Passed IMT2006 Computer Networks (permitted if re-sit of IMT2006 Computer Networks is, is still pending and will be passed later)
Expected learning outcomes
- The candidate possesses thorough knowledge in the fields of scaling networks and Wide Are Networks (WAN)
- The candidate possesses thorough knowledge Network Security
- The candidate possesses thorough knowledge Wireless Networks
- The candidate is capable of performing advanced network administration tasks.
- The candidate knows relevant methods and technologies to secure data networks
- The candidate is capable of planning and implementation of small to medium scale wireless networks, and is able to do justified choices regarding wireless safety.
- The candidate is capable of working independently and in groups in the field of data communication and network security.
- The candidate is capable of designing, analyzing, and performing maintenance on complex networks and network security.
- The candidate can evaluate the need and use of wireless networks in small to medium size organizations, in relation to other infrastructure
Objectives: After completion of the course, the students:
- Will have knowledge of the most used standards and protocols for data communication.
- Will understand and apply the principles of network security.
- LAN Redundancy
- Link Aggregation
- Multiarea OSPF, EIGRP
WAN-Concepts and Technologies
- PPP, HDLC
- MPLS, Frame Relay, ATM
- Network Monitoring
- Network Security Threats
- AAA, Firewalls, IPS
- Cryptography, VPN
- Information Security Management Systems (ISMS)
- Wireless theory: waves, antennas
- Wireless Access Points
- Wireless Controllers
PBL (Problem Based Learning)
Form(s) of Assessment
Form(s) of Assessment (additional text)
The portfolio consists of three parts.
Part 1: Electronica, written or oral Exam (40 points) based on CCNA R&S Module 3 and 4, CCNA
Security and WLAN specific course materiel
Part 2: Practical Skill Test (with real hardware or simulation software (20 points)
Part 3: Project work (40 points)
All sub-parts must be passed (>=40%) to pass the course
Conversion from 100 point scale to A-F scale according to recommended conversion table. In specific circumstances, emneansvarlig can slightly adjust the limits in the conversion table to enforce compatibility with the qualitative descriptions on the A-F scale.
It is possible for those students willing to get the voucher for getting the CCNA R&S and CCNA Security Certificates,
do the CCNA Final Exams as an additional exam. This will not be part of the grade of this course
Alphabetical Scale, A(best) – F (fail)
Evaluated by internal examiner, external examiner is used periodically (every five years, next time in 2018/2019)
The exam consists of several parts, the course responsible will define at the beginning of the course which part of the exam shall be graded by the external sensor
Alternatively to the external grading an external supervisor can evaluate the course structure, course content and the content of the exams.
Single Parts of the exam can be re-taken again.
Highly practical skill tests and projects can only be repeated in the next study year.
CISCO R&S NetAcademy teaching materials.
Kurose, J. and Ross, K.W. (2008): Computer Networking: A Top-Down Approach, sixth edition. Addison- Wesley (recommended background material).
William Stallings: Cryptography and Network Security: Principles and Practice 6 Ed. (recommended background material).
CCNA Wireless 200-355 Official Cert Guide (Certification Guide) 1st Edition
Replacement course for
IMT2521, IMT2631, IMT2641
This is a cased-based course where the students will experience the learning outcome directly by developing a concept for an SME including:
- description of business cases
- IT-Systems and IT-Infrastructure
- IT-Service Concept
- Security Policy
- Security Guidelines
- according security measures
The IT-System and IT-Infrastructure including the security measures will be realised on real Lab Hardware in the cisco Lab.
At the end of the course a competition shall be realised where different groups of student will defend or attack the developed enterprise networks. At the end of the competition the strategies of attackers and defenders will be discussed. Forensic methods shall be used to find out which traces the attacker and defenders left during there activities