Skip to main content

Internet Security - Attack and Defense

Enrollment is Closed

About This Course

In the press and in popular movies we hear and see that hackers break into critical systems, get access to classified information and trace your network activities with just a few clicks of a button. But are such scenarios real? How do attacks look like, how can we protect against such attacks and how can we securely exchange data over the Internet?

Requirements

This course is intended for students with a solid understanding of networking who want to learn about network attacks, how those attacks can be measured and what can be done in terms of mitigation and defense. It was designed for students following a M.Sc. program in the area of Computer Science, but can also be followed by students at the end of their B.Sc. or start of their Ph.D. program.
To follow this course, some basic programming skills (C, Java, ...) are required. In addition, you should be able to use Linux systems and set-up and maintain Virtual Machines (VirtualBox, Vagrant, Ubuntu).

Course Staff

Image Anna Sperotto

Anna Sperotto

Anna Sperotto is Assistant Professor at the Design and Analysis of Communication Systems (DACS) group at the University of Twente. Her research interests are network monitoring and modeling, intrusion detection, network security, and network management.

Image Aiko Pras

Aiko Pras

Aiko Pras is Professor in the area of Network Operations and Management at the University of Twente (UT), the Netherlands. He gives many courses in Networking, including Network Security (NS) and Internet Management and Measurements (IMM). He chairs the IFIP Technical Committee 6 on Communications Systems and the EU-FP7 Flamingo Network of Excellence on management of the Future Internet.

Frequently Asked Questions

What web browser should I use?

The Open edX platform works best with current versions of Chrome, Firefox or Safari, or with Internet Explorer version 9 and above.

See our list of supported browsers for the most up-to-date information.

Why are you using OpenEdx

The idea behind this course is that students "learn by doing". For that purpose students perform many exercises that need to be closely coupled to the MOOC platform. OpenEdx provides us the right environment for that.

I did not receive an activation email

If you created an account on our OpenEdx platform but did not receive an activation email, please check your SPAM folder. Many mail systems conceive such activation emails as SPAM.

How do I setup a Virtual Machine (VM)?

On the Internet and YouTube you can find many videos and other resources that explain how to setup and use VirtualBox. Once VirtualBox is installed and tested, you should install Vagrant, for which you can also find many resources on the Internet. Note that you don't have to create any vagrant configuration files; such files will be provided to you as part of the course.

My Virtual Machine is not running! What should I do?

Occasionaly we find that problems occur while installing and using the VM. Sometimes problems are caused by outdated equipment, such as 10 year old laptops. In such cases you should try to arrange a newer machine, and try on that machine if the problems are gone. Problems may also occur if (Linux) kernel extensions are installed, such as grsec. In such cases some tweaking of configurations and options may solve the problems. Finally we sometimes observe that, especially with Windows systems, shared directories between guest and host OS may not work. This may be due to timing issues, and sometimes a restart of the VM solves the problem.

  1. Course Number

    201700074B
  2. Classes Start

    Sep 13, 2017
  3. Classes End

    Oct 31, 2017
  4. Estimated Effort

    7:00