Monday, April 18, 2016

Information Security Course outline - University of Sargodha

The course aims to enhance students' understanding about the essentials of information
securityand the algorithms for implementing security
Security Fundamentals: Terminology, Attacks, Security Goals. Authentication, Authorization,
Cipher Techniques.Cryptography.Key Management.Network Security. Security Management
and Applications: Electronic Payment. Cyber Crimes & Laws.
1.      Security Fundamentals: Introduction, Terminology, Attacks, Security Goals :
Authentication, Authorization, Cipher Techniques: Substitution and Transposition, One
Time Pad, Modular Arithmetic, GCD, Euclid's Algorithms, Chinese Remainder
Theorem, Discrete Logarithm, Fermat Theorem, Block Ciphers, Stream Ciphers. Secret
Splitting And Sharing.
2.      Cryptography: Symmetric Key Algorithms: DES, AES, BLOFISH, Attacks on DES.
Modes of Operations, Linear Cryptanalysis and Differential Cryptanalysis. Public Key
Algorithms: RSA, Key Generation and Usage, ECC. Hash Algorithms: SHA-1, MD5.
3.      Key Management: Introduction, Key Management: Generations, Distribution, Updation,
Digital Certificate, Digital Signature, PKI. Diffiee Hellman Key Exchange. One Way
Authtication, Mutual Authentication, Neeham Schroeder Protocol.
4.      Network Security: Layer Wise Security Concerns, IPSEC- Introduction, AH And ESP,
Tunnel Mode, Transport Mode, Security Associations, SSL- Introduction, Handshake
Protocol, Record Layer Protocol. IKE- Internet Key Exchange Protocol. Intrusion
Detection Systems: Introduction, Anomaly Based, Signature Based, Host Based, Network
Based Systems.
5.      Security Management And Applications: ISO 27001 Security Standard: Introduction,
Evolution of Standard, Organizational Context, Implementation, Certifications And
Benefits. Electronic Payment: Introduction, Payment Types, Smart Cards, Chip Card


Transactions And Attacks, Payment Over Internet, Mobile Payments, Electronic Cash.
Cyber Crimes & Laws: Introduction, Computer Forensics, Online Investgative Tool,
Tracing And Recovering Electronic Evidence, Internet Fraud, Identity Theft, Industrial
Espionage, Cyber Terrorism. Indian IT Laws: Introduction And Briefs of Law Clauses.
1.      Applied Cryptography- Protocols, Algorithms and Source code in C by Bruice Schneier,
Wiley; 2nd Edition (October 18, 1996). ISBN-10: 0471117099
2.      Network Security and Cryptography by Bernard Menezes, Cengage Learning, Cengage
Learning (March 30, 2010). ISBN-10: 8131513491
3.      Cryptography and Network Security: Principles and Practice by William Stallings,
Prentice Hall; 5th Edition (January 24, 2010). ISBN-10: 0136097049
         Information Security: Principles and Practice by Mark Stamp, Wiley; 2nd Edition (May 3,
2011). ISBN-10: 0470626399
         Computer Security: Principles and Practice by William Stallings and Lawrie Brown,
Prentice Hall; 2nd Edition (November 19, 2011). ISBN-10: 0132775069
        
6.
Information Security-Principles and Practices by Mark Merkow, Prentice Hall (August
29, 2005). ISBN-10: 0131547291



Note: This content is obtained from official documents of University of Sargodha and applied on BS Computer Science for Main Campus, Sub Campuses, and Affiliated Colleges.

Network Programming Course outline - University of Sargodha

At the end of this course, students would be able to identify and describe the purpose of each
component of the TCP/IP protocol suite. Develop large and complex client-server applications
using TCP/IP. Understand the impact of multiple threads or processes for an application.
Understand the approaches toward building a robust server. This course is about implementation
of TCP/IP networking concepts, Socket programming in Linux and Windows environment,
developing client/server applications using C language, advanced networking software concepts,
Handling multiple processes and threads, sharing data or passing information between processes
or threads (IPC).
Introduction and TCP/IP. Transport Layer details: Sockets Introduction and Elementary TCP
Sockets. I/O Multiplexing: Socket Options. Elementary UDP Sockets.Elementary Name and
Address Conversions.IPv4 and IPv6 Interoperability. Daemon Processes and advanced I/O
functions. Non-blocking I/O and ioctl operations. Routing Sockets, Broadcasting, Multicasting.
Threads and Raw Sockets. Datalink Access & Streams.
1.      Introduction and TCP/IP: A Simple Daytime Client, Protocol Independence, Roadmap to
Client/Server, BSD Networking, Unix standard, 64-bit Architectures. [Ch. 1]
2.       Transport Layer details: UDP, TCP, SCTP, connections, port numbers, buffers etc [Ch. 2]
3.      Sockets Introduction and Elementary TCP Sockets : Socket Address Structure,
Arguments and Functions, TCP/IP client server Application [Ch. 3]
4.      I/O Multiplexing: The SELECT and POLL function with all aspects. [Ch. 6]
5.      Socket Options: getsockopt and setsockopt functions, default, socket states, generic,
IPv4, IPv6, ICMPv6 socket options etc. [Ch. 7]
6.      Elementary UDP Sockets: sendto and recvfrom functions, UDP echo server and client,
summary of UDP. [Ch. 8]
7.      Elementary Name and Address Conversions. [Ch. 9]
8.      IPv4 and IPv6 Interoperability. [Ch. 10]
9.      Daemon Processes and advanced I/O functions. [Ch. 12, 13]
10. Non-blocking I/O and ioctl operations. [Ch. 15,16]
11. Routing Sockets, Broadcasting, Multicasting. [Ch. 17,18, 19
12.  Threads and Raw Sockets [Ch. 23, 25]
13. Datalink Access & Streams [Ch. 26, 33]
• UNIX Network Programming Volume I by Richard Steven, Prentice Hall; 2nd Edition
(September 4, 1998).ISBN-10: 0130810819

Reference Material:
         Windows System Programming by Johnson M. Hart, Addison-Wesley Professional; 4th
Edition (February 26, 2010). ISBN-10: 0321657748
         The Linux Programming Interface: A Linux and UNIX System Programming Handbook
by Michael Kerrisk, No Starch Press; 1st Edition (October 28, 2010). ISBN-10:
1593272200
rd
         Linux Kernel Development by Robert Love, Addison-Wesley Professional; 3 Edition
(July 2, 2010). ISBN-10: 0672329468
         System Software: An Introduction to Systems Programming by Leland L. Beck, Addison
Wesley, (3rd Edition) (1996). ASIN: B0084YEEWO


Note: This content is obtained from official documents of University of Sargodha and applied on BS Computer Science for Main Campus, Sub Campuses, and Affiliated Colleges.

Mobile and Wireless Networks Course outline - University of Sargodha

Prerequisites: CS-3513 (Internet Architecture and Protocols)
Course Objectives:
This course provides a general introduction to mobile networking, with an emphasis on the
mechanisms, protocols and standards. The purpose of the course is to deliver a in-depth
understanding of the architecture and operating principles of mobile and wireless networks.

Basics of Wireless Local Area Networks. Radio Transmitters and Receivers, Multiple Access
Methods: FDMA, TDMA, CDMA, Random Access, ALOHA, Slotted ALOHA, Reservation-
based ALOHA. Radio Propagation.Antennas and Transmission Lines.Communication Protocols
and Modulation.High-Speed Wireless Data.GSM/Cellular Networks.Indoor Networks.Security in
Wireless Local Area Networks. Voice Over Wi-Fi and Other Wireless Technologies. Mobile Ad
Hoc Networks.Wireless Sensor Networks. Reliable Wireless Networks for Industrial
Applications. Applications and Technologies.Conflict and Compatibility, Ultra-wideband
Technology.
1.     Basics of Wireless Local Area Networks: Networks Large and Small, WLANs from
LANs, 802.11 WLANs, HiperLAN and HiperLAN 2, From LANs to PANs. [TB1: Ch2]
2.      Radio Transmitters and Receivers, Multiple Access Methods: Overview of Radios,
Radio Components, FDMA, TDMA, CDMA, Random Access, ALOHA, Slotted
ALOHA, Reservation-based ALOHA. [TB1: Ch3]
3.      Radio Propagation: Radio Propagation, Mechanisms of Radio Wave Propagation, Open
Field Propagation, Diffraction, Scattering, Path Loss, Multipath Phenomena, Flat
Fading, Diversity Techniques. [TB1: Ch4]
4.      Antennas and Transmission Lines: Introduction and Antenna Characteristics, Types of
Antenna, Impedance Matching, Measuring Techniques. [TB1: Ch5]
5.      Communication Protocols and Modulation: Baseband Data Format and Protocol,
Baseband Coding, RF Frequency and Bandwidth, Modulation, RFID. [TB1: Ch6]
6.      High-Speed Wireless Data: System Types, Standards-Based and Proprietary Solutions:
Fixed Networks, Nomadic Networks, Mobile Networks, Standards-Based Solutions and
Proprietary Solutions, Overview of the IEEE 802.11 Standard, Overview of the IEEE
802.16 Standard, 10-66 GHz Technical Standards, 2-11 GHz Standards, Overview of
the IEEE 802.20 Standard. [TB1: Ch7]
7.      GSM/Cellular Networks: First-Generation Analog , Second-Generation TDMA ,
Second-Generation CDMA, Third-Generation Systems, 4G and Beyond, LTE. [TB2:
Ch10] ( wc Willian Stallings Ch. 5 and from GSM to LTE book)
8.      Indoor Networks: Behind Closed Doors, How Buildings Are Built (with W. Charles
Perry, P.E.), Microwave Properties of Building Materials, Realistic Metal Obstacles,
Real Indoor Propagation [TB1: Ch9]
9.      Security in Wireless Local Area Networks: Introduction Key Establishment in 802.11,
Anonymity in 802.11, Authentication in 802.11, Confi dentiality in 802.11, Data
Integrity in 802.11, Loopholes in 802.11 Security, WPA, WPA2 (802.11i). [TB1: Ch10]
10. Voice Over Wi-Fi and Other Wireless Technologies: Introduction and Ongoing 802.11
Standard Work, Wi-Fi and Cellular Networks, WiMax, VoWi-Fi and Bluetooth, VoWi-
Fi and DECT, VoWi-Fi and Other Ongoing 802.x Wireless Project. [TB1: Ch11]
11. Mobile Ad Hoc Networks: Mobile Ad Hoc Networks, Physical Layer and MAC,
Routing in Ad Hoc Networks. [TB1: Ch12]
12. Wireless Sensor Networks: Application, Plant Network Layouts, Plant Network
Architecture, Sensor Subnet Selection, Functional Requirements. [TB1: Ch13]
13. Reliable Wireless Networks for Industrial Applications: Benefits of Using Wireless,
Issues in Deploying Wireless Systems, Wireless Formats, Wireless Mesh Networks,

Industrial Applications of Wireless Mesh Networks [TBI: Ch14]
14. Applications and Technologies: Wireless Local Area Networks (WLAN) and PAN:
Bluetooth, Zigbee, Conflict and Compatibility, Ultra-wideband Technology. [TB1:
Ch15]
         Wireless Networking: Know It All by Praphul Chandra, Daniel M. Dobkin, Dan Bensky,
Ron Olexa, David Lide, and Farid Dowla, Newnes (September 28, 2007). ISBN-10:
0750685824 (TB1)
         Wireless Communications & Networks by William Stallings, Prentice Hall; 2nd Edition
(November 22, 2004). ISBN: 0131918354.
          CCNA Wireless Official Exam Certification Guide by Brandon James Carroll, Cisco
Press; 1st Edition (November 2, 2008). ISBN-10: 1587202115
rd
         Wireless Crash Course by Paul Bedell, McGraw-Hill Professional; 3rd Edition
(September 5, 2012). ISBN-10: 0071797890
         Wireless and Mobile Data Networks by Aftab Ahmad, Wiley-Interscience; 1st Edition
(July 20, 2005). ISBN-10: 0471670758


Note: This content is obtained from official documents of University of Sargodha and applied on BS Computer Science for Main Campus, Sub Campuses, and Affiliated Colleges.

