Network Security
Study plans 2016-2017 - IMT4125 - 7.5 ECTS

On the basis of

Candidates should have read the course IMT4113 Introduction to Cyber and Information Security Technology. Familiarity with basic cryptological concepts is assumed.

Expected learning outcomes

On completion of the module, candidates will have achieved the following learning outcomes:


  • Understanding of network and networks security models
  • In-depth knowledge of selected network authentication and access control mechanisms
  • Understanding of security and security infrastructure protocols
  • Understanding of selected attack mechanisms and adversarial behaviours in networks


  • Ability to analyse network security architecture elements and protocols
  • Ability to construct attack scenarios and mechanisms for selected network protocols
  • Ability to perform guided scientific research using appropriate methods in the network security domain

General competence

  • Ability to understand and analyse complex protocols and systems
  • Ability to cogently reason over security mechanisms and architectures
  • The candidate is capable of discussing professional problems, analyses and conclusions in the field of network security, with specialists, decision makers and general audience


  • Network and Network Security Models
  • Core Network Protocols
  • Network Components
  • Network Authentication and Access Control
  • Routing Protocols and their Security
  • Network Infrastructure Protocols
  • Security Protocols
  • Selected Application Layer Protocols and their Security
  • Capturing and Analysing Network Traffic
  • Selected Attack Mechanisms

Teaching Methods

Project work

Teaching Methods (additional text)

Candidates are expected to select a topic for a term paper and perform independent study on an active research area connected to the topics covered in the module.

The course will be made accessible for both campus and remote students. The lectures in the course will be given on campus and will be recorded on a best-effort basis. Both lecture notes and recordings will be made available via the electronic learning management system.

Form(s) of Assessment

Written exam, 3 hours

Form(s) of Assessment (additional text)

The written examination contributes 67% to the final result, and the term paper 33%.

Both term paper and written examination must be passed to pass the course.

Grading Scale

Alphabetical Scale, A(best) – F (fail)

External/internal examiner

Internal examiner; external examiner every fifth year, first time 2019.

Re-sit examination

Re-sit examination for the written exam in August.

No re-sit in the same semester is possible.

Students must undertake both term paper and written exam.

Examination support

Dictionary only.

Coursework Requirements


Teaching Materials

A. Shostack: Threat Modelling: Designing for Security . Wiley, 2014

M. Collins: Network Security Through Data Analysis: Building Situational Awareness . O'Reilly, 2014

W. Stallings: Network Security Essentials, 5th ed. Pearson. 2013

Replacement course for

IMT4582 Network Security