CS315 : Network Security

I like this Course

Course Info

Course Category

Computer Science/Information Technology

Course Level

Undergraduate

Credit Hours

3

Pre-requisites

CS610

Instructor

Prof. Dr. Kashif Javed
PhD
University of Engineering and Technology (UET), Lahore, Pakistan

Course Contents

Introduction to the Course Definition Of Computer Security Impact Of A Security Breach Challenges Of Network Security The OSI Security Architecture Security Attacks Security Services: Authentication, Access Control Security Services: Data Confidentiality, Data Integrity, Nonrepudiation Security Mechanisms A Model For Network Security Basics Of Symmetric Encryption Cryptanalysis Fiestel Cipher Structure Data Encryption Standard (DES) Triple DES Advanced Encryption Standard (AES) The Use of Random Numbers Pseudorandom Numbers Stream Cipher Structure The RC4 Algorithm Electronic Codebook and Cipher Block Chaining Modes Cipher Feedback Mode Counter Mode Message Authentication with and without Encryption One-way Hash Function Hash Function Requirements Simple Hash Functions The Secure Hash Function (SHA) HMAC and its Design Objectives HMAC Algorithm Cipher-Based Message Authentication Code Counter with Cipher Block Chaining-Message Authentication Code Public-Key Encryption Structure Applications and Requirements for Public-Key Cryptosystems The RSA Public- Key Encryption Algorithm Diffie-Hellman Algorithm Key Exchange and Man-in-the-Middle Attack Digital Signature Standard (DSS) Elliptic-Curve Cryptography (ECC) Digital Signatures Symmetric Key Distribution Using Symmetric Encryption What is Kerberos? A Simple Authentication Dialogue A More Secure Authentication Dialogue The Version 4 Authentication Dialogue Rationale For The Elements Of The Kerberos Version 4 Kerberos Realms And Multiple Kerberi Differences Between Kerberos Versions 4 And 5 The Version 5 Authentication Dialogue Public-Key Certificates Public-Key Distribution of Secret Keys Certificates of X.509 Certificates Obtaining And Revoking A User’s Certificate X.509 Version 3 Elements of Public Key Infrastructure X.509 (PKIX) PKIX Management Functions and Protocols Identity Management Architecture Federated Identity Operation Federated Identity Scenarios Elements of Network Access Control Network Access Enforcement Methods Introduction to Extensible Authentication Protocol (EAP) EAP Protocol Exchanges Introduction to IEEE 802.1X Port- Based Network Access Control Working of IEEE 802.1X Port-Based Network Access Control Cloud Computing and its Elements Cloud Computing Reference Architecture Cloud Security Risks And Countermeasures Data Protection In The Cloud Cloud Security As A Service Web Security Considerations Secure Sockets Layer (SSL) Architecture SSL Record Protocol Change Cipher Spec Protocol: An SSL specific Protocol Phase 1 of SSL Handshake Protocol Phase 2 of SSL Handshake Protocol Phases 3 and 4 of SSL Handshake Protocol TLS Authentication Code and Pseudorandom Function Alert Codes and Cipher suites Supported by TLS HTTPS Introduction to Secure Shell (SSH) SSH Transport Layer Protocol SSH User Authentication Protocol SSH Connection Protocol SSH Tunneling Introduction to Wireless Security Wireless Network Threats and Security Measures Basics of Mobile Device Security Mobile Device Security Strategy Introduction to IEEE 802.11 Wireless LAN IEEE 802 Protocol Architecture IEEE 802.11 Services Introduction to IEEE 802.11i WLAN Security IEEE 802.11i Phases of Operation Discovery Phase of IEEE 802.11i Authentication Phase of IEEE 802.11i Key Management Phase of IEEE 802.11i Protected Data Transfer Phase of IEEE 802.11i The IEEE 802.11i Pseudorandom Function Introduction to Pretty Good Privacy (PGP) PGP Authentication Service PGP Confidentiality Service PGP Compression and E-Mail Compatibility PGP Cryptographic Keys PGP Key Rings Approaches to Public Key Management PGP Trust Model Multipurpose Internet Mail Extension (MIME) MIME Content Types MIME Transfer Encodings S/MIME Functionality S/MIME Messages S/MIME Certificate Processing Internet Mail Architecture E-mail Threats DomainKeys Identified Mail Strategy Introduction to IPsec Applications and Benefits of IPsec IPSec Security Association Database IPSec Security Policy Database IP Traffic Processing ESP and its Packet Format Encryption & Authentication Algorithms Transport and Tunnel ESP Modes Combining Security Associations Internet Key Exchange (IKE) IKEv2 Exchanges IKE Header and Payload Formats Types Of Malicious Software Nature of Viruses Virus Structure Viruses Classification Antivirus Approaches Digital Immune System Behavior-Blocking Software Introduction to Worms Worm Propagation Model Proactive Worm Containment Network-Based Worm Defense Distributed Denial of Service Attacks Types of Flooding-Based DDoS Attacks Recent Forms of Malware Attacks Intruders Intrusion Techniques Basics of Intrusion Detection Statistical Anomaly Detection Rule-Based Intrusion Detection Distributed Intrusion Detection Honeypots Password Protection Password Selection Strategies Basics of Firewalls Packet Filtering Firewall Weaknesses of Packet Filter Firewalls Stateful Inspection Firewalls Application and Circuit-Level Gateways Firewall Basing Demilitarized Zone (DMZ) Networks VPNs and Distributed Firewalls Host-Based and Personal Firewalls Configure Routers for Syslog, NTP, SSH Configure AAA Authentication on Routers Configure IP ACLs to Mitigate Attacks Configure Context-Based Access Control Configure a Zone-Based Policy Firewall Configure IOS Intrusion Prevention System Configuring Layer 2 Security Configuring Layer 2 VLAN Security Configure & Verify a Site-to-Site IPsec VPN Configure a Network for Secure Operation-1 Configure a Network for Secure Operation-2