Network Security
Dates
- Tue 14:15-15:45, Interim HS 2
- Thu 10:15-11:45, MI HS 1
- Exercises will take place at certain time slots of the lectures; these will be announced during the course.
Contents
This lecture is an introduction to the field of network security and its fundamental topics like cryptographic operations, threats, and security goals. This is used further as a starting point and requirements for the design of secure networks are discussed. Modern security protocols in modern network protocols and architectures are presented as well as vulnerabilities in existing systems.
Registration
TUMOnline.
Moodle
We use Moodle for course organisation and course materials.
Exercises
There will be programming assignments. We suggest that you are already familiar with python3. Recommended reading: diveintopython3
Programming Task | Version | |
Programming Task Exercise 1 | 1 | |
Programming Task Exercise 2 | 1 | |
Programming Task Exercise 3 | 1 | |
Programming Task Exercise 4 | 1 | |
Programming Task Exercise 5 | 1 | |
Programming Task Exercise 6 | 1 | |
Programming Task Exercise 7 | 1 |
Encrypted Solutions | Version | |
Solution 1 | 1 | |
Solution 2 | 1 | |
Solution 3 | 1 | |
Solution 4 | 1 | |
Solution 5 | 1 | |
Solution 6 | 1 | |
Solution 7 | 1 | |
Solution 8 | 1 |
Slides
Chapter | Version | 1 up |
0 Course Organization | 1 | |
1 Introduction to Network Security | 1 | |
2 Langsec | 1 | |
3 Attacks on TCP | 1 | |
4a Middleboxes | 1 | |
4b Firewalls | 1 | |
5 Attacks | 1 | |
6 Symmetric Cryptography | 1 | |
7 Cryptography 1 | 1 | |
8 Hash Functions | 1 | |
9 Randomness | 1 | |
10 Cryptography 2 | 1 | |
11 Secure Channel | 1 | |
12 Public Key Infrastructures | 1 | |
13 Crytographic Protocols | 1 | |
14 IPSec | 1 | |
15 Kerberos and Client Authentication | 1 | |
16 Web Security Topics | 1 |