EC03 - Network Security

Strategic defence, threat mitigation, and secure design for modern enterprise networks.

Credits

7.5 ECTS

Semester

1 Semester

Delivery

Online

Duration

13 weeks

Language

English

About This Course

This is a firts-semester course in the MBA in Advanced Cybersecurity Technologies &
Governance
Network Security introduces postgraduate students to the principles and practices of securing modern communication networks. The course blends theory with hands-on experimentation to examine network threats, security protocols, and defence mechanisms across TCP/IP infrastructures. Students learn how to analyse attacks, apply hardening techniques, and design secure enterprise networks using defence-in-depth approaches, preparing them to manage network security challenges in real-world environments.

What You Will Learn


Network Security Foundations

  • Core networking components and their security challenges
  • Evolution of TCP/IP with integrated security protocols
  • Common threats affecting networks, devices, and operating systems


Secure Communication & Infrastructure

  • Security services such as TLS, IPsec, and secure routing
  • Hardening techniques for network perimeters and endpoints
  • Design of secure architectures using VPNs, firewalls, and IDS/IPS


Attack Analysis & Defensive Strategies

  • Network attack types such as DoS, spoofing, and tampering

  • Packet-level analysis and threat detection techniques

  • Defence-in-depth principles for enterprise network protection

Your 13-Week Journey

Here’s how your learning unfolds

Week 1 – Basic fundamentals and network elements 

Introduction to network elements, topologies, and core TCP/IP protocols, with an overview of security issues and common network-level attacks.


Week 2 – Network attacks and link-level security

Overview of attack types (CIA triad), tools, and techniques, plus key vulnerabilities in wireless networks (IEEE 802.11).

Week 3 – Network-level and transport-level security

Deep dive into IPSec and TLS (including TLS 1.2/1.3, DTLS, mTLS) for secure communications.


Week 4 – Application-level security and hardening of interconnection devices

Security at the application layer (SSH, HTTPS, PGP, etc.) and introduction to MitM risks and switch vulnerabilities.

Week 5 – Hardening of interconnection devices

Study of major network attacks (SYN, Smurf, DHCP starvation) and best practices for securing interconnection devices.


Week 6 – Perimeter security

Key concepts of VLANs, VPNs, and firewalls, including architectures like DMZ.

Week 7 – Virtual private networks and firewalls, and continuous assessment (I) 

Applied use of security standards in real cases, followed by a knowledge assessment.

Week 8 – Lab activities

Hands-on exercises on attack techniques related to earlier topics.

Week 9 – Lab activities 

Practical work focused on network defense strategies.

Week 10 – Detection, prevention, and deception

Modern approaches and tools for identifying and preventing threats.

Week 11 – Endpoints hardening

Security best practices for Linux and Windows systems.


Week 12 – Continuous assessment (II) and lab activities

Evaluation of recent topics and practical sessions on detection and prevention.

Week 13 – Lab activities and presentations 

Final practical work and project presentation demonstrating network security skills.



Empty space, drag to resize

Skills You Will Gain

Network Threat Analysis

  • Identifying vulnerabilities in communication networks
  • Performing packet-level analysis and interpreting attack artefacts
  • Monitoring and responding to network-based threats

Secure Network Design

  • Designing enterprise network architectures with layered security
  • Configuring secure routing, switching, and communication protocols
  • Deploying firewalls, IDS/IPS, and VPN solutions

Cyber Defence Operations

  • Leading blue-team monitoring and incident response
  • Applying secure configuration and hardening practices
  • Ensuring confidentiality, integrity, and availability (CIA) in networks

Week 1 — Systems in Transition

See the world in systems.
Learn to rethink linear vs circular economies and explore planetary boundaries.

Week 2 — The Digital–Circular Nexus

Discover how tech enables sustainability.
Explore how AI, IoT, and data power circular innovation.

Week 3 — Policy as Infrastructure

Understand Europe’s circular blueprint.
Dive into the EU Green Deal, CEAP, and Digital Europe frameworks.

Week 4 — Designing for Re-entry

Design for durability, reuse, and remanufacturing.
Learn how digital twins and simulation tools extend product lifecycles.

Week 5 — Tracking Resources Through Data

Follow materials in motion.
Understand how IoT and data infrastructures create transparency in supply chains.

Week 6 — Blockchain for Accountability

Trust through transparency.
Explore blockchain’s potential for tracking, verification, and ethical assurance.

Week 7 — Learning Loops with AI

Let data drive regeneration.
See how AI and machine learning enable adaptive circular decision-making.

Week 8 — Cognitive Factories

Meet the new industrial symbiosis.
Examine how robotics and smart manufacturing create circular production systems.

Week 9 — Reverse Intelligence

Close the loop through recovery.
Explore reverse logistics, digital disassembly, and resource recovery networks.

Week 10 — Measuring Circularity

Turn data into progress.
Use metrics, KPIs, and dashboards to track circular performance.

Week 11 — Financing the Regenerative Future

Empower innovation.
Discover how deep-tech, investment, and valuation models support circular ventures.

Week 12 — Ethics and Mindsets

Lead with responsibility.
Reflect on ethics, human–machine collaboration, and the competences for circular leadership.

Week 13 — 2040 and Beyond

Imagine the future you want to build.
Learn to rethink linear vs circular economies and explore planetary boundaries.