Course Overview
|
Course Synopsis
|
In this course a student will learn about Security Attacks, Security Mechanisms, Cryptanalysis, Hash Functions, Public-Key Encryption Structure, Intrusion, Denial of Service Attacks, Malicious software,Symmetric Encryption principles, Public-Key Cryptography and message authentication, Network Access Control and cloud Security, Network Security Applications, Packet Tracer and Encryption & Authentication Algorithms.
|
Course Learning Outcomes
|
After Completing this course, students will be able to:
- Distinguish among the types of security attacks.
- Describe about Security Mechanisms.
- Apply various types of Encryption Schemes according to requirements.
- Use Network Security Applications and Algorithms
|
Course Calendar
|
|
Week 01
1
|
Week 1.1 Introduction to the Course
|
2
|
Week 1.2 Definition Of Computer Security
|
3
|
Week 1.3 Impact Of A Security Breach
|
4
|
Week 1.4 Challenges Of Network Security
|
5
|
Week 1.5 The OSI Security Architecture
|
6
|
Week 1.6 Security Attacks
|
7
|
Week 1.7 Security Services: Authentication, Access Control
|
8
|
Week 1.8 Security Services: Data Confidentiality, Data Integrity, Nonrepudiation
|
9
|
Week 1.9 Security Mechanisms
|
10
|
Week 1.10 A Model For Network Security
|
11
|
Week 1.11 Basics Of Symmetric Encryption
|
12
|
Week 1.12 Cryptanalysis
|
Week 02
13
|
Week 2.1 Fiestel Cipher Structure
|
14
|
Week 2.2 Data Encryption Standard (DES)
|
16
|
Week 2.4 Advanced Encryption Standard (AES)
|
17
|
Week 2.5 The Use of Random Numbers
|
18
|
Week 2.6 Pseudorandom Numbers
|
19
|
Week 2.7 Stream Cipher Structure
|
20
|
Week 2.8 The RC4 Algorithm
|
21
|
Week 2.9 Electronic Codebook and Cipher Block Chaining Modes
|
22
|
Week 2.10 Cipher Feedback Mode
|
23
|
Week 2.11 Counter Mode
|
24
|
Week 2.12 Message Authentication with and without Encryption
|
Assignment No. 1
Week 03
25
|
Week 3.1 One-way Hash Function
|
26
|
Week 3.2 Hash Function Requirements
|
27
|
Week 3.3 Simple Hash Functions
|
28
|
Week 3.4 The Secure Hash Function (SHA)
|
29
|
Week 3.5 HMAC and its Design Objectives
|
30
|
Week 3.6 HMAC Algorithm
|
31
|
Week 3.7 Cipher-Based Message Authentication Code
|
32
|
Week 3.8 Counter with Cipher Block Chaining-Message Authentication Code
|
33
|
Week 3.9 Public-Key Encryption Structure
|
34
|
Week 3.10 Applications and Requirements for Public-Key Cryptosystems
|
35
|
Week 3.11 The RSA Public- Key Encryption Algorithm
|
36
|
Week 3.12 Diffie-Hellman Algorithm
|
Quiz No. 1
Week 04
37
|
Week 4.1 Key Exchange and Man-in-the-Middle Attack
|
38
|
Week 4.2 Digital Signature Standard (DSS)
|
39
|
Week 4.3 Elliptic-Curve Cryptography (ECC)
|
40
|
Week 4.4 Digital Signatures
|
41
|
Week 4.5 Symmetric Key Distribution Using Symmetric Encryption
|
42
|
Week 4.6 What is Kerberos?
