Compulsory courses |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-0120 | English Language 1 | 3 | 0 | 5 |
321-1500 | Discrete Mathematics I | 3 | 2 | 5 |
321-1200 | Structured Programming | 3 | 4 | 5 |
321-1400 | Introduction to Computer Science and Communications | 3 | 0 | 5 |
321-2000 | Logic Design | 3 | 2 | 5 |
321-1100 | Calculus | 3 | 2 | 5 |
321-2400 | Probability and Statistics | 3 | 2 | 5 |
Compulsory courses |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-0130 | English Language 2 | 3 | 0 | 5 |
321-2100 | Object-Oriented Programming I | 3 | 2 | 5 |
321-2450 | Discrete Mathematics II | 3 | 2 | 5 |
321-3300 | Computer Communications | 3 | 2 | 5 |
321-2550 | Circuit Theory | 3 | 2 | 5 |
321-3150 | Linear Algebra | 3 | 2 | 5 |
321-2050 | Physics | 3 | 2 | 5 |
Compulsory courses |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-0140 | English Language 3 | 3 | 0 | 5 |
321-3650 | Object-Oriented Programming II | 3 | 2 | 5 |
321-3350 | Computer Architecture | 3 | 2 | 5 |
321-3000 | Data Structures | 3 | 2 | 5 |
321-5500 | Signals and Systems | 3 | 2 | 5 |
321-3750 | Stochastic Procedures | 3 | 2 | 5 |
321-8950 | Digital Innovation & Entrepreneurship | 3 | 0 | 5 |
Compulsory courses |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-4200 | Algorithms and Complexity | 3 | 2 | 5 |
321-3100 | Information Systems Analysis and Design II | 3 | 2 | 5 |
321-3200 | Databases I | 3 | 2 | 5 |
321-7900 | Electronics | 3 | 2 | 5 |
321-4100 | Operating Systems | 3 | 2 | 5 |
321-4120 | Advanced Topics of Programming Languages | 3 | 2 | 5 |
Compulsory courses |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-3700 | Databases II | 3 | 2 | 5 |
321-6450 | Computer Networks | 3 | 2 | 5 |
321-6700 | Theory of Computation | 3 | 0 | 5 |
321-2300 | Operation of Business & Information Systems | 3 | 2 | 5 |
321-4000 | Software Engineering | 3 | 2 | 5 |
321-3450 | Telecommunications | 3 | 2 | 5 |
Compulsory courses |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-3400 | Information and Communication Systems Security | 3 | 2 | 5 |
321-7950 | Distributed Systems | 3 | 2 | 5 |
321-5200 | Information Law | 3 | 0 | 5 |
321-6500 | Information Systems Management | 3 | 0 | 5 |
321-88100 | Internet Programming | 3 | 2 | 5 |
321-3600 | Artificial Intelligence | 3 | 2 | 5 |
Cycle 1: Information and Communication Systems Security and Privacy |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-9700 | Computer Network Security and Privacy Enhancing Technologies | 3 | 0 | 5 |
321-5750 | Privacy and Data Protection Law | 3 | 0 | 5 |
Cycle 2: Information Systems and Entrepreneurship |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-8100 | Project Management | 3 | 2 | 5 |
321-7650 | and Tools | 3 | 0 | 5 |
321-5150 | Information Systems Analysis and Design Methodologies | 3 | 0 | 5 |
Cycle 3: Computer and Telecommunication Technologies |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-7050 | Digital Systems Design | 3 | 2 | 5 |
321-10300 | Digital Communications | 3 | 2 | 5 |
Cycle 4: Communication Systems and Networks |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-8350 | Network Management | 3 | 0 | 5 |
321-7000 | Performance Evaluation and Simulation of Computer Systems an | 3 | 2 | 5 |
Cycle 5: Information Management and Intelligent Systems |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-7750 | Introduction to Robotics | 3 | 2 | 5 |
321-6100 | Natural Language Processing | 3 | 0 | 5 |
Cycle 6: Computer Science Foundations |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-8600 | Information Theory | 3 | 0 | 5 |
Cycle 1: Information and Communication Systems Security and Privacy |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-10750 | Mobile and Wireless Networks Security | 3 | 0 | 5 |
321-6000 | Security on Physical Layer | 3 | 0 | 5 |
321-8050 | Cryptography | 3 | 0 | 5 |
Cycle 2: Information Systems and Entrepreneurship |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-5600 | Human - Computer Interaction and Web Applications | 3 | 2 | 5 |
321-8500 | Decision Support Systems | 3 | 2 | 5 |
321-11100 | Electronic Government Technologies and Applications | 3 | 0 | 5 |
Cycle 3: Computer and Telecommunication Technologies |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-7800 | Wireless Communications | 3 | 2 | 5 |
321-8750 | Introduction to VLSI | 3 | 2 | 5 |
321-7850 | Microprocessors | 3 | 2 | 5 |
321-9350 | Digital Image Processing | 3 | 2 | 5 |
Cycle 4: Communication Systems and Networks |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-7250 | Mobile Communication Networks | 3 | 2 | 5 |
321-6250 | Internet Protocols and Architectures | 3 | 0 | 5 |
321-11000 | Cloud Technologies | 3 | 2 | 5 |
Cycle 5: Information Management and Intelligent Systems |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-10200 | Information Retrieval | 3 | 0 | 5 |
321-9250 | Data Mining | 3 | 2 | 5 |
321-6050 | Intelligent Recommender Systems | 3 | 0 | 5 |
321-6600 | Computer Vision | 3 | 2 | 5 |
Cycle 6: Computer Science Foundations |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-99000 | Numerical Analysis | 3 | 0 | 5 |
321-8000 | Game Theory | 3 | 0 | 5 |
321-9850 | Mathematical Modeling | 3 | 0 | 5 |
321-9000 | Forecasting Techniques | 3 | 0 | 5 |
Optional courses |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-2630 | 3 | 2 | 5 | |
321-7600 | 3 | 0 | 5 |
Cycle 1: Information and Communication Systems Security and Privacy |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-99100 | Regulatory and Social Issues in Information Society | 3 | 0 | 5 |
Cycle 2: Information Systems and Entrepreneurship |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-5400 | Information Systems Strategy and Investment | 3 | 0 | 5 |
321-8200 | E-Commerce Technologies and Applications | 3 | 0 | 5 |
Cycle 3: Computer and Telecommunication Technologies |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-3250 | Internet of Things | 3 | 2 | 5 |
321-10650 | Satellite Communications | 3 | 2 | 5 |
321-8650 | Optoelectronics | 3 | 2 | 5 |
321-6550 | Multimedia | 3 | 2 | 5 |
Cycle 4: Communication Systems and Networks |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-9400 | Sensor Networks | 3 | 2 | 5 |
321-9120 | Design and Development of Mobile Computing applications | 3 | 2 | 5 |
Cycle 5: Information Management and Intelligent Systems |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-9450 | Applied Topics in Data Structures and Databases | 3 | 0 | 5 |
321-7400 | Knowledge Engineering and Knowledge Systems | 3 | 0 | 5 |
Cycle 6: Computer Science Foundations |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-10000 | Algorithms and Combinatorial Optimization | 3 | 0 | 5 |
Optional courses |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-2600 | 3 | 0 | 5 |
Compulsory courses |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-7100 | Degree Thesis | 30 |
Title | Computer Network Security and Privacy Enhancing Technologies |
---|---|
Lesson Code | 321-9700 |
Semester | 7 |
ECTS | 5 |
Hours (Theory) | 3 |
Hours (Lab) | 0 |
Faculty | Kambourakis Georgios |
- Introduction to Computer Network Security: Terminology, Threats, Vulnerabilities, Countermeasures, Assurance.
- PKI Technologies and Services.
- OSI/ISO Network Security Architecture: Security Services, Security Mechanisms, Security Management. Internet Model
- Security Architecture: Network layer security, Internet layer Security, Transport layer Security, Application layer Security.
- Firewalls: Capabilities and Limitations, Design issues, Firewalls Architectures, Network level Firewalls, Application level Firewalls, Hybrid Firewalls.
- Distributed Authentication Systems: Kerberos.
- Intorduction to Intrusion Detection Systems.
- Privacy Enhancing Technologies: Censhorship on the Web.
This course provides a broad-spectrum introduction to the fundamental principles of network security and privacy enhancing technologies. The structure of this course follows the OSI/ISO architecture of network security, more specifically that of the TCP/IP model. The main learning objectives of the course are as follows:
- To provide a deep understanding of network security and its changing nature.
- To explain and demonstrate how network security is perceived and carried out.
- To analyze the various categories of threats, vulnerabilities, countermeasures and repelling strategies
- To conceptualize the challenges of network security.
- To familiarize the students with the basic terminology and technologies of data privacy in networking environment and examine typical anonymity networks (Tor, I2P), applications, and use-cases.
The aim of the projects is to provide students with the knowledge and skills necessary to design and support network security and privacy. The aforementioned objectives are met through course lectures, paper readings, and laboratory exercises.
Not required.
- Βασικές Αρχές Ασφάλειας Δικτύων: Εφαρμογές και Πρότυπα, William Stallings, έκδοση 3η, 2008 (μετάφραση).
