Course title, code: Network Security, GAINBAN-HALOBIZT-1

Name and type of the study programme: Computer science engineering, BSc
Curriculum: 2021
Number of classes per week (lectures+seminars+labs): 2+0+2
Credits: 5
Theory: 50 %
Practice: 50 %
Recommended semester: 6
Study mode: full-time
Prerequisites: 100 cr
Evaluation type: term mark
Course category: required optional
Language: english
Responsible instructor: Dr. Göcs László
Responsible department: Department of Information Technologies
Instructor(s): Dr. Göcs László
Course objectives:
The students should get to know the security strategies of networks, the various forms of implementation and technologies.
Course content - lectures:

1. Security goals, defense methods, network threats, the process of the attack, common attack types. 2. Network device authorization management (Telnet, SSH). Central authentication AAA Protocol (Radius and Tacacs). 3. Security of switches. Port security, DHCP snooping, VLANs, MAC security. NTP. 4. Router access lists (normal, extended and named ACLs). 5. Security of wireless technology (Wifi). 6. Kinds, types and possibilities of VPN connection. 7. Description of IDS systems. 8. Security of IoT devices, protocol types. 9. Protection of industrial systems. 10. Vulnerability of household devices and smart devices. 11. Network protocol attacks (TCP and UDP packet attacks). 12. Test 13. supplement Test


Course content - labs:

1. Security of network devices (Telnet, SSH) 2. AAA authentication on network devices. 3. Radius configuration between Windows server and physical Switch. 4. Swichek's security settings (PortSecurity, DHCP snooping, Spanning Tree) 5. Configuring access lists of routers.ű 6. Setting up a Wifi network (Controller and APs). 7. Complete network configuration on real devices. 8. Setting up and testing a VPN connection. 9. Monitoring system (Zabbix) installation, configuration, testing. 10. Firewall setting, testing. 11. Complete practice problem solution. 12. Test 13. supplement Test

Acquired competences:
Knowledge:

- Knowledge of the principles and methods of natural sciences (mathematics, physics, other natural sciences) relevant to the field of IT. - He/she knows the operations of hardware and software elements, the technology of their implementation, how to solve problems related to their operation and the possibilities of the interconnection of IT and other technical systems. - He/she posesses a basic knowledge and engineering approach to signal processing, modelling, simulation and control of systems and networks. - He/she knows the main programming paradigms, programming languages, development tools. His/her knowledge covers the modelling of IT systems, creation of database based systems, as well as the structure, operation and implementation of computer networks. His/her knowledge covers the characteristics of intelligent systems, the specificity of mobile application development, the management of state-of-the art general purpose operating systems, as well as the aspects of IT security. - He/she is familiar with the important software development methodologies, and the notation systems for IT designs and documentation. - He/she has basic data security skills. - He knows the vocabulary and special terms of the engineering profession in the Hungarian and English languages at least on the basic level.

Skills:

- He/she uses the principles and methods of natural sciences (mathematics, physics, other natural sciences) relevant to the field of information technology in his/her engineering work for the design of information systems. - Using the knowledge gained from his/her studies, he/she will be able to install and configure computer and telecommunications networks, troubleshoot network faults, operate and upgrade networks. - He/she is able to develop enterprise information systems and implement previous developments. - He/she is abile to specify and implement embedded systems using the knowledge gained from his/her studies. He/she can apply his/her knowledge acquired during his/her study to acquire deeper knowledge in the field of information engineering and to process special literature and solve problems related to information technology. - He/she is able to fulfill analytical, specification, planning, development and operation tasks, in addition, he/she applies the development methodology, debugging, testing and quality assurance methods in his/her field. - He/she cooperates with other computer science engineers, electrical engineers during team work, and with other experts during the analysis and solution of a problems. - He/she can communicate in Hungarian and in English about professional issues, he/she uses the terms of information technology in a creative way. - He/she constantly improves his/her knowledge and keeps up with the development of the computer engineering profession.

Attitude:

- He/she genuinely represents the professional principles of engineering and information technology fields. - He/she aims to see through the entire engineering system not only his/her own field. - He/she is open to acquire new methods, programming languages and develop skills to use them. - He/she is open to get to know other fields which employ information technology tools, and open to work out information technology soultions in cooperation with the experts of other areas. - He/she makes decisions with full respect for the law and ethical standards in decision-making situations requiring a complex approach. - He/she understands and embraces the ethical principles and legal implications of his/her profession. - He/she makes an effort to work efficiently and to high standards. - He/she keeps in mind and ensures the security of his/her employees' and customers' data and information.

Autonomy and responsibilities:

- He/she feels responsible for IT systems analysis, development and operation, both individually and as part of a team. - He/she reveals the weaknesses of the technologies applied, risks of processes and initiates measures which reduce them. - He/she has a security-conscious attitude in posession of his/her professional knowledge, and is aware of potential threats and opportunities for attack, as well as is prepared to prevent them.

Additional professional competences:


Requirements, evaluation, grading:
Mid-term study requirements:
40 points can be obtained on the ZH of the presentation. The lecture is considered successful if the student achieves at least 20 points. 60 points can be obtained on the practical ZH. A practical ZH is successful if it achieves at least 30 points out of 60 points. Taking into account the above, at least 50 points must be achieved in the ZHs to obtain the practical ticket (20 points in the lecture ZH, 30 points in the practical ZH). Those who do not manage to achieve at least 50 points according to the above, can make up both the lecture ZH and the practical ZH once during the diligence period.
Exam requirements:

Study aids, laboratory background:

Lecture notes, documentation of software used in the exercises, practical guides. All students are provided with separate, state-of-the-art computer access for the exercises.

Compulsory readings:

[1] Charlie Kaufman, Radia Perlman, Mike Speciner, Ray Perlner: Network Security: Private Communication in a Public World, ISBN 9780136643609, 2022 [2] Ali Sadiqui: Computer Network Security, Wiley-ISTE, ISBN: 9781786305275, 2020 [3] Eric D. Knapp: Industrial Network Security, ISBN 0443137374, 2024

Recommended readings: