CS707 : Network Security

Course Overview

Course Synopsis

This is a graduate level course. This course is intended to provide the students not only a broad coverage of the typical network security topics, but also a practical and real-world exposure to network security challenges faced by professionals in the work-place.

Course Learning Outcomes

Upon successful completion of this course, students should be able to:

  • Become a better IT security professional, or enhance their practical knowledge of network security
  • Understand detailed working of the Data Encryption Standard (DES)
  • Learn how Quantum Cryptography works what are different Internet Security protocols
  • Gain knowledge of how the enterprise is secured with various hardware and software security solutions
  • Find out how to conduct a web application security program in the organization
  • Gain knowledge of important mechanisms to assess weaknesses in the network and IT infrastructure which can be exploited by attackers
  • Learn about real-world challenges and solutions for network security


Course Calendar

1 Course Introduction
2 Introduction to Classical Cryptography
3 The Threat Environment, Basic Security Terminology, Case Study: The Tjx Data Breach
4 The Threat Environment (cont...), Employee and Ex-Employee (Insider) Threats
5 Traditional External Attackers, Classic Malware: Viruses and Worms, Trojan Horses and Rootkits
6 Trojan Horses and Rootkits (cont...), Other Malware Attacks
7 Hackers, Social Engineering used by Hackers
8 Cryptography :Definitions & Concepts, Kerckhoff's Principle, Strength of the Cryptosystem, Services of Cryptosystems
Assignment No. 1 - Academic Research Paper - Open
9 Cryptography (cont...), One-Time Pad, Steganography, Types of Ciphers
10 Methods of Encryption, Symmetric Cryptography, Asymmetric Cryptography, Symmetric vs Asymmetric Algorithms
11 Symmetric Algorithms, Block Ciphers, Stream Ciphers, Hybrid Encryption Systems
12 Types of Symmetric Systems, Data Encryption Standard (DES)
Assignment No. 2
13 DES (cont...), Triple DES (3DES)
14 Advanced Encryption Standard (AES), International Data Encryption Algorithm (IDEA), Blowfish, RC4, RC5, RC6, Review of Cryptography
15 Asymmetric Key Algorithms, Diffie Hellman Algorithm, RSA Algorithm
16 Difference between Public Key Cryptography and Public Key Infrastructure (PKI), One-Way Functions, El Gamal, Elliptic Curve Cryptosystems, Knapsack
17 Message Integrity, Message Authentication Codes (MAC), HMAC Example, CBC-MAC
18 MAC (cont...), CMAC, Types of Hashing Algorithms, Desired Features of Cryptographic Hash Functions, Hashing Algorithms used Today
Mid-term Examination
19 Review of Symmetric Asymmetric and Hashing Algorithms, Digital Signatures, Digital Signature Standard (DSS), Public Key Infrastructure (PKI)
20 PKI (cont...), PKI Components, Certificate Authority (CA), Functions of a Certificate Authority, Certificate Revocation List (CRL)
Assignment No. 3
21 Online Certificate Status Protocol (OCSP), Certificates and X.509, Registration Authority (RA), PKI Example, PKI Components, PKI Security Services
22 Review of PKI Digital Certificates Certificate Structure and PKI Services, Key Management, Kerberos Protocol, Key Management Principles, Rules for Keys
23 Link Encryption vs End-to-End Encryption, Encryption at Different Layers, Hardware vs Software Cryptography Systems, Email Standards
24 Review of Link Encryption vs End-to-End Encryption, Email Standards (cont...)
25 Quantum Cryptography, Internet Security, Internet Protocols
26 Secure HTTP(S-HTTP), Secure Electronic Transaction (SET), Cookies and How They Work
27 Typical Cryptographic System Working, Secure Shell (SSH), Virtual Private Networks (VPNs), IPSEC (Internet Protocol Security)
28 IPSEC (cont...), Attacks: Passive and Active
29 Enterprise Network Architecture, Different Traffic Flows in the Enterprise, Implementing Security in the Enterprise
30 Enterprise Network Architecture (cont...)
Assignment No.1 - Academic Research Paper - Due
31 Enterprise Network Architecture (cont..)
32 Firewalls, Types of Firewalls
Course Viva GDB
33 Types of Firewalls (cont...), Firewall Configurations and Demilitarized Zone (DMZ), Distributed Firewalls
34 Enterprise Network Architecture (cont...), Intrusion Detection and Prevention System (IDPS)
Assignment No. 4 - Presentation on Research Paper
35 IPS Technologies, IPS Response Techniques, Common IPS Detection Methodologies
36 Common IPS Detection Methodologies (cont...), Stateful Protocol Analysis, Types of IDPS technologies
37 System and Server Security
38 System and Server Security (cont...)
39 Web Application Security, Open Web Application Security Project (OWASP)
40 OWASP (cont...), OWASP top 10, Secure SDLC
41 Information Security Assessments, Technical Assessment Techniques, Testing Viewpoints, Vulnerability Scanning
42 Target Vulnerability Validation Techniques, Penetration Testing Overview and Phases
43 Security Features on Switches, Layer 2 Security, Types of Layer 2 Attacks, Port Level Traffic Controls
44 Spanning Tree Protocol (STP) Features, Access Control Lists on Switches, Layer 2 Security Best Practices
45 Twenty Critical Security Controls, Award-winning Security Products
Final-term Examination