Educational guide | ||||||||||||||||||||||||||||||||||||||||
IDENTIFYING DATA | 2023_24 | |||||||||||||||||||||||||||||||||||||||
Subject | SECURITY IN COMMUNICATION NETWORKS | Code | 00709030 | |||||||||||||||||||||||||||||||||||||
Study programme |
|
|||||||||||||||||||||||||||||||||||||||
Descriptors | Credit. | Type | Year | Period | ||||||||||||||||||||||||||||||||||||
6 | Optional | Third | Second |
|||||||||||||||||||||||||||||||||||||
Language |
|
|||||||||||||||||||||||||||||||||||||||
Prerequisites | ||||||||||||||||||||||||||||||||||||||||
Department | ING.ELECTR.DE SIST. Y AUTOMATI |
|||||||||||||||||||||||||||||||||||||||
Coordinador |
|
igarr@unileon.es mcbenc@unileon.es javem@unileon.es - |
||||||||||||||||||||||||||||||||||||||
Lecturers |
|
|||||||||||||||||||||||||||||||||||||||
Web | http://agora.unileon.es | |||||||||||||||||||||||||||||||||||||||
General description | The student will learn about the different threats that can be faced in a communication network, stressing the case of Internet. This study will be achieved by means of different security models. The student will also gain skills neccesary to know, configure, manage and use different security tools. | |||||||||||||||||||||||||||||||||||||||
Tribunales de Revisión |
|
|||||||||||||||||||||||||||||||||||||||
Competencias |
Code | |
A18115 | |
A18129 | |
B5613 | |
B5623 | |
B5626 | |
C5 | CMECES5 That students have developed those learning skills necessary to undertake further studies with a high degree of autonomy |
Learning aims |
Competences | |||
A18115 A18129 |
B5613 B5623 B5626 |
C5 |
Contents |
Topic | Sub-topic |
Planning |
Methodologies :: Tests | |||||||||
Class hours | Hours outside the classroom | Total hours | |||||||
Personal tuition | 2 | 0 | 2 | ||||||
Laboratory practicals | 30 | 39 | 69 | ||||||
Problem solving, classroom exercises | 4 | 4 | 8 | ||||||
Lecture | 26 | 39 | 65 | ||||||
Mixed tests | 6 | 0 | 6 | ||||||
(*)The information in the planning table is for guidance only and does not take into account the heterogeneity of the students. |
Methodologies |
Description | |
Personal tuition | |
Laboratory practicals | |
Problem solving, classroom exercises | |
Lecture |
Personalized attention |
|
|
Assessment |
Description | Qualification | ||
Laboratory practicals | 25% | ||
Mixed tests | 75% | ||
Other comments and second call | |||
Sources of information |
Access to Recommended Bibliography in the Catalog ULE |
Basic |
, Intrusion Detection Systems with Snort, O'Reilly Media, 2004 Rafeeq Ur Rehman, Intrusion Detection Systems with Snort. Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID, Prentice Hall, John A. Vacca, Network and system security, Syngress, 2010 Chris Fry and Martin Nystrom, Security Monitoring, O'Reilly, 2009 Richard Bejtlich, The Tao of Network Security Monitoring Beyond Intrusion Detection, Addison Wesley, 2004 |
Complementary |
Omar Santos, End-to-End Network Security Defense-in-Depth, Cisco Press, 2008 Stuart McClure, Joel Scambray, and George Kurtz, Hacking Exposed: Network Security Secrets and Solutions, , 2009 Nitesh Dhanjani, Billy Rios, and Brett Hardin, Hacking: The Next Generation (Animal Guide), O´Reilly, 2009 Eric Cole, Network Security Bible, Wiley, 2009 Gordon Fyodor Lyon, Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning, , 2009 Eric Seagren, Secure Your Network for Free, Syngress, 2007 |
Recommendations |
Subjects that it is recommended to have taken before | ||
|