CS707 : Network Security

Course Overview

Course Synopsis

This is a graduate level course. This course is intended to provide the students not only a broad coverage of the typical network security topics, but also a practical and real-world exposure to network security challenges faced by professionals in the work-place.

Course Learning Outcomes

Upon successful completion of this course, students should be able to:

  • Become a better IT security professional, or enhance their practical knowledge of network security
  • Understand detailed working of the Data Encryption Standard (DES)
  • Learn how Quantum Cryptography works what are different Internet Security protocols
  • Gain knowledge of how the enterprise is secured with various hardware and software security solutions
  • Find out how to conduct a web application security program in the organization
  • Gain knowledge of important mechanisms to assess weaknesses in the network and IT infrastructure which can be exploited by attackers
  • Learn about real-world challenges and solutions for network security


Course Calendar

TopicLectureResourcePage
Course Introduction, Three Objectives of IT Security, Three Foundations of IT Security1
Introduction to Classical Cryptography2
The Threat Environment, Basic Security Terminology, Case Study: The Tjx Data Breach3
The Threat Environment (cont...), Employee and Ex-Employee (Insider) Threats4
Traditional External Attackers, Classic Malware: Viruses and Worms, Trojan Horses and Rootkits5
Trojan Horses and Rootkits (cont...), Other Malware Attacks6
Hackers, Social Engineering used by Hackers7
Assignment No. 1
Cryptography :Definitions & Concepts, Kerckhoff's Principle, Strength of the Cryptosystem, Services of Cryptosystems8
Cryptography (cont...), One-Time Pad, Steganography, Types of Ciphers9
Methods of Encryption, Symmetric Cryptography, Asymmetric Cryptography, Symmetric vs Asymmetric Algorithms10
Symmetric Algorithms, Block Ciphers, Stream Ciphers, Hybrid Encryption Systems11
Types of Symmetric Systems, Data Encryption Standard (DES)12
DES (cont...), Triple DES (3DES)13
Advanced Encryption Standard (AES), International Data Encryption Algorithm (IDEA), Blowfish, RC4, RC5, RC6, Review of Cryptography14
Asymmetric Key Algorithms, Diffie Hellman Algorithm, RSA Algorithm15
Difference between Public Key Cryptography and Public Key Infrastructure (PKI), One-Way Functions, El Gamal, Elliptic Curve Cryptosystems, Knapsack16
Assignment No. 2
Message Integrity, Message Authentication Codes (MAC), HMAC Example, CBC-MAC17
MAC (cont...), CMAC, Types of Hashing Algorithms, Desired Features of Cryptographic Hash Functions, Hashing Algorithms used Today18
Review of Symmetric Asymmetric and Hashing Algorithms, Digital Signatures, Digital Signature Standard (DSS), Public Key Infrastructure (PKI)19
PKI (cont...), PKI Components, Certificate Authority (CA), Functions of a Certificate Authority, Certificate Revocation List (CRL)20
Online Certificate Status Protocol (OCSP), Certificates and X.509, Registration Authority (RA), PKI Example, PKI Components, PKI Security Services21
Review of PKI Digital Certificates Certificate Structure and PKI Services, Key Management, Kerberos Protocol, Key Management Principles, Rules for Keys22
Mid-term Examination
Link Encryption vs End-to-End Encryption, Encryption at Different Layers, Hardware vs Software Cryptography Systems, Email Standards23
Review of Link Encryption vs End-to-End Encryption, Email Standards (cont...)24
Quantum Cryptography, Internet Security, Internet Protocols25
Secure HTTP(S-HTTP), Secure Electronic Transaction (SET), Cookies and How They Work26
Typical Cryptographic System Working, Secure Shell (SSH), Virtual Private Networks (VPNs), IPSEC (Internet Protocol Security)27
IPSEC (cont...), Attacks: Passive and Active28
Enterprise Network Architecture, Different Traffic Flows in the Enterprise, Implementing Security in the Enterprise29
Enterprise Network Architecture (cont...)30
Enterprise Network Architecture (cont...)31
Course Viva
Firewalls, Types of Firewalls32
Types of Firewalls (cont...), Firewall Configurations and Demilitarized Zone (DMZ), Distributed Firewalls33
Enterprise Network Architecture (cont...), Intrusion Detection and Prevention System (IDPS)34
IPS Technologies, IPS Response Techniques, Common IPS Detection Methodologies35
Common IPS Detection Methodologies (cont...), Stateful Protocol Analysis, Types of IDPS technologies36
System and Server Security37
System and Server Security (cont...)38
Academic Research Paper
Web Application Security, Open Web Application Security Project (OWASP)39
OWASP (cont...), OWASP top 10, Secure SDLC40
Information Security Assessments, Technical Assessment Techniques, Testing Viewpoints, Vulnerability Scanning41
Target Vulnerability Validation Techniques, Penetration Testing Overview and Phases42
Presentations
Security Features on Switches, Layer 2 Security, Types of Layer 2 Attacks, Port Level Traffic Controls43
Spanning Tree Protocol (STP) Features, Access Control Lists on Switches, Layer 2 Security Best Practices44
Twenty Critical Security Controls, Award-winning Security Products45
Final-term Examination
 
 
Back to Top