CS315 : Network Security

Course Overview

Course Synopsis

In this course a student will learn about Security Attacks, Security Mechanisms, Cryptanalysis, Hash Functions, Public-Key Encryption Structure, Intrusion, Denial of Service Attacks, Malicious software,Symmetric Encryption principles, Public-Key Cryptography and message authentication, Network Access Control and cloud Security, Network Security Applications, Packet Tracer and Encryption & Authentication Algorithms.

Course Learning Outcomes

After Completing this course, students will be able to:

  • Distinguish among the types of security attacks.
  • Describe about Security Mechanisms.
  • Apply various types of Encryption Schemes according to requirements.
  • Use Network Security Applications and Algorithms


Course Calendar

1 Week 1.1 Introduction to the Course
2 Week 1.2 Definition Of Computer Security
3 Week 1.3 Impact Of A Security Breach
4 Week 1.4 Challenges Of Network Security
5 Week 1.5 The OSI Security Architecture
6 Week 1.6 Security Attacks
7 Week 1.7 Security Services: Authentication, Access Control
8 Week 1.8 Security Services: Data Confidentiality, Data Integrity, Nonrepudiation
9 Week 1.9 Security Mechanisms
10 Week 1.10 A Model For Network Security
11 Week 1.11 Basics Of Symmetric Encryption
12 Week 1.12 Cryptanalysis

13 Week 2.1 Fiestel Cipher Structure
14 Week 2.2 Data Encryption Standard (DES)
15 Week 2.3 Triple DES
16 Week 2.4 Advanced Encryption Standard (AES)
17 Week 2.5 The Use of Random Numbers
18 Week 2.6 Pseudorandom Numbers
19 Week 2.7 Stream Cipher Structure
20 Week 2.8 The RC4 Algorithm
21 Week 2.9 Electronic Codebook and Cipher Block Chaining Modes
22 Week 2.10 Cipher Feedback Mode
23 Week 2.11 Counter Mode
24 Week 2.12 Message Authentication with and without Encryption
Assignment No. 1

25 Week 3.1 One-way Hash Function
26 Week 3.2 Hash Function Requirements
27 Week 3.3 Simple Hash Functions
28 Week 3.4 The Secure Hash Function (SHA)
29 Week 3.5 HMAC and its Design Objectives
30 Week 3.6 HMAC Algorithm
31 Week 3.7 Cipher-Based Message Authentication Code
32 Week 3.8 Counter with Cipher Block Chaining-Message Authentication Code
33 Week 3.9 Public-Key Encryption Structure
34 Week 3.10 Applications and Requirements for Public-Key Cryptosystems
35 Week 3.11 The RSA Public- Key Encryption Algorithm
36 Week 3.12 Diffie-Hellman Algorithm
Quiz No. 1

37 Week 4.1 Key Exchange and Man-in-the-Middle Attack
38 Week 4.2 Digital Signature Standard (DSS)
39 Week 4.3 Elliptic-Curve Cryptography (ECC)
40 Week 4.4 Digital Signatures
41 Week 4.5 Symmetric Key Distribution Using Symmetric Encryption
42 Week 4.6 What is Kerberos?
43 Week 4.7 A Simple Authentication Dialogue
44 Week 4.8 A More Secure Authentication Dialogue
45 Week 4.9 The Version 4 Authentication Dialogue
46 Week 4.10 Rationale For The Elements Of The Kerberos Version 4
47 Week 4.11 Kerberos Realms And Multiple Kerberi
48 Week 4.12 Differences Between Kerberos Versions 4 And 5
Graded Discussion

49 Week 5.1 The Version 5 Authentication Dialogue
50 Week 5.2 Public-Key Certificates
51 Week 5.3 Public-Key Distribution of Secret Keys
52 Week 5.4 Certificates of X.509 Certificates
53 Week 5.5 Obtaining And Revoking A User’s Certificate
54 Week 5.6 X.509 Version 3
55 Week 5.7 Elements of Public Key Infrastructure X.509 (PKIX)
56 Week 5.8 PKIX Management Functions and Protocols
57 Week 5.9 Identity Management Architecture
58 Week 5.10 Federated Identity Operation
59 Week 5.11 Federated Identity Scenarios
60 Week 5.12 Elements of Network Access Control
Quiz No. 2

61 Week 6.1 Network Access Enforcement Methods
62 Week 6.2 Introduction to Extensible Authentication Protocol (EAP)
63 Week 6.3 EAP Protocol Exchanges
64 Week 6.4 Introduction to IEEE 802.1X Port- Based Network Access Control
65 Week 6.5 Working of IEEE 802.1X Port-Based Network Access Control
66 Week 6.6 Cloud Computing and its Elements
67 Week 6.7 Cloud Computing Reference Architecture
68 Week 6.8 Cloud Security Risks And Countermeasures
69 Week 6.9 Data Protection In The Cloud
70 Week 6.10 Cloud Security As A Service
71 Week 6.11 Web Security Considerations
72 Week 6.12 Secure Sockets Layer (SSL) Architecture

