Each module contains 3 ECTS. You choose a total of 10 modules/30 ECTS in the following module categories:
- 12-15 ECTS in technical scientific modules (TSM)
TSM modules teach profile-specific specialist skills and supplement the decentralised specialisation modules. - 9-12 ECTS in fundamental theoretical principles modules (FTP)
FTP modules deal with theoretical fundamentals such as higher mathematics, physics, information theory, chemistry, etc. They will teach more detailed, abstract scientific knowledge and help you to bridge the gap between abstraction and application that is so important for innovation. - 6-9 ECTS in context modules (CM)
CM modules will impart additional skills in areas such as technology management, business administration, communication, project management, patent law, contract law, etc.
In the module description (download pdf) you find the entire language information per module divided into the following categories:
- instruction
- documentation
- examination
This course aims to provide students with an in-depth understanding of current network security technologies and their application in solving technical security challenges. Upon completion of the course, students will be able to analyze, design and implement secure network infrastructures, using state-of-the-art security technologies and best practices. They will also develop an understanding of emerging network security techniques and solutions.
Prerequisites
- Understanding of the TCP/IP protocol stack including routing protocols and DNS.
- Basic understanding of secure protocols such as WPA, IPSec and TLS.
- Basic understanding of network security appliances such as firewalls and proxies.
Learning Objectives
The students
- are able to identify threats for a given network and are able to reason about the security properties of their networks.
- know important concepts of network security in the areas of DDoS protection, BGP security, DNS security, IPv6 security and HTTP/3.
- know the relevant key concepts to build secure network architectures and can develop a secure network architecture for different scenarios.
- are able to undertake an investigation into the course topics and report on their findings.
Contents of Module
This course is split into three parts:
Part 1: Network Threats and Monitoring
In Part 1 we talk about network threats and mitigation techniques as well as network monitoring. We cover topics such as common network attacks (e.g., Distributed Denial of Service(DDoS) attacks) as well as the challenges and solutions for monitoring network traffic (e.g., analysis of encrypted traffic flows).
Part 2: Network Protocols and Security
In Part 2 we focus on network protocols and security. This includes but is not limited to Border Gateway Protocol (BGP) security, Domain Name System (DNS) security, IPv6 security and HTTP/3.
Part 3: Securing Advanced Network Architectures
Part 3 covers several advanced approaches to securing network architectures from a forward-looking perspective. This includes but is not limited to topics such as Software Defined Networking (SDN), Network Function Virtualization (NFV), Zero Trust Architecture (ZTA), Machine Learning (ML) for network security, network security in containerized environments, and cloud network security.
As network security is a very dynamic and constantly evolving field, the course content will be adapted to current trends and emerging topics in network security.
Teaching and Learning Methods
Lectures with a mix of practical and theoretical exercises.
Literature
The following material is provided:
- Slides (with notes, where appropriate)
- Selected technical publications
Download full module description
Back