Image for
Home

Applied network security

  • Class 30
  • Practice 30
  • Independent work 120
Total 180

Course title

Applied network security

Lecture type

Elective

Course code

21-02-553

Semester

2

ECTS

6

Lecturers and associates

Course overview

This module address the knowledge and understanding of security technologies built into the firewalls of the new generation and modern Security Information and Event Management (SIEM) systems.
This module enables students to learn how to analyse a company's real needs, as well as on the selection of appropriate technologies, which will make it possible to design an appropriate security solution. This solution will have to be justified and substantiated regarding the extent to which it addresses the user's needs in the context of security based on the firewalls of the new generation and SIEM.

Students will learn:
• How to design solution for advance network protection
• How to work with Next Generation Firewalls
• How to work with Security Information and Event Management systems

As an Cyber security specialist students need to know purposes of security systems and how to design and use products related to Network security.

Literature

Essential reading:
1. Sanders, C. Smith, J. (2014). Applied Network Security Monitoring: Collection, Detection, and Analysis, Rockland: Syngress
2. [Anon.] (2020), FortiGate / FortiOS | Fortinet Documentation Library. Available at: https://docs.fortinet.com/product/fortigate/7.0 (Accessed: 30 April 2021).
3. [Anon.] (2020), IBM QRadar SIEM V7.3.3 documentation - IBM Documentation. Available at: https://www.ibm.com/docs/en/qsip/7.3.3?topic=SS42VS_7.3.3/com.ibm.qradar.doc/c_qradar_pdfs.html (Accessed: 30 April 2021).

Minimal learning outcomes

  • Interpret user requirements in the context of designing security solutions based on next-generation firewalls
  • Design a security solution based on user requirements and select appropriate next-generation firewall technology
  • Interpret user requirements in the context of designing security solutions based on IDS/IPS systems
  • Evaluate the implemented security solution and proposed improvements
  • Evaluate available Security Information and Event Management systems

Preferred learning outcomes

  • Evaluate user requirements in the context of designing security solutions based on next-generation firewalls
  • Improve a security solution based on next-generation firewall technology
  • Evaluate user requirements in the context of designing security solutions based on IDS / IPS systems
  • Design security solution based on Security Information and Event Management systems
  • Plan implementation of Security Information and Event Management systems
Preuzmi vodič za studente
Share: Facebook Twitter