Checking date: 28/04/2023

Course: 2023/2024

Secure computer network systems
Master in Quantum Technologies and Engineering (Plan: 476 - Estudio: 379)

Coordinating teacher: VIDAL FERNANDEZ, IVAN

Department assigned to the subject: Computer Science and Engineering Department, Telematic Engineering Department

Type: Compulsory
ECTS Credits: 3.0 ECTS


Requirements (Subjects that are assumed to be known)
This course has no specific previous requirements.
The general objectives of the course are: - Understand the fundamental concepts and principles of communication networks, including key aspects such as topology, connectivity, data transmission, quality of service, and network management. - Understand and analyze the functionality of the different communication protocols of the TCP/IP architecture. - Understand the fundamental concepts and principles of computer security, including classical cryptography, symmetric key cryptography, and public key cryptography. - Identify and evaluate vulnerabilities and security risks in communication networks. - Design and implement security solutions for communication networks, including selecting and configuring appropriate security protocols and mechanisms for a given application or environment. - Demonstrate skills in deploying and configuring a computer network system, considering security and data protection. Learning outcomes that will be acquired by the student: - Ability to determine the limitations of traditional computer network systems and its future evolution lines. - Ability to setup and deploy traditional cybersecure solutions, their limitations and evolution lines.
Skills and learning outcomes
Description of contents: programme
The programme of the Secure Computer Network Systems course consists of different topics that cover both the architecture and protocols of computer networks and the Internet, and the risks and solutions related to network security. The contents specific to the course are: - Systems and protocols of computer network systems. - Deployment and setup of computer network systems. - Security risks in computer network systems. - Deployment of cybersecure solutions. - Cybersecurity in computer network systems.
Learning activities and methodology
Learning activities include: - Theoretical class. - Practical classes. - Laboratory exercises. - Work in groups. - Individual student work. - Partial and final exams. Regarding the methodology to be used, the following is considered: - Presentations by the teacher with the support of computer and audiovisual media, in which the main concepts of the subject are developed and bibliography is provided to complement the learning process. - Critical reading of texts recommended by the teacher: articles, reports, manuals, and/or academic papers, either for later discussion in the classroom, or to expand and consolidate knowledge on the subject. - Resolution of practical cases, problems, etc. posed by the teacher individually or in groups. - Presentation and discussion in the classroom, moderated by the teacher of topics related to the content of the subject, as well as of practical cases. - Development of work and reports, either individually or in groups.
Assessment System
  • % end-of-term-examination 60
  • % of continuous assessment (assigments, laboratory, practicals...) 40

Calendar of Continuous assessment

Basic Bibliography
  • James Kurose, Keith Ross.. Computer networking: a top-down approach. Pearson. Seventh, global edition (2017)
  • William Stallings. Cryptography and network security: principles and practice. Pearson. Seventh, global edition (2017)
Recursos electrónicosElectronic Resources *
(*) Access to some electronic resources may be restricted to members of the university community and require validation through Campus Global. If you try to connect from outside of the University you will need to set up a VPN

The course syllabus may change due academic events or other reasons.