Network Security



The aim of this course is to present and analyze the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access and the effectiveness (or lack) of these measures combined together. This course focuses on the security solutions, which are mainly employed in wired networks that use the Internet technology. It presents and analyses the security mechanisms and protocols that protect the network operation and users data.

Course Contents

  • Security at lower layers.
  • Network layer security solutions.
  • Application layer security solutions.
  • Key management protocols; identity management protocols.
  • Firewalls.
  • Trust management.
  • Distributed authentication systems and intrusion detection systems.
  • Stallings W. (2007): Network Security Essentials, Applications and Standards, 3rd Edition, Prentice Hall.
  • Kaufman C., Perlman R. & Speciner M. (2002): Network Security: Private Communication in a Public World, 2nd Edition, Prentice Hall.


10K students