- Ασφάλεια υπολογιστών: Αρχές και πρακτικές, William Stallings, Lawrie Brown, 3η έκδοση, 2016 (μετάφραση).
- Σ. Γκρίτζαλης, Σ. Κάτσικας, Δ. Γκρίτζαλης, Ασφάλεια Δικτύων Υπολογιστών, Εκδόσεις Παπασωτηρίου, 2004.
- Λαμπρινουδάκης, Κ., Μήτρου, Λ., Γκρίτζαλης, Σ., Κάτσικας, Σ., (Eds.), Προστασία της Ιδιωτικότητας και Τεχνολογίες Πληροφορικής και Επικοινωνιών: Τεχνικά και Νομικά Θέματα, Παπασωτηρίου, 2009.
- Stallings W., Network Security Essentials Applications and Standards, Prentice Hall, 2013.
- S.Furnell, S.Katsikas, J.Lopez, A.Patel (Eds.), Securing Information and Communication Systems, Artech House Pubs., 2008.
- Acquisti, A., Gritzalis, S., Lambrinoudakis, C., De Capitani di Vimercati, S. (Eds.), Digital Privacy: Theory, Technologies, and Practices, Auerbach - Taylor and Francis, 2007.
- Oppliger R., Internet & Intranet Security, Artech House, 2007.
- Stewart J. M., Network Security, Firewalls, and VPNs, Jones & Bartlett Learning, 2010.
- Davidoff S., Ham, J., Network Forensics: Tracking Hackers through Cyberspace, Prentice Hall, 2012.
- Anderson R. J., Security Engineering: A Guide to Building Dependable Distributed Systems, Wiley, 2008.
- Stallings W., Cryptography and Network Security: Principles and Practice, Prentice Hall, 2010.
- Stallings W., Network Security Essentials: Applications and Standards, Pearson 6th ed., 2016.
- W. Stallings, L. Brown, Ασφάλεια Υπολογιστών: Αρχές και Πρακτικές, Έκδοση 3η Αμερικανική, ISBN 978-960-461-668-8, Εκδόσεις Κλειδάριθμος, 2016.
- Jon Erickson, Hacking: The Art of exploitation, 2nd edition, 2008.
- Edward Skoudis, Tom Liston, Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses, 2nd Ed., 2006.
- David Kennedy, Jim O'Gorman, Devon Kearns, Mati Aharoni, Metasploit: The Penetration Tester's Guide, 2011, ISBN: 978-1-59327-288-3.
- Michael Sikorski, Andrew Honig, Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software, 2012.
- Bill Blunden, The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System, 2012.
- P. Kim, The Hacker Playbook: Practical Guide to Penetration Testing, 2014, ISBN: 978-1494932633.
- D. Stuttard, M. Pinto, The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, 2011, ISBN: 978-1118026472.
- N. Ferguson, Cryptography Engineering: Design Principles and Practical Applications, 2010, ISBN: 978-0470474242.
- Michal Zalewski, The Tangled Web: A Guide to Securing Modern Web Applications, 2011, ISBN: 978-1593273880.
- OWASP Testing Guide v4.
- Ben Clark, Rtfm: Red Team Field Manual, 2014, ISBN: 978-1494295509.
- PTES Technical Guidelines, http://www.pentest-standard.org/index.php/PTES_Technical_Guidelines.
- Georgia Weidman, Penetration Testing - A hands-on introduction to Hacking, 2014, ISBN: 978-1-59327-564-8.
- Colin McGinn, Mindfucking: A Critique of Mental Manipulation, 2014, ISBN: 978-1844651146.
- Kaufman C., Network Security: Private Communication in a Public World, Prentice Hall, 2022.
- Kofler M. et al., Hacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity, Rheinwerk Computing, 2023.
- ACM Transactions on Privacy and Security.
- IEEE Transactions on Dependable and Secure Computing.
- IEEE Security and Privacy Magazine.
- Computers & Security, Elsevier.
- International Journal of Information Security, Springer.
- Security and Communication Networks, Wiley.
- IET Information Security, IET.
- Journal of Information Security and Applications, Elsevier.
Lectures, resolving exercises, Laboratory Exercises.
Activity | Semester workload |
---|---|
Lectures | 39 hours |
Laboratory Exercises | 26 hours |
Personal study | 54 hours |
Laboratory Exams |
3 hours |
Final exams | 3 hours |
Course total | 125 hours (5 ECTS) |
I. Written examination (45%) which includes:
- Multiple choice questions.
- Short-answer questions.
II. Laboratory examination (40%) which includes:
- One or two projects.
- Oral examination.
III. Class presentation (15%).
Face-to-face.