IT & Cloud

Computer Networks – Network Security

This course provides an extension of the Computer Networks introductory course and provides a more in-depth overview of Network Security issues on the different layers of Computer Networks. 

Content

Introduction: A short summary review of the layered network model 

Network Security Introduction

  • Explores the goals of security: “confidentiality”, “integrity”, “authentication”, and “availability”.
  • Discusses threats like “eavesdropping”, “spoofing”, and “denial of service”.
  • Introduces key strategies like “cryptography” and “secure protocols”.

 

Message Confidentiality

  • Ensures messages can only be read by intended recipients.
  • Uses “encryption techniques” like “symmetric (AES)” and “asymmetric (RSA)” cryptography.
  • Involves key management and secure transmission of keys.

Message Authentication

  • Verifies that a message is truly from the claimed sender and hasn’t been altered.
  • Uses tools like “Message Authentication Codes (MACs)” and “digital signatures”.
  • Often combined with confidentiality to provide both security goals.

Wireless Security

  • Wireless networks are more vulnerable due to open-air transmission.
  • Protects using “WPA2/WPA3”, “encryption”, and “authentication protocols”.
  • physical security and rogue access point detection.

Web Security

  • Covers “HTTPS”, “TLS”, “browser security policies”, and certificate validation.
  • Fights threats like “man-in-the-middle attacks”, “cookie hijacking”, and “phishing”.
  • Secure design is vital for web-based apps and e-commerce.

DNS Security

  • Addresses weaknesses in the “Domain Name System”, like DNS spoofing.
  • Uses “DNSSEC” to ensure authenticity and integrity of DNS responses.
  • Prevents redirection to malicious domains.

Firewalls

  • Controls what traffic is allowed in and out of a network.
  • Types include “packet-filtering”, “stateful inspection”, and “application-layer” firewalls.
  • Acts as a barrier between trusted and untrusted networks.

Virtual Private Networks (VPNs)

  • Creates secure tunnels over public networks.
  • Encrypts data and masks user identity/IP address.
  • Often used by remote workers or to bypass geo-restrictions.

Distributed Denial of Service (DDoS)

  • Attack where multiple systems flood a target, overwhelming it with traffic.
  • Mitigation includes “traffic filtering”, “rate limiting”, and “content delivery networks (CDNs)”.
  • Aims to ensure “availability” under attack conditions.

Learning Outcomes

Upon completion of this course, learners will be able to understand and explain in details of the many security issues and topics in Computer Networks.

Training Method
  • Presentations
  • Interactive discussions
  • Questions & Answers
  • Quizzes and learning checks
Certification
Certificate of Participation
Prerequisites

Having followed the course “Introduction to Computer Networks”. 


Planning and location
Session 1
21/11/2025 - Friday
09:00 - 16:00
Available Edition(s):

https://www.dlh.lu/web/image/product.template/2014/image_1920?unique=d609bcf

This combination does not exist.

24.00 € 24.0 EUR 24.00 €

24.00 €

Not Available For Sale

Your trainer(s) for this course
Nico BINSFELD
Nico BINSFELD
View all their courses.

Dr. Nico Binsfeld, born in Luxembourg on April 4, 1961, is a seasoned professional with over 35 years of experience in the ICT sector. He has held various senior management positions, including Managing Director at ACN Advisors sàrl, Chief Technical Officer at Eltrona Interdiffusion SA, CEO at House of Training and CEO of Post Telecom PSF SA.
Nico has extensive knowledge in telecommunications, IT integration, and the local ICT ecosystem. He is proficient in Luxembourgish, German, French, and English. His formal education includes a Master of Science from Rheinisch-Westfälische Technische Hochschule Aachen and a Doctor of Business Administration from Newcastle Business School. Nico has also been active in teaching and tutoring for over 30 years, with roles at institutions such as the University of Luxembourg, Open University Business School, and Université Paris 2 Assas. He has published several academic papers on ICT ecosystems and innovation in Luxembourg. Additionally, he has been involved in various professional organizations and continuous professional development activities.