Perimeter Security
- IMT3731 - 5 ECTS


Min. 60 ECTS from Bachelor Information Security

Expected learning outcomes

The students should after completed course be able to

  • understand the technology of intrusion detection and firewalls
  • implement a network security policy
  • use firewalls and IDS in perimeter security context
  • explain the concept of host based and network based intrusion detection
  • explain the concept of anomaly detection


  • Hostile data streams
  • Firewall architectures
  • Anomaly Detection
  • Host signature and packet signature
  • Tools for perimeter security
  • Complete perimeter securitry - more than firewalls and IDS

Teaching Methods

Group works

Form(s) of Assessment


Form(s) of Assessment (additional text)

An overall evaluation based on a 100 point scale, where project work counts 50 points and final exam counts 50 points. Conversion from 100 point scale to A-F scale according to recommended conversion table. In specific circumstances, emneansvarlig can slightly adjust the limits in the conversion table to enforce compatibility with the qualitative descriptions on the A-F scale.

Grading Scale

Alphabetical Scale, A(best) – F (fail)

External/internal examiner

Internal examiner

Re-sit examination


Examination support


Coursework Requirements

Will be announced later

Teaching Materials


Additional information

This is an undergraduate mirror of IMT4731, will be slightly edited to reflect less scientific requirements