Checking date: 11/06/2023


Course: 2024/2025

Cybersecurity of networks and cyber-physical systems
(19645)
Master in Telecomunications Engineering (Plan: 171 - Estudio: 227)
EPI


Coordinating teacher: LARRABEITI LOPEZ, DAVID

Department assigned to the subject: Telematic Engineering Department

Type: Electives
ECTS Credits: 3.0 ECTS

Course:
Semester:




Objectives
LEARNING RESULTS As a result of the learning the student will be able to: - Configure secure transport protocols, - Know the technologies to mitigate threats and protect data in networked systems.
Description of contents: programme
- the cybersecurity problem of CI4.0 - Cryptography concepts: definitions, security services, symmetric key and public/private key encryption. Authentication. Hashing. - Secure end-to-end transport protocols - Cybersecurity threats in CI4.0: malware types. Structure, components and attack vectors. - Techniques and technologies for mitigating threats: attacks and counter-measurements. Firewalls, IDS and SIEMs. - Data protection in networked systems: security in IP. IPsec. VPNs. - Security in wireless communications.
Learning activities and methodology
LEARNING ACTIVITIES OF THE SYLLABUS REFERRED TO MATTERS AF1 Theory class AF2 Practical classes AF4 Laboratory session AF5 Supervision sessions AF6 Group work AF7 Individual work by student AF8 Mid-term and final exam Code activity Num Hours Class Hours % studiante AF1 36 36 100 AF2 18 18 100 AF4 9 9 100 AF5 6 6 100 AF6 75 0 0 AF7 75 0 0 AF8 6 6 100 TOTAL MATTER 225 75 33% TEACHING METHODOLOGIES RELATED TO MATTERS MD1 Class presentations supported by computing and audiovisual media, where the main matter concepts are developed and the bibliography to complement the students' learning is provided MD2 Critical lectures of texts recommended by the professor: articles, reports, manuals and research papers. MD3 Solving of practical use cases, problems, etc posed by the teacher to individuals or groups. MD4 Presentation and discussion in class, under the professor supervision of topics related to the matter, as well as several pracitcal use cases.
Assessment System
  • % end-of-term-examination 60
  • % of continuous assessment (assigments, laboratory, practicals...) 40




Basic Bibliography
  • Aditya Gupta. The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things. Apress. 2019
  • William Stallings. Cryptography and Network Security: Principles and Practice. . Prentice Hall. 2013

The course syllabus may change due academic events or other reasons.