Teaching GuideTerm Faculty of Computer Science |
Máster Universitario en Ciberseguridade |
Subjects |
Secure Networks |
Learning aims |
|
|
|
Identifying Data | 2020/21 | |||||||||||||
Subject | Secure Networks | Code | 614530006 | |||||||||||
Study programme |
|
|||||||||||||
Descriptors | Cycle | Period | Year | Type | Credits | |||||||||
Official Master's Degree | 1st four-month period |
First | Obligatory | 6 | ||||||||||
|
Learning outcomes | Study programme competences / results | ||
They will understand the role of a firewall in the security strategy of a final device or the network it protects. | AJ2 AJ8 |
BJ2 BJ6 |
|
They will be able to describe what the access policies are and to design / specify the set of them that a scenario or particular case requires. | AJ8 AJ12 |
BJ2 BJ4 BJ6 BJ8 |
CJ4 |
They will know the different types of packet filtering (stateful/stateless) and application-level firewalls, and they will know how to configure them on different platforms. | AJ2 |
BJ6 BJ8 |
|
They can design and describe, for a specific scenario / topology, alternative configurations to place the firewall within the corporate network (bastion, DMZ, distributed firewall) | AJ8 |
BJ2 BJ6 BJ8 |
|
They will be able to describe the basic principles that underlie intrusion detection, the common sensors they use for information collection, and the analysis techniques (anomaly detection versus heuristic detection) that decide when to trigger an alarm. They will know possible technical solutions (HIDS / NIDS, IPS, SIEM, honeypot), which they will know how to install and configure for some platforms and particular implementations | AJ2 AJ8 |
BJ6 BJ8 |
|
They will be familiar with the concepts of tunneling and network virtualization, and will be able to choose and implement the most appropriate virtual private network technology for different scenarios | AJ2 AJ4 |
BJ6 |
|
They can explain the principles on which anonymous networks are built | AJ2 |
BJ4 BJ5 |
CJ4 |
|