6 EC
Semester 2, period 5
5384OFTE6Y
| Owner | Master Security and Network Engineering |
| Coordinator | dr. Kostas Papagiannopoulos |
| Part of | Master Security and Network Engineering, year 1 |
| Links | Visible Learning Trajectories |
The internet is a paradise for cybercriminals. In many cases attacker can break into poorly configured systems without being even noticed. Bugs, viruses, worms, denial-of-service, and theft can cause major havoc. This course looks at various attacks vectors and exploits, as well as at resources that the system and network administrator has available to detect, understand and resolve security incidents. The course includes studying threats by performing cyber attacks on lab environments. After analyzing the causes of a successful break-in, solutions will be discussed, both on a design and implementation level.
Lecture notes, online material, research papers and book chapters
The lectures offer the basic theory about software, network, hardware and other exploits.
The lab sessions follow up with specific assignments that train the students in deploying and protecting against such exploits.
The course project allows the students to delve deeper into a specific security topic.
The presentations train the students on how to convey information to a cybersecurity audience.
|
Activity |
Number of hours |
|
Lectures |
4 hours per week |
|
Lab Sessions |
8 hours per week |
Requirements of the programme concerning attendance (TER-B):
Additional requirements for this course:
The course has the standard SNE attendance requirements i.e. obligatory attendance to Lectures and Lab Sessions.
| Item and weight | Details |
|
Final grade | |
|
0.67 (67%) Project Report | |
|
0.33 (33%) Presentation | |
|
IDS assignment | Must be ≥ pass |
|
Hardware Security assignment | Must be ≥ pass |
|
System Security assignment | Must be ≥ pass |
|
Network Security assignment | Must be ≥ pass |
Contact the course coordinator to make an appointment for inspection.
The students have to carry out the lab assignments with the assistance of the TAs (pass/fail)
The students have to carry out a group project on any Offensive Technology of their choice (2/3 of final grade)The students have The studets to carry out a group presentation about their project (1/3 of final grade)
The 'Regulations governing fraud and plagiarism for UvA students' applies to this course. This will be monitored carefully. Upon suspicion of fraud or plagiarism the Examinations Board of the programme will be informed. For the 'Regulations governing fraud and plagiarism for UvA students' see: www.student.uva.nl
| Weeknummer | Onderwerpen |
| 1 | Intrusion Detection Systems |
| 2 | Network Security |
| 3 | Software Security |
| 4 | Sofware Reversing |
| 5 | Lecture-free week |
| 6 | Hardware Security |
| 7 | Code Reviewing |
| 8 | Hardware Reversing |
| Student Presentations |
Recommended prior knowledge: C programming, TCP/IP, advanced Linux and Windows skills, basic elements of cryptography and cryptographic protocols
Teaching assistants: Linus Mainka (l.mainka@uva.nl), Giorgio Campissano (giorgio.campisano@student.uva.nl), Mattia Monari (ma.monari@student.uva.nl)