0% found this document useful (0 votes)
88 views2 pages

CCS354 Syllabus

The document outlines a course on Network Security, covering topics such as cryptography, key management, authentication, and various security practices. It includes a detailed syllabus with units on access control, application layer security, and practical exercises for hands-on experience. The course aims to equip students with the knowledge and skills to classify encryption techniques, evaluate security methods, and apply real-time security practices.

Uploaded by

jhansirani.s
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
88 views2 pages

CCS354 Syllabus

The document outlines a course on Network Security, covering topics such as cryptography, key management, authentication, and various security practices. It includes a detailed syllabus with units on access control, application layer security, and practical exercises for hands-on experience. The course aims to equip students with the knowledge and skills to classify encryption techniques, evaluate security methods, and apply real-time security practices.

Uploaded by

jhansirani.s
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

CCS354 NETWORK SECURITY L T P C

2 0 2 3

COURSE OBJECTIVES:
 To learn the fundamentals of cryptography.
 To learn the key management techniques and authentication approaches.
 To explore the network and transport layer security techniques.
 To understand the application layer security standards.
 To learn the real time security practices.

UNIT I INTRODUCTION 8
Basics of cryptography, conventional and public-key cryptography, hash
functions, authentication, and digital signatures.

UNIT II KEY MANAGEMENT AND AUTHENTICATION 7


Key Management and Distribution: Symmetric Key Distribution, Distribution
of Public Keys, X.509 Certificates, Public-Key Infrastructure. User Authentication:
Remote User-Authentication Principles, Remote User-Authentication Using
Symmetric Encryption, Kerberos Systems, Remote User Authentication Using
Asymmetric Encryption.

UNIT III ACCESS CONTROL AND SECURITY 4


Network Access Control: Network Access Control, Extensible Authentication
Protocol, IEEE 802.1X Port-Based Network Access Control - IP Security - Internet
Key Exchange (IKE). Transport-Level Security: Web Security Considerations,
Secure Sockets Layer, Transport Layer Security, HTTPS standard, Secure Shell
(SSH) application.

UNIT IV APPLICATION LAYER SECURITY 5


Electronic Mail Security: Pretty Good Privacy, S/MIME, DomainKeys
Identified Mail. Wireless Network Security: Mobile Device Security

UNIT V SECURITY PRACTICES 6


Firewalls and Intrusion Detection Systems: Intrusion Detection Password
Management, Firewall Characteristics Types of Firewalls, Firewall Basing, Firewall
Location and Configurations. Blockchains, Cloud Security and IoT security
30 PERIODS
PRACTICALEXERCISES: 30 PERIODS
1. Implement symmetric key algorithms
2. Implement asymmetric key algorithms and key exchange algorithms
3. Implement digital signature schemes
4. Installation of Wire shark, tcpdump and observe data transferred in client-
server communication using UDP/TCP and identify the UDP/TCP datagram.
5. Check message integrity and confidentiality using SSL
6. Experiment Eavesdropping, Dictionary attacks, MITM attacks
7. Experiment with Sniff Traffic using ARP Poisoning
8. Demonstrate intrusion detection system using any tool.
9. Explore network monitoring tools
10. Study to configure Firewall, VPN

COURSE OUTCOMES:
At the end of this course, the students will be able:
CO1: Classify the encryption techniques
CO2: Illustrate the key management technique and authentication.
CO3 Evaluate the security techniques applied to network and transport layer
CO4: Discuss the application layer security standards.
CO5: Apply security practices for real time applications.
TOTAL:60 PERIODS
TEXT BOOKS:
1. Cryptography and Network Security: Principles and Practice, 6th Edition,
William Stallings, 2014, Pearson, ISBN 13:9780133354690.
REFERENCES:
2. Network Security: Private Communications in a Public World, M. Speciner, R.
Perlman, C. Kaufman, Prentice Hall, 2002.
3. Linux iptables Pocket Reference, Gregor N. Purdy, O'Reilly, 2004, ISBN-13:
978- 0596005696.
4. Linux Firewalls, by Michael Rash, No Starch Press, October 2007, ISBN: 978-1-
59327-141- 1.
5. Network Security, Firewalls And VPNs, J. Michael Stewart, Jones & Bartlett Learning,
2013, ISBN-10: 1284031675, ISBN-13: 978-1284031676.
6. The Network Security Test Lab: A Step-By-Step Guide, Michael Gregg, Dreamtech
Press, 2015, ISBN-10:8126558148, ISBN-13: 978-8126558148.

CO’s-PO’s & PSO’s MAPPING


CO’s PO’s PSO’s
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 3 2 2 2 - - - 2 1 2 1 2 3 1
2 1 1 3 2 2 - - - 2 2 1 1 3 1 2
3 1 2 1 1 2 - - - 3 3 1 3 2 1 3
4 2 2 3 2 3 - - - 3 3 2 1 2 1 3
5 2 1 3 2 2 - - - 2 1 1 3 2 1 1
AVg. 1.8 1.8 2.4 1.8 2.2 - - - 2.4 2 1.4 1.8 2.2 1.4 2
1 - low, 2 - medium, 3 - high, ‘-' - no correlation

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy