Prerequisites:
CS-4511(System and Network Administration)
Course
Syllabus:
Network
Security Overview, Understanding Defenses, Cryptography, Security Policies,
Secure
Design, Web Security, Router Security, Firewalls, Intrusion Detection System, Remote Access,
Virtual Private Networks, Public Key Infrastructure, Wireless Security, Logging and Auditing,
Case Studies.
Design, Web Security, Router Security, Firewalls, Intrusion Detection System, Remote Access,
Virtual Private Networks, Public Key Infrastructure, Wireless Security, Logging and Auditing,
Case Studies.
Course
Outline:
1.
Network
Security Overview: Defining Trust, Weaknesses and Vulnerabilities,
Responsibilities for Network Security, Security Objectives, the Need for Security, Risk
and Vulnerability, TCP/IP Suite Weaknesses, Buffer Overflows, Spoofing Techniques,
Social Engineering. [TB1: Ch. 1,2]
Responsibilities for Network Security, Security Objectives, the Need for Security, Risk
and Vulnerability, TCP/IP Suite Weaknesses, Buffer Overflows, Spoofing Techniques,
Social Engineering. [TB1: Ch. 1,2]
2.
Understanding
Defenses: Digital IDs, Intrusion Detection System, PC Card-Based
Solutions, Physical Security, Encrypted Login, Firewalls, Reusable Passwords, Antivirus
Software, Encrypted Files, Biometrics. [TB1: Ch. 3]
Solutions, Physical Security, Encrypted Login, Firewalls, Reusable Passwords, Antivirus
Software, Encrypted Files, Biometrics. [TB1: Ch. 3]
3.
Cryptography:
Introduction, Cryptography versus Cryptanalysis, Modern-Day
Techniques. [TB1: Ch. 4]
Techniques. [TB1: Ch. 4]
4.
Security
Policies: Defining a Security Policy, Importance of a Security Policy,
Development Process, Incident Handling Process, Security Wheel, Sample Security
Policy. [TB1: Ch. 5]
Development Process, Incident Handling Process, Security Wheel, Sample Security
Policy. [TB1: Ch. 5]
|
5.
Secure Design:
Network Design-Principles, Network Design-Methodology, Return on
Investment, Physical Security Issues, Switches and Hubs. [TB1: Ch. 6]
Investment, Physical Security Issues, Switches and Hubs. [TB1: Ch. 6]
6.
Web Security:
Hardening, Case Study. [TB1: Ch. 7]
7.
Router
Security: Basic Router Security, Router Security to Protect the Network, CBAC,
Case Study. [TB1: Ch. 8]
Case Study. [TB1: Ch. 8]
8.
Firewalls:
Firewall Basics, Different Types of Firewalls, Enhancements for Firewalls,
Placing Filtering Routers and Firewalls. [TB1: Ch. 9]
Placing Filtering Routers and Firewalls. [TB1: Ch. 9]
9.
Intrusion
Detection System: Introduction to Intrusion Detection, Host-Based IDSs,
Network-Based IDSs, IDS Management Communications-Monitoring the Network,
Sensor Maintenance, Case Study: Deployment of IDS Sensors in the Organization and
Their Typical Placement. [TB1: Ch. 10]
Network-Based IDSs, IDS Management Communications-Monitoring the Network,
Sensor Maintenance, Case Study: Deployment of IDS Sensors in the Organization and
Their Typical Placement. [TB1: Ch. 10]
10.
Remote Access:
AAA Model, AAA Servers, Lock-and-Key Feature, Two-Factor
Identification, Case Study: Configuring Secure Remote Access. [TB1: Ch. 11]
Identification, Case Study: Configuring Secure Remote Access. [TB1: Ch. 11]
11.
Virtual
Private Networks: Generic Routing Encapsulation Tunnels, IP Security, VPNs
with IPSec, Case Study: Remote Access VPN. [TB1: Ch. 12]
with IPSec, Case Study: Remote Access VPN. [TB1: Ch. 12]
12.
Public Key
Infrastructure: Public Key Distribution, Trusted Third Party, PKI Topology,
Enrollment Procedure, Revocation Procedure, Case Study: Creating Your Own CA.
[TB1: Ch. 13]
Enrollment Procedure, Revocation Procedure, Case Study: Creating Your Own CA.
[TB1: Ch. 13]
13.
Wireless
Security: Different WLAN Configurations, What Is a WLAN? How Wireless
Works, Risks of Open Wireless Ports, War-Driving and War-Chalking, SAFE WLAN
Design Techniques and Considerations, Case Study: Adding Wireless Solutions to a
Secure Network. [TB1: Ch. 14]
Works, Risks of Open Wireless Ports, War-Driving and War-Chalking, SAFE WLAN
Design Techniques and Considerations, Case Study: Adding Wireless Solutions to a
Secure Network. [TB1: Ch. 14]
14.
Logging and
Auditing: Logging, SYSLOG, Simple Network Management Protocol,
Remote Monitoring, Service Assurance Agent, Case Study. [TB1: Ch. 15]
Remote Monitoring, Service Assurance Agent, Case Study. [TB1: Ch. 15]
•
Network
Security Fundamentals by Gert DeLaet and Gert Schauwers, Cisco Press; 1st
Edition (September 18, 2004). ISBN-10: 1587051672
Edition (September 18, 2004). ISBN-10: 1587051672
•
Network
Security Bible by Eric Cole, Wiley; 2nd Edition (September 8, 2009).
ISBN-10:
0470502495
0470502495
•
Network
Security Essentials: Applications and Standards by William Stallings, Prentice
Hall; 4th Edition (March 22, 2010). ISBN-10: 0136108059
Hall; 4th Edition (March 22, 2010). ISBN-10: 0136108059
•
Security in
Computing by Charles P. Pfleeger and Shari Lawrence Pfleeger, Prentice
Hall; 4 Edition (2006). ISBN-10: 0132390779
Hall; 4 Edition (2006). ISBN-10: 0132390779
•
CISSP
All-in-One Exam Guide, 6th Edition by Shon Harris, McGraw-Hill
Osborne
Media; 6th Edition (2012). ISBN-10: 0071781749
Media; 6th Edition (2012). ISBN-10: 0071781749
•
Hacking
Exposed 7: Network Security Secrets & Solutions, Seventh Edition by Stuart
McClure, Joel Scambray and George Kurtz, McGraw-Hill Osborne Media; 7th Edition
(2012). ISBN-10: 0071780289
McClure, Joel Scambray and George Kurtz, McGraw-Hill Osborne Media; 7th Edition
(2012). ISBN-10: 0071780289
Note: This
content is obtained from official documents of University of Sargodha and
applied on BS Computer Science for Main Campus, Sub
Campuses, and Affiliated Colleges.
0 comments:
Post a Comment