Programme outline
Learning Outcomes
By the end of this course, participants should be able to / can expect to:
- Explain the vulnerability of network applications to cyberattacks
- Evaluate internet protocols and applications for key cybersecurity properties
- Design secure and resilient network applications against attacks, without unnecessarily losing efficiency
- Explain and apply important secure internet services such as secure emails, SSL/TLS, IPsec, VPN, and Wifi security
- Command OS shell and C/Java software tools and modules for internet experiments
Day 1
- Internet architecture, principles, and management
- Internet software structure
Day 2
- Internet applications and security analysis
- Foundation of network security
Day 3
- Principles of network security protocols
- Transport layer security: design
Day 4
- Transport layer security: protocols and secure sockets
- Network layer security: design and IPsec
Day 5
- Network layer security: VPN
- Link layer and wireless security
Day 6
- Project consultation and discussion
- Project presentation and de-brief
Mode of Assessment
- In-class exercises or homeworks
- Project
- Project presentation