0% found this document useful (0 votes)
130 views

IT-312-course Outline

The document describes a course on network security offered at the University of Gujrat. The 3 credit, core course aims to help students gain insights into cryptography, network and web security. It will help them understand security weaknesses and implementation of security measures. The course learning outcomes include understanding different attacks, services, mechanisms and cryptography methods. The textbook is Network Security Essentials and the course involves assignments, quizzes, projects and lab work over 16 weeks covering topics such as encryption techniques, public key cryptography, firewalls, and a final presentation.

Uploaded by

Waleed Hussain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
130 views

IT-312-course Outline

The document describes a course on network security offered at the University of Gujrat. The 3 credit, core course aims to help students gain insights into cryptography, network and web security. It will help them understand security weaknesses and implementation of security measures. The course learning outcomes include understanding different attacks, services, mechanisms and cryptography methods. The textbook is Network Security Essentials and the course involves assignments, quizzes, projects and lab work over 16 weeks covering topics such as encryption techniques, public key cryptography, firewalls, and a final presentation.

Uploaded by

Waleed Hussain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

UNIVERSITY OF GUJRAT

A WORLD CLASS UNIVERSITY

Department of Information Technology


COURSE DESCRIPTION
Course Code IT-312
Course Title Network Security
Credit Hours 3
Category Core Course
Prerequisite Data Communication and Computer Networks
Amis and  Gain insight into the field of cryptography, network and web security.
Objectives  Understand design principles for the planning of secure networks.
 Understand security weaknesses and implementation of security measures in E-mail, IP addressing, web and
networks in general.
 Understand Public Key systems and protocols and their implementations in various networks.
Learning  The students will have a clear view of network security and its applications.
Outcomes  The students will be able to understand different attacks, services and mechanisms.
 The students will be aware cryptography and different methods for encryption.
 The students will have the fundamental knowledge of authentication applications.
 The students will be able to email security, web security and IP security.
The students will be able to distinguish between network security and system security
Text Book Network Security Essentials: Application and Standards, Prentice Hall, 4 th Edition
Reference 1. Corporate Computer and Network Security by Raymond Panko United States Edition, Prentice Hall, 2004
Materials 2. Corporate Computer and Network Security by Raymond Panko United States Edition, Prentice Hall, 2003
3. Cryptography and Network Security: Principles and Practice Third Edition, Prentice Hall, 2002
4. Security in Computing by Charles P. Pfleeger and Shari Lawrence Pfleeger, Prentice Hall; 4th Edition (2006). ISBN-
10: 0132390779
5. Network Security Fundamentals by Gert DeLaet and Gert Schauwers, Cisco Press; 1st Edition (September 18,
2004). ISBN-10: 1587051672
6. Network Security Bible by Eric Cole, Wiley; 2nd Edition (September 8,2009). ISBN-10: 0470502495
Assessment
1
Criteria
Recommendations for
Learning Activities
Source (Mention Assignments,
Week Lecture Topic (Book-Chapter Test, Quizzes,
No. Section No.) Practical, Case Study,
Projects, Lab Work
or Reading Assignments)
1 1  Introduction to Network Security, Information security, network S-Chapter # 1
security. Computer security, Security Trends, OSI Security Architecture,
Security Attacks, Security Services, Security Mechanisms, A model for
Network Security
2  Symmetric encryption principles, Shift cipher, Rot-13 cipher, Ceasar S-Chapter # 2
cipher
2 3  Cryptography, Cryptanalysis techniques, Assignment # 1
4  Security Threats in Ad-hoc Social Networks, Term Projects
3 5  Polyalphabetic ciphers, brute force search
6  Fiestel cipher structure, Data Encryption Standard S-Chapter # 2
4 7  DES S-Chapter # 2
8  DES S-Chapter # 2
5 9  Cipher Block Modes of Operations S-Chapter # 2 Quiz # 1
10  CBM S-Chapter # 2 Assignment # 2
6 11  Secret key cryptography, key distribution scenario and issues, PRNGs S-Chapter # 3
12  Public key cryptography S-Chapter # 3
7 13  Diffie-hellman key agreement, exchange and its security, public key S-Chapter # 3
applications
14  Quiz # 2
8 15  Mid Term Week
16  Mid Term Week
9 17  RSA, Digital signature S-Chapter # 4
18 RSA security S-Chapter # 4
10 19  Secret sharing, Threshold based SS S-Chapter # 4

2
20  Blakley’s scheme, Entity authentication S-Chapter # 7 Quiz # 3
Assignment # 3
11 21  S-MIME S-Chapter # 7
22  IP Security Overview, IP Security Policy S-Chapter # 8
12 23  Web Security, Threats and approaches, SSL S-Chapter # 5
24  Legal and ethical aspects S-Chapter # 13
13 25  System Security, Intruders, Intrusion Detection, Audit Records, S-Chapter # 9
Statistical Anomaly detection
26  Rule based intrusion detection, Distributed intrusion detection, S-Chapter # 9
honeypots,
14 27  Password management, protection, Strategies to choose password S-Chapter # 9 Quiz # 4
Assignment # 4
28  Malicious Software’s S-Chapter # 10
15 29  The Need for Firewalls S-Chapter # 11
 Firewall Characteristics
 Types of Firewalls
30  Firewall Basing S-Chapter # 11
 Firewall Location and Configurations
16 31  Presentations
32  Final Term

You might also like