Network Design and Management Course outline - University of Sargodha

This course is aimed to prepare students to design and manage various aspects of organizational
network.
Analyzing Business Goals and Constraints.Top-Down Network Design
Methodology.Characterizing the Existing Internetwork.Designing a Network
Topology.Designing Models for Addressing and Numbering.Selecting Switching and Routing
Protocols.Developing Network Security Strategies.Developing Network Management
Strategies.Physical Network Design.Selecting Technologies and Devices for Enterprise
Networks.Testing Network Design.Optimizing Network Design.Documenting Network Design.
Network Management Standards & Models. SNMP Management.
1.      Analyzing Business Goals and Constraints: Using a Top-Down Network Design
Methodology, Analyzing Business Goals, Analyzing Business Constraints. Analyzing
Technical Goals and Tradeoffs: Scalability, Availability, Network Performance, Security,
Manageability, Usability, Adaptability, Affordability, Making Network Design
Tradeoffs. [TB1: Ch. 1, 2]
2.      Characterizing the Existing Internetwork: Characterizing the Network Infrastructure,
Checking the Health of the Existing Internetwork. Characterizing Network Traffic:
Characterizing Traffic Flow, Characterizing Traffic Load, Characterizing Traffic
Behavior, Characterizing Quality of Service Requirements. [TB1: Ch. 3, 4]
3.      Designing a Network Topology: Hierarchical Network Design, Redundant Network
Design Topologies, Modular Network Design, Designing a Campus Network Design
Topology, Virtual LANs, Wireless LANs, Redundancy and Load Sharing in Wired
LANs, Server Redundancy, Workstation-to-Router Redundancy, Designing the
Enterprise Edge Topology, Secure Network Design Topologies. [TB1: Ch. 5]
4.      Designing Models for Addressing and Numbering: Guidelines for Assigning Network
Layer Addresses, Designing a Model for Naming. [TB1: Ch. 6]
5.      Selecting Switching and Routing Protocols: Making Decisions as Part of the Top-Down
Network Design Process, Selecting Switching Protocols, Selecting Routing Protocols, IP
Routing. [TB1: Ch. 7]
6.      Developing Network Security Strategies: Network Security Design, Security
Mechanisms, Modularizing Security Design, [TB1: Ch. 8]
7.      Developing Network Management Strategies: Network Management Design, Network
Management Architectures, Selecting Network Management Tools and Protocols. [TB1:
Ch. 9]
8.      Physical Network Design: Selecting Technologies and Devices for Campus Networks:
LAN Cabling Plant Design, LAN Technologies, Selecting Internetworking Devices for a

Campus Network Design, Example of a Campus Network Design. [TBI: Ch. 10]
9.      Selecting Technologies and Devices for Enterprise Networks: Remote-Access
Technologies, Selecting Remote-Access Devices for an Enterprise, WAN Technologies,
Example of a WAN Design. [TB1: Ch. 11]
10.  Testing Network Design: Using Industry Tests, Building and Testing a Prototype
Network System, Writing and Implementing a Test Plan for Network Design, Tools for
Testing a Network Design. [TB1: Ch. 12]
11.  Optimizing Network Design: Optimizing Bandwidth Usage with IP Multicast
Technologies, Reducing Serialization Delay, Optimizing Network Performance to Meet
Quality of Service Requirements, Cisco IOS Features for Optimizing Network
Performance. Documenting Network Design: Responding to a Customer's Request for
Proposal, Contents of a Network Design Document [TB1: Ch. 13, 14].
rd
          Top-Down Network Design by Priscilla Oppenheimer, Cisco Press; 3 Edition
(September 3, 2010). ISBN-10: 1587202832 (TB1)
Reference Material:
         Networking Systems Design and Development by Lee Chao, CRC Press; 1st Edition
(December 21, 2009). ISBN-10: 142009159X (TB2)
         Networks: Design and Management by Steven Karris, Orchard Publications (August
2002). ISBN-10: 0970951140
         Network Design: Management and Technical Perspectives by Teresa C. Piliouras and
Kornel Terplan, CRC Press (August 19, 1998). ISBN-10: 0849334047
         Network Warrior by Gary A. Donahue, O'Reilly Media; 2nd Edition (May 13, 2011).
ASIN: B004W8ZL3W
          Modeling and Tools for Network Simulation by Klaus Wehrle, Mesut Gunes, and James
Gross, Springer (September 23, 2010). ISBN-10: 3642123309
          The Practice of System and Network Administration by Thomas Limoncelli, Christina
Hogan, and Strata Chalup, Addison-Wesley Professional; 2nd Edition (July 15, 2007).
ISBN-10: 0321492668
         Network Management: Principles and Practice by Mani Subramanian; Timothy A.
Gonsalves and N. Usha Rani, Pearson Education India (2010). ISBN-10: 81-3172-759-9


Note: This content is obtained from official documents of University of Sargodha and applied on BS Computer Science for Main Campus, Sub Campuses, and Affiliated Colleges.

