Computer Engineering MA, Network Security and Management, 6 credits


Computer Engineering MA, Network Security and Management, 6 credits

General data

  • Code: DT055A
  • Subject/Main field: Computer Engineering
  • Cycle: Second cycle
  • Credits: 6
  • Progressive specialization: A1N - Second cycle, has only first-cycle course/s as entry requirements
  • Answerable department: Information Systems and Technology
  • Answerable faculty: Faculty of Science, Technology and Media
  • Established: 10/1/2018
  • Date of change: 5/27/2021
  • Version valid from: 8/1/2021


The course treats policies, strategies and techniques for reliable management of computer networks. Some of the concepts studied are performance monitoring, fault detection, recovery and configuration. The emphasis is put on network security, including cryptography, privacy, message integrity, intrusion, packet sniffing, spoofing, authentication, authorization, access control and firewalls etc.

Course objectives

After the course the student should be able to
- enumerate and explain the case for network management arising from the complexity of the system,
- understand how network management is involved and affects the overall network design,
- summarize the strength and the weaknesses associated with different approaches to management,
- define the fundamental concepts of cryptography and describe how they work,
- summarize the capabilities and limitations of secure systems,
- demonstrate the use of appropriate management and security tools,
- develop strategy for ensuring appropriate levels of security, and
- discuss and explain the issues that go into the design of a secure network


- Types of management (performance, fault, configuration, accounting, security).
- Management protocols (CMISE/CMIP; SNMP Internet framework for management)
- Monitoring and managing performance (hosts, routers, intrusion detection, RAMON)
- Security threats and attacks (secrecy; message integrity, types of intrusion)
- Cryptography (digital signatures, public and secrete key algorithms, data encryption standards)
- AAA (authorization; authentication and accounting)
- Protection and forensics (security policies, incidents)
- Identity management

Entry requirements

Computer Engineering BA (ABC), 52.5 credits, including TCP/IP Internetworking. Mathematics BA (A), 22.5 credits, including Discrete Mathematics.

Selection rules and procedures

The selection process is in accordance with the Higher Education Ordinance and the local order of admission.

Teaching form

The course consists of 20 hours of lectures (10%) and 8 laboratory exercises (4%). The rest of the time, 172 hours (86%) is devoted to studying without supervision. This includes the time necessary to prepare for lectures, laboratory work, solve homework problems, and study time.

Examination form

L104: Laboration, 1.0 Credits
Grade scale: Fail (U) or Pass (G)

P104: Project with seminars, 2.5 Credits
Grade scale: Seven-grade scale, A, B, C, D, E, Fx and F. Fx and F represent fail levels.

T104: Short written exam, 2.5 Credits
Grade scale: Seven-grade scale, A, B, C, D, E, Fx and F. Fx and F represent fail levels.

Assessment criteria for this subject can be found on

The examiner has the right to offer alternative examination arrangements to students who have been granted the right to special support by Mid Sweden University’s disabilities adviser.

If examination on campus cannot be conducted according to decision by the vice-chancellor, or whom he delegated the right to, the following applies: [Short ritten Exam T104], will be replaced with two parts, online examination and follow-up. Within three weeks of the online examination, a selection of students will be contacted and asked questions regarding the examination. The follow-up consists of questions concerning the execution of the on-line exam and the answers that the student have submitted.

Grading system

Seven-grade scale, A, B, C, D, E, Fx and F. Fx and F represent fail levels.

Course reading

Reference literature

  • Author: William Stallings
  • Title: Cryptography and Network Security: Principles and Practice
  • Publisher: Pearson
  • Author: William Stallings
  • Title: Network Security Essentials: Applications and Standards
  • Publisher: Pearson
  • Author: Ric Messier
  • Title: Learning Kali Linux
  • Publisher: O'Reilly
Studiematerial kommer att distribueras under kursens gång, antingen via web eller vid föreläsningstillfällen.

Study material in form of handouts will be distributed via the web page or during the lectures.

The page was updated 9/2/2014