DE SIST. Y AUTOMATI FERRERO FERNANDEZ , MIGUEL
Tribunal suplente
Cargo Departamento Profesor
Presidente ING.ELECTR.DE SIST. Y AUTOMATI FOCES MORAN , JOSE MARIA
Secretario ING.ELECTR.DE SIST. Y AUTOMATI ALAIZ RODRIGUEZ , ROCIO
Vocal ING.ELECTR.DE SIST. Y AUTOMATI ALEGRE GUTIERREZ , ENRIQUE

Competencias
Code  
A18115
A18129
B5613
B5623
B5626
C5 CMECES5 That students have developed those learning skills necessary to undertake further studies with a high degree of autonomy

Learning aims
Competences
A18115
A18129
B5613
B5623
B5626
C5

Contents
Topic Sub-topic

Planning
Methodologies  ::  Tests
  Class hours Hours outside the classroom Total hours
Personal tuition 2 0 2
 
Laboratory practicals 30 39 69
Problem solving, classroom exercises 4 4 8
 
Lecture 26 39 65
 
Mixed tests 6 0 6
 
(*)The information in the planning table is for guidance only and does not take into account the heterogeneity of the students.

Methodologies
Methodologies   ::  
  Description
Personal tuition
Laboratory practicals
Problem solving, classroom exercises
Lecture

Personalized attention
 
Personal tuition
Description

Assessment
  Description Qualification
Laboratory practicals 25%
Mixed tests 75%
 
Other comments and second call

Sources of information
Access to Recommended Bibliography in the Catalog ULE

Basic , Intrusion Detection Systems with Snort, O'Reilly Media, 2004
Rafeeq Ur Rehman, Intrusion Detection Systems with Snort. Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID, Prentice Hall,
John A. Vacca, Network and system security, Syngress, 2010
Chris Fry and Martin Nystrom, Security Monitoring, O'Reilly, 2009
Richard Bejtlich, The Tao of Network Security Monitoring Beyond Intrusion Detection, Addison Wesley, 2004

Complementary Omar Santos, End-to-End Network Security Defense-in-Depth, Cisco Press, 2008
Stuart McClure, Joel Scambray, and George Kurtz, Hacking Exposed: Network Security Secrets and Solutions, , 2009
Nitesh Dhanjani, Billy Rios, and Brett Hardin, Hacking: The Next Generation (Animal Guide), O´Reilly, 2009
Eric Cole, Network Security Bible, Wiley, 2009
Gordon Fyodor Lyon, Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning, , 2009
Eric Seagren, Secure Your Network for Free, Syngress, 2007


Recommendations


Subjects that it is recommended to have taken before
COMPUTER NETWORKS ARCHITECTURE, DESIGN AND MANAGEMENT / 00709019