Download Internet Techniques

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Mobile security wikipedia , lookup

Deep packet inspection wikipedia , lookup

Cyberattack wikipedia , lookup

Cyberwarfare wikipedia , lookup

Computer security wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Cybercrime wikipedia , lookup

Online shaming wikipedia , lookup

Transcript
Code ......
Course item: .....
1. INFORMATION ABOUT THE COURSE
A. Basic information
Name of course
Study level
Unit running the study
programme
Study programme
Speciality
Name of teacher (s) and
his academic degree
Introductory courses
Prerequisites
Internet Techniques
First degree
Faculty of Telecommunication, Computer Science and Electrical
Engineering
Electronics and Telecommunications
Rafał Kozik, PhD
Mariusz Sulima PhD
None
Networks
B. Semester/week schedule of classes
Semester
Lectures
winter or
summer
15
Classes
Laboratories
Project
Seminars
15
Field
exercises
ECTS
6
2. EFFECTS OF EDUCATION (acc. to National Qualifications Framework)
Knowledge
Skills
Competences
broad knowledge of current internet techniques
Students will gain a broad knowledge and understanding of various internet
related aspects (technological and non-technological). Students will learn new
technologies enabling the usage of new internet-based applications (e.g.
VoIP). Emerrging internet-related aspects, such as QoS, security, resilience
and dependability will be covered.
On successful completion of the course student is supposed to be able to use
knowledge of current internet techniques
3. TEACHING METHODS
lecture, multimedia slides, lab, projects
4. METHODS OF EXAMINATION
written exam, tests
5. SCOPE
Lectures
Laboratories
Internet techniques lecture covers the following aspects: Internet revolution:
influence of the internet network on civilization, societies and our life
(economy, teaching, culture etc.). New internet services and underlying
technologies. Streaming and real-time protocols (RTP, RTCP, RTSP).
Multicast (applications, technologies, protocols (PIM)). QoS (models,
protocols, technologies). MPLS. Internet security aspects. Intrusion Detection
Systems. Anomaly Detection Systems. SSO/AAI techniques. Introduction to
IMS. Cyber threats and cyber defence. Internet based social networking (e.g.
Twitter, Youtube). Military networks, cyber warfare. Semantic Web and Web
2.0. SOA. IoS. P2P. Cloud computing.
Laboratories exercises are relevant to the issues raised at the lecture.
Students learn the practical use of tools and technologies - this includes web
services; content management systems (CMS); traffic monitoring tools; basic
internet services such as DNS, FTP, WWW, E-mail; exchange data in XML
format; HTML; Javascript / jQuery; Bootstrap; RTP streaming; Service
hosting on Linux and Windows; cloud services (ie. virtual servers, databases,
files storage services, etc.); security context to hacking attacks
6. LITERATURE
Basic literature
Supplementary
literature
P. Zikopoulos, “Understanding Big Data: Analytics for Enterprise Class
Hadoop and Streaming Data”, McGraw-Hill, 2012;
D. Stuttard, “The Web Application Hacker's Handbook Finding and Exploiting
Security Flaws”, 2ed, John Wiley & Sons, 2011;
K. Barry, D. Dick, “Web Services, Service-Oriented Architectures, and Cloud
Computing”, Elsevier, 2013
EU projects deliverables in the area of future internet and trust networks.
Scientific papers and books about network security, cyber defense and
network applications.