DATA AND NETWORK SECURITY

Course objectives

Data and Network Security General goals The course Data and Network Security is designed to provide students with a solid foundation in the fundamental principles of cybersecurity, while also exposing them to current trends and cutting-edge developments in the field. Moreover, this course aims at promoting active participation in class and students' discussions on such security topics Specific goals The Data and Network Security course is designed to provide students with a comprehensive understanding of a broad spectrum of cybersecurity concepts, paradigms, and real-world applications. It emphasizes a critical perspective on the evolving threat landscape, encouraging students not only to learn the foundations of cybersecurity but also to explore cutting-edge challenges and research trends. Each lecture is structured with a dual purpose: first, to introduce a specific cybersecurity topic—such as authentication mechanisms, types of malware, covert communication channels, cyber deception, remote attestation in IoT, digital forensics, data privacy, software-defined networking, and advanced persistent threats—and second, to highlight key research questions, emerging threats, and novel techniques relevant to that topic. This approach ensures that students gain both theoretical grounding and awareness of practical and research-driven issues. A central aim of the course is to cultivate critical thinking and research-oriented curiosity. Students are encouraged to go beyond surface-level understanding by engaging with research papers that have either advanced the state of the art or uncovered new vulnerabilities and system abuses. To foster this mindset, students will conduct independent research on a security topic of their choice. They will analyze current approaches, present their findings to peers, and participate in discussions about future directions in cybersecurity. This active engagement with contemporary research equips students with the skills to evaluate, question, and contribute to the field. Knowledge and understanding Students will gain a solid foundation in the fundamental principles of cybersecurity, including the core concepts, technologies, and practices that protect digital systems and data from unauthorized access, attacks, and exploitation. They will explore key areas such as cryptographic methods, secure communication protocols, threat modeling, and common types of cyberattacks (e.g., phishing, malware, denial-of-service). Through both theoretical instruction and practical examples, students will develop an understanding of how cybersecurity measures are designed, implemented, and evaluated in real-world systems. This foundational knowledge will prepare them to critically assess security risks, recognize vulnerabilities, and apply basic protective mechanisms in a variety of digital environments. Application of knowledge and understanding Students will apply the knowledge gained throughout the course by engaging in individual or group projects that encourage them to explore diverse and emerging areas within the cybersecurity landscape. These projects will challenge them to investigate specific security issues, analyze real-world threats or vulnerabilities, and evaluate existing or novel defense mechanisms. By conducting literature reviews, designing experiments, or developing proof-of-concept implementations, students will deepen their understanding of the field while also developing critical thinking, problem-solving, and research communication skills. The projects will culminate in presentations and technical reports, fostering collaborative learning and peer feedback. Critical and Judgmental Skills Students will develop critical analytical skills needed to evaluate and compare alternative approaches when designing secure information systems. This includes the ability to identify potential vulnerabilities, assess trade-offs between security and usability, and make informed decisions grounded in both theory and practical considerations. Communication skills Students will learn how to effectively document their technical and design choices, using both manual methods and automated reporting tools commonly adopted in cybersecurity workflows. In addition, they will develop the ability to clearly communicate complex scientific topics by preparing and delivering structured presentations. This will strengthen their skills in articulating research findings, defending their decisions, and engaging in informed discussion—essential competencies for both academic and professional environments. Learning ability The knowledge and skills acquired during the course equip students with a solid foundation for pursuing more advanced studies in cybersecurity. They will also be prepared to stay current with ongoing developments in the field, enabling them to critically engage with emerging threats, technologies, and research trends throughout their careers.

Channel 1
DORJAN HITAJ Lecturers' profile

Program - Frequency - Exams

Course program
The course is structured in the following two parts: Background The first part of the course introduces the main concepts that are used in the rest of the course: Introduction to cybersecurity Concepts and terminology Identification and authentication Access control techniques Virus, trojan and, covert channels Main vulnerabilities of computer systems Analysis of the most widespread attacks: buffer overflow, cross-site scripting, SQL injection. Secure operating systems Security of group communications Security in cloud computing Security in wireless networks Secure protocols for wireless networks topology control Information security management systems Literature Analysis Each student will choose a topic from a list of possible topics and will give a talk to the rest of the class.
Prerequisites
This course is part of the Master Degree in Computer Science and Cybersecurity, and requires knowledge of programming, operating systems, distributed systems, computer networks and, cryptography.
Books
https://sites.google.com/di.uniroma1.it/dns-sapienza/home
Frequency
N/A
Exam mode
The exam consists of an oral presentation, and in submitting a report. Each student will give a seminar on a topic of their choice from a list of possible topics, and answer questions from the other students in the classroom. Students' participation in the questions&answers phase will be considered in the final grade. Students will also have to deliver a report describing how and in what measure they intend to solve a cybersecurity problem, which can be also related to the topic of their seminar. The final grade is calculated as follows: - 45% Literature Analysis and active participation - 45% Written research report - 10% Active participation to Question&Answer section. If for any reason students do not turn in most of the required above tests, then those students will be required to take an oral exam on the entire course programme, see. The weight of this final oral exam = 100%.
Bibliography
https://sites.google.com/di.uniroma1.it/dns-sapienza/home
Lesson mode
Didattica frontale/tradizionale
  • Lesson code1047623
  • Academic year2025/2026
  • CourseComputer Science
  • CurriculumSingle curriculum
  • Year1st year
  • Semester2nd semester
  • SSDINF/01
  • CFU6