You are on page 1of 5

UNIVERSITY OF GUJRAT

A WORLD CL ASS UNIVERSITY

Department of Information Technology


COURSE DESCRIPTION

Course
Code
Course Title
Credit
Hours
Category
Prerequisite
Amis and
Objectives

IT-312
Network Security
3
core
Data

Text Book

Communication and Networks


Gain insight into the field of cryptography, and network and web security.
Understand design principles for the planning of secure networks.
Understand security weaknesses and implementation of security measures in E-mail, IP
addressing, web and networks in general.
Understand Public Key systems and protocols and their implementations in various
networks.
The students will have a clear view of network security and its applications.
The students will be able to understand different attacks, services and mechanisms.
The students will be aware cryptography and different methods for encryption.
The students will have the fundamental knowledge of authentication applications.
The students will be able to email security, web security and IP security.
The students will be able to distinguish between network security and system security
S. Network Security Essentials by William Stallings, Prentice Hall, 3rd Edition

Reference
Material

T. Corporate Computer and Network Security by Raymond Panko United States Edition,
Prentice Hall, 2004

Learning
Outcomes

1. Corporate Computer and Network Security by Raymond Panko United States Edition,
Prentice Hall, 2003
2. Cryptography and Network Security: Principles and Practice Third Edition, Prentice Hall,
2002
3. Security in Computing by Charles P. Pfleeger and Shari Lawrence Pfleeger, Third Edition,
Prentice Hall, 2002.
Assessment
Criteria

Wee
k

Lectu
re

Topic

3
4

5
6
7
8
9
10
11

12

4
5
6

Source
(BookChapter No.
Section No.)

Introduction to Network Security, Information security,


network security. Computer security, Security Trends,
OSI Security Architecture, Security Attacks, Security
Services, Security Mechanisms, A model for Network
Security
Symmetric encryption principles, Shift cipher, Rot-13
cipher, Ceasar cipher
Cryptography, Cryptanalysis techniques,
cryptanalytic attacks, substitution ciphers,
monoalphabetic ciphers,
Polyalphabetic ciphers, brute force search
fiestel cipher structure, Data Encryption Standard
DES
DES
Cipher Block Modes of Operations
CBM
Secret key cryptography, key distribution scenario and
issues, PRNGs
Public key cryptography
3

Recommendations
for Learning
Activities
(Mention
Assignments,
Test, Quizzes,
Practical, Case
Study, Projects,
Lab Work
or Reading
Assignments)

S-Chapter # 1

S-Chapter # 2
Assignment # 1
Term Projects

S-Chapter
S-Chapter
S-Chapter
S-Chapter
S-Chapter
S-Chapter

#
#
#
#
#
#

2
2
2
2
2
3

S-Chapter # 3

Quiz # 1
Assignment # 2

8
9
10
11

13
14
15
16
17
18
19
20
21
22

12

23
24

13

25
26

14

27
28

15

29
30

16

31
32

Diffie-hellman key agreement, exchange and its security, S-Chapter #


public key applications
S-Chapter #
Quiz # 2
Mid Term Week
Mid Term Week
S-Chapter #
RSA, Digital signature
RSA security
S-Chapter #
S-Chapter #
Secret sharing, Threshold based SS
S-Chapter #
Blakleys scheme, Entity authentication
S-Chapter #
S-MIME
IP Security
S-Chapter #
Internetworking and Internet Protocols , IP Security
Overview,, IPSec Services
S-Chapter #
Web Security, Threats and approaches, SSL
S-Chapter #
Legal and ethical aspects
13
S-Chapter #
System Security, Intruders, Intrusion Detection, Audit
Records, Statistical Anomaly detection
S-Chapter #
Rule based intrusion detection, Distributed intrusion
detection, honeypots,
S-Chapter #
Password management, protection, Strategies to choose
password
S-Chapter #
Malicious Softwares
10
S-Chapter #
Firewall, Types of firewalls
11
Working of firewalls
S-Chapter #
Firewall Design Principles, Firewall Characteristics ,Types of 11
Firewalls ,Firewall Configuration
Project Presentations
Final Term

3
4

4
4
4
7
7
8

9
9
9

Quiz # 3
Assignment # 3

You might also like