SALEIE logo that when clicked will open a new window to access the SALEIE home page.

Strategic ALignment of Electrical and Information Engineering in European Higher Education Institutions

European Union flag.



User guide



Click on the image to the left to select the project website section to go to.

Click on the images to the left and above to select the project website section to go to (Technical Challenge Areas, Student and Staff Support Hub or Governance) OR select the Student and Staff Support Hub below.

Technical Global Challenges Areas Student and Staff Support HUB Higher Education Policy Hub


Higher Education Technical Challenges Hub: Module Specification

ICT13B5 Network Security

pdf version of module specification

Download the module specification

pdf version of module specification








Module name:

Network Security

Scope and form:

Compulsory, full attendance, module + labs

Duration (weeks; Hours/week):

15 weeks; 2 hours lecturers and 2 hours labs/week

Type of assessment:

Continuous assessment during labs, project and final exam

Qualified Prerequisites:

Computer Networks

General module objectives:

The module focuses on the main aspects regarding the network security policies and the identification of problems about system security, data privacy, cryptology, online censorship and other contemporary threats. The students will learn how to deal with these problems and find appropriate solutions by theoretical and practical experience.

Topics and short description:

1. Introduction: Fundamental concepts, Vulnerabilities of networks, Security mechanism, Challenges and trends
2. Cryptography:  Symmetric and public key encryptions, Cryptographic functions, Digital signatures
3. Physical Security: Physical protection and attacks, Authentication technologies, Physical intrusion detection 
4. Authentication and key establishment: Overview on authentication systems, Authentication of people
5. Malware: Trojan, Viruses, Worms, Spyware, Spam, Phishing, Botnets, Distributed Denial of Service Attacks
6. Firewalls and web security: Design principles, Firewall configuration, Packet filtering, Application level gateways, Encrypted tunnels, Cookies, Web security problems
7. Intrusion detection:  detection of attacks HIDS/NIDS (host and network intrusion detection systems)
8. Real-time Communication Security: Introduction to TCP/IP protocol stack, Implementation layers for security protocols and implications, IPsec: AH and ESP, IPsec: IKE, SSL/TLS
9. Electronic Mail Security:  Distribution lists, Establishing keys, Privacy, Source authentication, Message integrity, Proof of submission, Proof of delivery, Message flow confidentiality, Anonymity
10. Wireless security: Trends, Threats, Attacks and countermeasures.

Learning outcomes:




The fundamentals of network security

Ability to understand the basic concepts, principles and practice of network security

Analyze and identify the vulnerabilities of networks  

Fundamentals in cryptography and data security 

Ability to understand the basic concepts and principles of cryptography, encryption methods and the theory behind the security of different cryptographic algorithms

Application of adequate methods data verification in a real communication or computer network; identify measures for data security

Malware network security  and web security

Ability to analyze the threats for information security in the communication and computer networks  and find solutions for web security problems

Detect the problems and identify solutions

Communication security

Ability to understand different types of protocols

Implement various network layers

Wireless security

Ability to understand and analyze the specific security problems in wireless networks

Detect the possible threats and find countermeasures

Recommended literature:

Charlie Kaufman, Radia Perlman, and Mike Speciner - Network Security: Private Communication in a Public World, Prentice Hall, 2002
Niels Ferguson, Bruce Schneier, Tadayoshi Kohno – Cryptography Engineering: Design Principles and Practical Applications, Wiley, 2010
Michael T. Goodrich and Roberto Tamassia - Introduction to Computer Security, Pearson Education, 2014
William Stallings - Cryptography and Network Security: Principles and Practice, 4th edition, Prentice Hall, 2005
Kok-Keong Lee and Beng-Hui Ong -Building Resilient IP Networks, 1st edition, Cisco Press, 2012
*** Network Security Courses, University of Illinois, 2013,
7.  *** - NIST Computer Security Resource Center,