Monday, April 18, 2016

Data & Network Security Course outline - University of Sargodha

Prerequisites: CS-4511(System and Network Administration)
Course Syllabus:
Network Security Overview, Understanding Defenses, Cryptography, Security Policies, Secure
Design, Web Security, Router Security, Firewalls, Intrusion Detection System, Remote Access,
Virtual Private Networks, Public Key Infrastructure, Wireless Security, Logging and Auditing,
Case Studies.
Course Outline:
1.     Network Security Overview: Defining Trust, Weaknesses and Vulnerabilities,
Responsibilities for Network Security, Security Objectives, the Need for Security, Risk
and Vulnerability, TCP/IP Suite Weaknesses, Buffer Overflows, Spoofing Techniques,
Social Engineering. [TB1: Ch. 1,2]
2.      Understanding Defenses: Digital IDs, Intrusion Detection System, PC Card-Based
Solutions, Physical Security, Encrypted Login, Firewalls, Reusable Passwords, Antivirus
Software, Encrypted Files, Biometrics. [TB1: Ch. 3]
3.      Cryptography: Introduction, Cryptography versus Cryptanalysis, Modern-Day
Techniques. [TB1: Ch. 4]
4.      Security Policies: Defining a Security Policy, Importance of a Security Policy,
Development Process, Incident Handling Process, Security Wheel, Sample Security
Policy. [TB1: Ch. 5]



5.      Secure Design: Network Design-Principles, Network Design-Methodology, Return on
Investment, Physical Security Issues, Switches and Hubs. [TB1: Ch. 6]
6.      Web Security: Hardening, Case Study. [TB1: Ch. 7]
7.      Router Security: Basic Router Security, Router Security to Protect the Network, CBAC,
Case Study. [TB1: Ch. 8]
8.      Firewalls: Firewall Basics, Different Types of Firewalls, Enhancements for Firewalls,
Placing Filtering Routers and Firewalls. [TB1: Ch. 9]
9.      Intrusion Detection System: Introduction to Intrusion Detection, Host-Based IDSs,
Network-Based IDSs, IDS Management Communications-Monitoring the Network,
Sensor Maintenance, Case Study: Deployment of IDS Sensors in the Organization and
Their Typical Placement. [TB1: Ch. 10]
10. Remote Access: AAA Model, AAA Servers, Lock-and-Key Feature, Two-Factor
Identification, Case Study: Configuring Secure Remote Access. [TB1: Ch. 11]
11.  Virtual Private Networks: Generic Routing Encapsulation Tunnels, IP Security, VPNs
with IPSec, Case Study: Remote Access VPN. [TB1: Ch. 12]
12. Public Key Infrastructure: Public Key Distribution, Trusted Third Party, PKI Topology,
Enrollment Procedure, Revocation Procedure, Case Study: Creating Your Own CA.
[TB1: Ch. 13]
13. Wireless Security: Different WLAN Configurations, What Is a WLAN? How Wireless
Works, Risks of Open Wireless Ports, War-Driving and War-Chalking, SAFE WLAN
Design Techniques and Considerations, Case Study: Adding Wireless Solutions to a
Secure Network. [TB1: Ch. 14]
14. Logging and Auditing: Logging, SYSLOG, Simple Network Management Protocol,
Remote Monitoring, Service Assurance Agent, Case Study. [TB1: Ch. 15]
         Network Security Fundamentals by Gert DeLaet and Gert Schauwers, Cisco Press; 1st
Edition (September 18, 2004). ISBN-10: 1587051672
         Network Security Bible by Eric Cole, Wiley; 2nd Edition (September 8, 2009). ISBN-10:
0470502495
         Network Security Essentials: Applications and Standards by William Stallings, Prentice
Hall; 4th Edition (March 22, 2010). ISBN-10: 0136108059
         Security in Computing by Charles P. Pfleeger and Shari Lawrence Pfleeger, Prentice
Hall; 4 Edition (2006). ISBN-10: 0132390779
         CISSP All-in-One Exam Guide, 6th Edition by Shon Harris, McGraw-Hill Osborne
Media; 6th Edition (2012). ISBN-10: 0071781749
         Hacking Exposed 7: Network Security Secrets & Solutions, Seventh Edition by Stuart
McClure, Joel Scambray and George Kurtz, McGraw-Hill Osborne Media; 7th Edition
(2012). ISBN-10: 0071780289



Note: This content is obtained from official documents of University of Sargodha and applied on BS Computer Science for Main Campus, Sub Campuses, and Affiliated Colleges.

0 comments:

Post a Comment