NETWORK SECURITY
- Academic year
- 2025/2026 Syllabus of previous years
- Official course title
- NETWORK SECURITY
- Course code
- CM0627 (AF:576785 AR:323805)
- Modality
- On campus classes
- ECTS credits
- 6
- Degree level
- Master's Degree Programme (DM270)
- Educational sector code
- ING-INF/05
- Period
- 2nd Semester
- Course year
- 1
- Where
- VENEZIA
Contribution of the course to the overall degree programme goals
These topics are essential for a career in the ICT sector, because networks are pervasive tools that impact any application, in terms of performance, security and data privacy.
It is therefore essential to possess knowledge and skills in this sector both for those who want to pursue a career in security analysis and for those who will work at higher levels of the protocol stack, but must still be aware of the problems that lower levels introduce.
The vulnerabilities that the protocols possess, and any countermeasures will be analysed. The course takes place with a hands-on approach, trying to reproduce known vulnerabilities in virtualized environments.
In the context of the specific educational objectives of the Degree Course, the course aims to provide the ability to apply knowledge and understanding to the safety requirements (functional and non-functional) of interconnected systems.
Expected learning outcomes
- known vulnerabilities in network protocols
- possible countermeasures
- some key tools to implement security services on networks
He will also have acquired the necessary skills to:
- avoid configuration errors in the management of communication networks
- perform security tests to check for network-level vulnerabilities
- configure some basic security services
- implement security protocols avoiding the introduction of known vulnerabilities.
Pre-requirements
- programming (imperative programming in C or Python and scripting)
- computer networks: TCP/IP stack, ARP/DNS/IP/TCP protocol
- cryptography: hash functions, symmetric and public/private key encryption
Contents
Attacks:
- Layer II and III: ARP spoofing, IP packets sniffing and spoofing
- Layer IV: attacks to TCP, SYN Floods, TCP reset and session hijacking.
- DNS attacks: birthday attack.
- Attacks to the Internet Routing
Countermeasures:
- Firewalls: introduction to IPTables/Netfilter
- Virtual Private Networks
- The Tor protocol
- Setting up a Layer II authentication: EAP + RADIUS + 802.1X. The case of wireless authentication.
Bonus topics (if time allows):
- Network robustness metrics from graph theory
Compared to the Security course of the three-year degree, the course deals with completely separate topics, relating to the lowest layers of the protocol stack. Compared to the Computer Networks course of the three-year degree it presents themes that are addressed with more depth in the security aspects.
Referral texts
Wenliang Du, Internet Security: A Hands-on Approach 3rd Edition (ISBN: 978-17330039-6-4)
Assessment methods
- a written exam + an oral presentation by a single student of a scientific paper or technical document describing security techniques.
- a written exam + a project. The project will be carried out by the students and will be the subject of a presentation by the group of students.
The essay contains closed-ended questions and open-ended questions. The first ones will verify the student's knowledge about protocols and security mechanisms (5/30 of the grade), the open questions will pose broader problems and verify the student's ability to interpret complex network and interaction contexts between the various protocols involved in an exchange of information (10/30)
The remaining (15/30) can be passed with a group project that will evaluate the students' ability to put some of the acquired skills into practice, or a presentation of a technical and scientific article, which will evaluate the ability to interpret complex technical specifications, and elements of innovation.
Participation in laboratory lessons can guarantee bonus points (2 points) through the delivery of periodic reports.
Type of exam
Grading scale
19-25: the student is able to answer specific questions on known vulnerabilities, and to correctly analyze complex systems that involve the interaction of multiple network components. He/she was able to design a verification system for a complex system, to implement and study the performance of an attack, or to present a scientific technical article of medium methodological difficulty.
25-30L: the student is able to answer specific questions on known vulnerabilities, and to correctly analyze complex systems that involve the interaction of multiple network components, even with dependencies between levels. He was able to design an experiment that extends known vulnerabilities, studies unknown aspects, or implements an attack/defense system with hints of originality. Alternatively, he is able to present a technical scientific article of high methodological difficulty