|
43
|
Week 4.7 A Simple Authentication Dialogue
|
44
|
Week 4.8 A More Secure Authentication Dialogue
|
45
|
Week 4.9 The Version 4 Authentication Dialogue
|
46
|
Week 4.10 Rationale For The Elements Of The Kerberos Version 4
|
47
|
Week 4.11 Kerberos Realms And Multiple Kerberi
|
48
|
Week 4.12 Differences Between Kerberos Versions 4 And 5
|
Graded Discussion
Week 05
49
|
Week 5.1 The Version 5 Authentication Dialogue
|
50
|
Week 5.2 Public-Key Certificates
|
51
|
Week 5.3 Public-Key Distribution of Secret Keys
|
52
|
Week 5.4 Certificates of X.509 Certificates
|
53
|
Week 5.5 Obtaining And Revoking A User’s Certificate
|
54
|
Week 5.6 X.509 Version 3
|
55
|
Week 5.7 Elements of Public Key Infrastructure X.509 (PKIX)
|
56
|
Week 5.8 PKIX Management Functions and Protocols
|
57
|
Week 5.9 Identity Management Architecture
|
58
|
Week 5.10 Federated Identity Operation
|
59
|
Week 5.11 Federated Identity Scenarios
|
60
|
Week 5.12 Elements of Network Access Control
|
Quiz No. 2
Week 06
61
|
Week 6.1 Network Access Enforcement Methods
|
62
|
Week 6.2 Introduction to Extensible Authentication Protocol (EAP)
|
63
|
Week 6.3 EAP Protocol Exchanges
|
64
|
Week 6.4 Introduction to IEEE 802.1X Port- Based Network Access Control
|
65
|
Week 6.5 Working of IEEE 802.1X Port-Based Network Access Control
|
66
|
Week 6.6 Cloud Computing and its Elements
|
67
|
Week 6.7 Cloud Computing Reference Architecture
|
68
|
Week 6.8 Cloud Security Risks And Countermeasures
|
69
|
Week 6.9 Data Protection In The Cloud
|
70
|
Week 6.10 Cloud Security As A Service
|
71
|
Week 6.11 Web Security Considerations
|
72
|
Week 6.12 Secure Sockets Layer (SSL) Architecture
|
Week 07
73
|
Week 7.1 SSL Record Protocol
|
74
|
Week 7.2 Change Cipher Spec Protocol: An SSL specific Protocol
|
75
|
Week 7.3 Phase 1 of SSL Handshake Protocol
|
76
|
Week 7.4 Phase 2 of SSL Handshake Protocol
|
77
|
Week 7.5 Phases 3 and 4 of SSL Handshake Protocol
|
78
|
Week 7.6 TLS Authentication Code and Pseudorandom Function
|
79
|
Week 7.7 Alert Codes and Cipher suites Supported by TLS
|
81
|
Week 7.9 Introduction to Secure Shell (SSH)
|
82
|
Week 7.10 SSH Transport Layer Protocol
|
83
|
Week 7.11 SSH User Authentication Protocol
|
84
|
Week 7.12 SSH Connection Protocol
|
Week 08
85
|
Week 8.1 SSH Tunneling
|
86
|
Week 8.2 Introduction to Wireless Security
|
87
|
Week 8.3 Wireless Network Threats and Security Measures
|
88
|
Week 8.4 Basics of Mobile Device Security
|
89
|
Week 8.5 Mobile Device Security Strategy
|
90
|
Week 8.6 Introduction to IEEE 802.11 Wireless LAN
|
91
|
Week 8.7 IEEE 802 Protocol Architecture
|
92
|
Week 8.8 IEEE 802.11 Services
|
93
|
Week 8.9 Introduction to IEEE 802.11i WLAN Security
|
94
|
Week 8.10 IEEE 802.11i Phases of Operation
|
95
|
Week 8.11 Discovery Phase of IEEE 802.11i
|
96
|
Week 8.12 Authentication Phase of IEEE 802.11i
|
Midterm Examination
Week 09
97
|
Week 9.1 Key Management Phase of IEEE 802.11i
|
98
|
Week 9.2 Protected Data Transfer Phase of IEEE 802.11i
|
99
|
Week 9.3 The IEEE 802.11i Pseudorandom Function
|
100
|
Week 9.4 Introduction to Pretty Good Privacy (PGP)
|
101
|
Week 9.5 PGP Authentication Service
|
102
|
Week 9.6 PGP Confidentiality Service
|
103
|
Week 9.7 PGP Compression and E-Mail Compatibility
