Network Security
2012-2013 - IMT4582 - 5 ECTS


Basic crypto knowledge

Expected learning outcomes

The student is expected to have insight into:

  • why network security is important
  • which mechanisms are required and available for protection of networked systems
  • how these mechanisms are used to resolve security challenges in particular systems
  • high security solutions

The course will provide the student with the foundation required for implementing protection systems and for continuing research in the field.


  • The candidate possesses advanced knowledge in network security, including collaborative efforts
  • The candidate possesses thorough knowledge about theory and application of network security.


  • The candidate is capable of analyzing existing theories, methods and interpretations in the field of network security and working independently on solving theoretical and practical problems.
  • The candidate can use relevant scientific methods in independent research and development in network security.
  • The candidate is capable of performing critical analysis of various literature sources and applying them in structuring and formulating reasoning in network security.
  • The candidate is capable to design “best practice” secure networked architecture.

General competence

  • The candidate is capable of analyzing in a given architecture the risks and of envisioning the boards of security.
  • The candidate is capable of applying his/her cryptographic knowledge and skills in new network / security architecture.
  • The candidate can work independently and is familiar with topic-related terminology.
  • The candidate is capable of discussing professional problems, analyses and conclusions in the field of network security, with specialists, decision makers and general audience.


Part I Introduction :

  • Network infrastructure and security threats
  • Anatomy of attacks

Part II Protection methods :

As revision course:

  • Encryption, device authentication, message authentication and protection of integrity
     Key management: symmetric keys, public key infrastructure, certificates, revocation, and key escrows.
  • Identity management and acccess control

Normal teaching

  • Firewalls, IDS, and protection advanced method against attacks, defense-in-depth
  • Collaborative security efforts, e.g. information sharing

Part III SCADA & Smart Grid security

  • Problem statement
  • Risks
  • Defense mechanism, including why architecture matters.

Teaching Methods


Teaching Methods (additional text)

The course will be made accessible for both campus and remote students. Every student is free to choose the pedagogic arrangement form that is best fitted for her/his own requirement. The lectures in the course will be given on campus and are open for both categories of students. All the lectures will also be available on Internet through GUC’s learning management system (ClassFronter).

Form(s) of Assessment


Form(s) of Assessment (additional text)

An overall evaluation is based on a 100 point scale, where the essay counts 50 points and the final exam (3 hours) counts 50 points. Conversion from 100 point scale to A-F scale according to recommended conversion table. In specific circumstances, emneansvarlig can slightly adjust the limits in the conversion table to enforce compatibility with the qualitative descriptions on the A-F scale

Grading Scale

Alphabetical Scale, A(best) – F (fail)

External/internal examiner

Internal examiner. An external examiner will be used every 4th year. Next time in the school-year 2014/2015.

Re-sit examination

For the final exam: Ordinary re-sit examnination.

Examination support


Coursework Requirements


Teaching Materials

Textbook (still in Evaluation)

Additional Material will be provided on fronter

Replacement course for