73 Week 7.1 SSL Record Protocol
74 Week 7.2 Change Cipher Spec Protocol: An SSL specific Protocol
75 Week 7.3 Phase 1 of SSL Handshake Protocol
76 Week 7.4 Phase 2 of SSL Handshake Protocol
77 Week 7.5 Phases 3 and 4 of SSL Handshake Protocol
78 Week 7.6 TLS Authentication Code and Pseudorandom Function
79 Week 7.7 Alert Codes and Cipher suites Supported by TLS
80 Week 7.8 HTTPS
81 Week 7.9 Introduction to Secure Shell (SSH)
82 Week 7.10 SSH Transport Layer Protocol
83 Week 7.11 SSH User Authentication Protocol
84 Week 7.12 SSH Connection Protocol

85 Week 8.1 SSH Tunneling
86 Week 8.2 Introduction to Wireless Security
87 Week 8.3 Wireless Network Threats and Security Measures
88 Week 8.4 Basics of Mobile Device Security
89 Week 8.5 Mobile Device Security Strategy
90 Week 8.6 Introduction to IEEE 802.11 Wireless LAN
91 Week 8.7 IEEE 802 Protocol Architecture
92 Week 8.8 IEEE 802.11 Services
93 Week 8.9 Introduction to IEEE 802.11i WLAN Security
94 Week 8.10 IEEE 802.11i Phases of Operation
95 Week 8.11 Discovery Phase of IEEE 802.11i
96 Week 8.12 Authentication Phase of IEEE 802.11i
Midterm Examination

97 Week 9.1 Key Management Phase of IEEE 802.11i
98 Week 9.2 Protected Data Transfer Phase of IEEE 802.11i
99 Week 9.3 The IEEE 802.11i Pseudorandom Function
100 Week 9.4 Introduction to Pretty Good Privacy (PGP)
101 Week 9.5 PGP Authentication Service
102 Week 9.6 PGP Confidentiality Service
103 Week 9.7 PGP Compression and E-Mail Compatibility
104 Week 9.8 PGP Cryptographic Keys
105 Week 9.9 PGP Key Rings
106 Week 9.10 Approaches to Public Key Management
107 Week 9.11 PGP Trust Model
108 Week 9.12 Multipurpose Internet Mail Extension (MIME)

109 Week 10.1 MIME Content Types
110 Week 10.2 MIME Transfer Encodings
111 Week 10.3 S/MIME Functionality
112 Week 10.4 S/MIME Messages
113 Week 10.5 S/MIME Certificate Processing
114 Week 10.6 Internet Mail Architecture
115 Week 10.7 E-mail Threats
116 Week 10.8 DomainKeys Identified Mail Strategy
117 Week 10.9 Introduction to IPsec
118 Week 10.10 Applications and Benefits of IPsec
119 Week 10.11 IPSec Security Association Database
120 Week 10.12 IPSec Security Policy Database
Assignment No. 2

121 Week 11.1 IP Traffic Processing
122 Week 11.2 ESP and its Packet Format
123 Week 11.3 Encryption & Authentication Algorithms
124 Week 11.4 Transport and Tunnel ESP Modes
125 Week 11.5 Combining Security Associations
126 Week 11.6 Internet Key Exchange (IKE)
127 Week 11.7 IKEv2 Exchanges
128 Week 11.8 IKE Header and Payload Formats
129 Week 11.9 Types Of Malicious Software
130 Week 11.10 Nature of Viruses
131 Week 11.11 Virus Structure
132 Week 11.12 Viruses Classification
Quiz No. 3

133 Week 12.1 Antivirus Approaches
134 Week 12.2 Digital Immune System
135 Week 12.3 Behavior-Blocking Software
136 Week 12.4 Introduction to Worms
137 Week 12.5 Worm Propagation Model
138 Week 12.6 Proactive Worm Containment
139 Week 12.7 Network-Based Worm Defense
140 Week 12.8 Distributed Denial of Service Attacks
141 Week 12.9 Types of Flooding-Based DDoS Attacks
142 Week 12.10 Recent Forms of Malware Attacks
143 Week 12.11 Intruders

144 Week 13.1 Intrusion Techniques
Quiz No. 4
145 Week 13.2 Basics of Intrusion Detection
146 Week 13.3 Statistical Anomaly Detection
147 Week 13.4 Rule-Based Intrusion Detection
148 Week 13.5 Distributed Intrusion Detection
149 Week 13.6 Honeypots
150 Week 13.7 Password Protection
151 Week 13.8 Password Selection Strategies
152 Week 13.9 Basics of Firewalls

153 Week 14.1 Packet Filtering Firewall
154 Week 14.2 Weaknesses of Packet Filter Firewalls
155 Week 14.3 Stateful Inspection Firewalls
156 Week 14.4 Application and Circuit-Level Gateways
157 Week 14.5 Firewall Basing
158 Week 14.6 Demilitarized Zone (DMZ) Networks
159 Week 14.7 VPNs and Distributed Firewalls
160 Week 14.8 Host-Based and Personal Firewalls
161 Week 14.9 Configure Routers for Syslog, NTP, SSH

162 Week 15.1 Configure AAA Authentication on Routers
163 Week 15.2 Configure IP ACLs to Mitigate Attacks
164 Week 15.3 Configure Context-Based Access Control
165 Week 15.4 Configure a Zone-Based Policy Firewall
166 Week 15.5 Configure IOS Intrusion Prevention System
167 Week 15.6 Configuring Layer 2 Security
168 Week 15.7 Configuring Layer 2 VLAN Security
169 Week 15.8 Configure & Verify a Site-to-Site IPsec VPN
170 Week 15.9 Configure a Network for Secure Operation-1
171 Week 15.10 Configure a Network for Secure Operation-2
Final Term Examination