|
104
|
Week 9.8 PGP Cryptographic Keys
|
105
|
Week 9.9 PGP Key Rings
|
106
|
Week 9.10 Approaches to Public Key Management
|
107
|
Week 9.11 PGP Trust Model
|
108
|
Week 9.12 Multipurpose Internet Mail Extension (MIME)
|
Week 10
109
|
Week 10.1 MIME Content Types
|
110
|
Week 10.2 MIME Transfer Encodings
|
111
|
Week 10.3 S/MIME Functionality
|
112
|
Week 10.4 S/MIME Messages
|
113
|
Week 10.5 S/MIME Certificate Processing
|
114
|
Week 10.6 Internet Mail Architecture
|
115
|
Week 10.7 E-mail Threats
|
116
|
Week 10.8 DomainKeys Identified Mail Strategy
|
117
|
Week 10.9 Introduction to IPsec
|
118
|
Week 10.10 Applications and Benefits of IPsec
|
119
|
Week 10.11 IPSec Security Association Database
|
120
|
Week 10.12 IPSec Security Policy Database
|
Assignment No. 2
Week 11
121
|
Week 11.1 IP Traffic Processing
|
122
|
Week 11.2 ESP and its Packet Format
|
123
|
Week 11.3 Encryption & Authentication Algorithms
|
124
|
Week 11.4 Transport and Tunnel ESP Modes
|
125
|
Week 11.5 Combining Security Associations
|
126
|
Week 11.6 Internet Key Exchange (IKE)
|
127
|
Week 11.7 IKEv2 Exchanges
|
128
|
Week 11.8 IKE Header and Payload Formats
|
129
|
Week 11.9 Types Of Malicious Software
|
130
|
Week 11.10 Nature of Viruses
|
131
|
Week 11.11 Virus Structure
|
132
|
Week 11.12 Viruses Classification
|
Quiz No. 3
Week 12
133
|
Week 12.1 Antivirus Approaches
|
134
|
Week 12.2 Digital Immune System
|
135
|
Week 12.3 Behavior-Blocking Software
|
136
|
Week 12.4 Introduction to Worms
|
137
|
Week 12.5 Worm Propagation Model
|
138
|
Week 12.6 Proactive Worm Containment
|
139
|
Week 12.7 Network-Based Worm Defense
|
140
|
Week 12.8 Distributed Denial of Service Attacks
|
141
|
Week 12.9 Types of Flooding-Based DDoS Attacks
|
142
|
Week 12.10 Recent Forms of Malware Attacks
|
Week 13
144
|
Week 13.1 Intrusion Techniques
|
Quiz No. 4
145
|
Week 13.2 Basics of Intrusion Detection
|
146
|
Week 13.3 Statistical Anomaly Detection
|
147
|
Week 13.4 Rule-Based Intrusion Detection
|
148
|
Week 13.5 Distributed Intrusion Detection
|
150
|
Week 13.7 Password Protection
|
151
|
Week 13.8 Password Selection Strategies
|
152
|
Week 13.9 Basics of Firewalls
|
Week 14
153
|
Week 14.1 Packet Filtering Firewall
|
154
|
Week 14.2 Weaknesses of Packet Filter Firewalls
|
155
|
Week 14.3 Stateful Inspection Firewalls
|
156
|
Week 14.4 Application and Circuit-Level Gateways
|
157
|
Week 14.5 Firewall Basing
|
158
|
Week 14.6 Demilitarized Zone (DMZ) Networks
|
159
|
Week 14.7 VPNs and Distributed Firewalls
|
160
|
Week 14.8 Host-Based and Personal Firewalls
|
161
|
Week 14.9 Configure Routers for Syslog, NTP, SSH
|
Week 15
162
|
Week 15.1 Configure AAA Authentication on Routers
|
163
|
Week 15.2 Configure IP ACLs to Mitigate Attacks
|
164
|
Week 15.3 Configure Context-Based Access Control
|
165
|
Week 15.4 Configure a Zone-Based Policy Firewall
|
166
|
Week 15.5 Configure IOS Intrusion Prevention System
|
167
|
Week 15.6 Configuring Layer 2 Security
|
168
|
Week 15.7 Configuring Layer 2 VLAN Security
|
169
|
Week 15.8 Configure & Verify a Site-to-Site IPsec VPN
|
170
|
Week 15.9 Configure a Network for Secure Operation-1
|
171
|
Week 15.10 Configure a Network for Secure Operation-2
|
Final Term Examination
|
|
|