Communication Security

Data is displayed for academic year: 2023./2024.

Associate Lecturers

Laboratory exercises

Course Description

TCP / IP security issues. Security and vulnerability of operating systems. Security of distributed systems. Web traffic security. Computer and Network Protection: Types of Threats and Attacks, Defense Levels. The problem of malicious resource congestion. Security protocols. Virtual private networks. Firewall: traffic filtering, network address mapping (NAT). Public Key Infrastructure. Security standards.

Study Programmes

University graduate
[FER3-HR] Audio Technologies and Electroacoustics - profile
Elective Courses (2. semester)
[FER3-HR] Communication and Space Technologies - profile
Elective Courses (2. semester)
[FER3-HR] Computational Modelling in Engineering - profile
Elective Courses (2. semester)
[FER3-HR] Computer Engineering - profile
Elective Courses (2. semester)
[FER3-HR] Computer Science - profile
Elective Courses (2. semester)
Elective Courses of the Profile (2. semester)
[FER3-HR] Control Systems and Robotics - profile
Elective Courses (2. semester)
[FER3-HR] Data Science - profile
Elective Courses (2. semester)
[FER3-HR] Electrical Power Engineering - profile
Elective Courses (2. semester)
[FER3-HR] Electric Machines, Drives and Automation - profile
Elective Courses (2. semester)
[FER3-HR] Electronic and Computer Engineering - profile
Elective Courses (2. semester)
[FER3-HR] Electronics - profile
Elective Courses (2. semester)
[FER3-HR] Information and Communication Engineering - profile
Elective Courses (2. semester)
[FER3-HR] Network Science - profile
Core-elective courses (2. semester)
[FER3-HR] Software Engineering and Information Systems - profile
Elective Courses (2. semester)

Learning Outcomes

  1. assess security of communication network
  2. design security mechanisms to protect communication network
  3. design security mechanism to protect application data while in transit

Forms of Teaching



Independent assignments

Independent assignments


Laboratory exercises

Grading Method

Continuous Assessment Exam
Type Threshold Percent of Grade Threshold Percent of Grade
Laboratory Exercises 0 % 10 % 0 % 10 %
Mid Term Exam: Written 20 % 45 % 0 %
Final Exam: Written 20 % 45 %
Exam: Written 50 % 90 %

Week by Week Schedule

  1. Security threats; Security requirements for networks and services; Security analysis; Protection measures; Security standards, organizations, and bodies; Relevant laws and recommendations, Cryptographic protection; Basic definitions and objectives: symmetric and asymmetric algorithms, hash functions, digital signature, and key management, Digital certificates; Public key infrastructure (PKI); PKI components and users
  2. Protection of computers and networks; Types of threats and attacks (e.g., denial of service, spoofing, sniffing and traffic redirection, man-in-the-middle, message integrity attacks, routing attacks, and traffic analysis), levels of defense; Case studies focused on vulnerabilities of Internet protocols and applications; Protection methods on the network layer
  3. TCP/IP protocol stack security: network and transport layer; Protocol vulnerabilities and attacks
  4. Firewall: traffic filtering; Firewall architectures; Network address translation (NAT)
  5. Techniques and tools for vulnerability scaning; Intrusion detection systems; Host-based, network-based approaches, and hybrid approaches
  6. Virtual private networks (VPNs): security protocols, design, and advantages and disadvantages of various models
  7. Defense mechanisms and countermeasures (e.g., network monitoring, intrusion detection, firewalls, spoofing and DoS protection, honeypots, tracebacks)
  8. Midterm exam
  9. Operational network security management (e.g., configure network access control)
  10. Data link layer security
  11. Wireless network security
  12. Security in mobile networks
  13. Security of web traffic and web servers; Hypertext Transfer Protocol (HTTP) security; Secure Sockets Layer (SSL); Web users' management; Authentication (e.g., single sign-on, HTTPS and certificates); Application and browser security; Session management; Application vulnerabilities and defenses (SQL injection, XSS, CSRF); Client side security (cookies, HTTPS, plugins, user tracking, same origin policy); Server-side security tools (e.g., Web Application Firewalls (WAFs) and fuzzers); Content security policies, E-mail security; Secure/Multipurpose Internet Mail Extensions (S/MIME), Pretty Good Privacy (PGP); Domain Name System (DNS)
  14. Guest Lecturer from Industry - overview of current procedures and practices
  15. Final exam


(.), W. Stallings (1999.), Network Security Essentials: Applications and Standards, Prentice Hall,
(.), Chapman, D. Brent, Cooper, Simon, Russell, Deborah, and Zwicky, Elizabeth D (2000.), Building Internet Firewalls (2nd edition), O'Reilly and Associates,
(.), Man Young Rhee (2003.), Internet Security, John Wiley & Sons,
(.), Jyrki T. J. Penttinen: Wireless Communications Security: Solutions for the Internet of Things, Wiley, 2016,

For students


ID 222776
  Summer semester
L1 English Level
L1 e-Learning
30 Lectures
0 Seminar
0 Exercises
12 Laboratory exercises
0 Project laboratory

Grading System

90 Excellent
80 Very Good
70 Good
50 Sufficient