Data & Network Security Course outline - University of Sargodha

Prerequisites: CS-4511(System and Network Administration)
Course Syllabus:
Network Security Overview, Understanding Defenses, Cryptography, Security Policies, Secure
Design, Web Security, Router Security, Firewalls, Intrusion Detection System, Remote Access,
Virtual Private Networks, Public Key Infrastructure, Wireless Security, Logging and Auditing,
Case Studies.
Course Outline:
1.     Network Security Overview: Defining Trust, Weaknesses and Vulnerabilities,
Responsibilities for Network Security, Security Objectives, the Need for Security, Risk
and Vulnerability, TCP/IP Suite Weaknesses, Buffer Overflows, Spoofing Techniques,
Social Engineering. [TB1: Ch. 1,2]
2.      Understanding Defenses: Digital IDs, Intrusion Detection System, PC Card-Based
Solutions, Physical Security, Encrypted Login, Firewalls, Reusable Passwords, Antivirus
Software, Encrypted Files, Biometrics. [TB1: Ch. 3]
3.      Cryptography: Introduction, Cryptography versus Cryptanalysis, Modern-Day
Techniques. [TB1: Ch. 4]
4.      Security Policies: Defining a Security Policy, Importance of a Security Policy,
Development Process, Incident Handling Process, Security Wheel, Sample Security
Policy. [TB1: Ch. 5]



5.      Secure Design: Network Design-Principles, Network Design-Methodology, Return on
Investment, Physical Security Issues, Switches and Hubs. [TB1: Ch. 6]
6.      Web Security: Hardening, Case Study. [TB1: Ch. 7]
7.      Router Security: Basic Router Security, Router Security to Protect the Network, CBAC,
Case Study. [TB1: Ch. 8]
8.      Firewalls: Firewall Basics, Different Types of Firewalls, Enhancements for Firewalls,
Placing Filtering Routers and Firewalls. [TB1: Ch. 9]
9.      Intrusion Detection System: Introduction to Intrusion Detection, Host-Based IDSs,
Network-Based IDSs, IDS Management Communications-Monitoring the Network,
Sensor Maintenance, Case Study: Deployment of IDS Sensors in the Organization and
Their Typical Placement. [TB1: Ch. 10]
10. Remote Access: AAA Model, AAA Servers, Lock-and-Key Feature, Two-Factor
Identification, Case Study: Configuring Secure Remote Access. [TB1: Ch. 11]
11.  Virtual Private Networks: Generic Routing Encapsulation Tunnels, IP Security, VPNs
with IPSec, Case Study: Remote Access VPN. [TB1: Ch. 12]
12. Public Key Infrastructure: Public Key Distribution, Trusted Third Party, PKI Topology,
Enrollment Procedure, Revocation Procedure, Case Study: Creating Your Own CA.
[TB1: Ch. 13]
13. Wireless Security: Different WLAN Configurations, What Is a WLAN? How Wireless
Works, Risks of Open Wireless Ports, War-Driving and War-Chalking, SAFE WLAN
Design Techniques and Considerations, Case Study: Adding Wireless Solutions to a
Secure Network. [TB1: Ch. 14]
14. Logging and Auditing: Logging, SYSLOG, Simple Network Management Protocol,
Remote Monitoring, Service Assurance Agent, Case Study. [TB1: Ch. 15]
         Network Security Fundamentals by Gert DeLaet and Gert Schauwers, Cisco Press; 1st
Edition (September 18, 2004). ISBN-10: 1587051672
         Network Security Bible by Eric Cole, Wiley; 2nd Edition (September 8, 2009). ISBN-10:
0470502495
         Network Security Essentials: Applications and Standards by William Stallings, Prentice
Hall; 4th Edition (March 22, 2010). ISBN-10: 0136108059
         Security in Computing by Charles P. Pfleeger and Shari Lawrence Pfleeger, Prentice
Hall; 4 Edition (2006). ISBN-10: 0132390779
         CISSP All-in-One Exam Guide, 6th Edition by Shon Harris, McGraw-Hill Osborne
Media; 6th Edition (2012). ISBN-10: 0071781749
         Hacking Exposed 7: Network Security Secrets & Solutions, Seventh Edition by Stuart
McClure, Joel Scambray and George Kurtz, McGraw-Hill Osborne Media; 7th Edition
(2012). ISBN-10: 0071780289



Note: This content is obtained from official documents of University of Sargodha and applied on BS Computer Science for Main Campus, Sub Campuses, and Affiliated Colleges.