Perimeter Security
- IMT4731 - 5 ECTS

Expected learning outcomes

The students should after completed course be able to
- understand the technology and science of intrusion detection and firewalls
- design a network security policy
- understand firewalls and IDS in perimeter security context
- understand the concept of host based and network based intrusion detection
- understand the concept of anomaly detection


Hostile data streams
Firewall architectures
Anomaly Detection
Host signature and packet signature
Tools for perimeter security
Complete perimeter securitry - more than firewalls and IDS

Teaching Methods

Group works

Form(s) of Assessment


Form(s) of Assessment (additional text)

An overall evaluation based on a 100 point scale, where project work counts 50 points and final exam counts 50 points. Conversion from 100 point scale to A-F scale according to recommended conversion table. In specific circumstances, emneansvarlig can slightly adjust the limits in the conversion table to enforce compatibility with the qualitative descriptions on the A-F scale.

Grading Scale

Alphabetical Scale, A(best) – F (fail)

Coursework Requirements

Will be announced later