Indian Institute of Information Technology, Allahabad
Department of Information Technology
Course Syllabus
1. Name of the Course: Network Security
2. LTP structure of the course: 2-1-1
3. Objective of the course: This course provides an essential study of network security issues and methods in networking systems.
4. Outcome of the course: Students can get knowledge about the network security, implementation and requirements after the successful completion of the course
5. Course Plan:
Component | Unit | Topics for Coverage |
Component 1 | Unit 1 | Introduction to Network security, Model for Network security, Model for Network access security, Real-time Communication Security: Introduction to TCP/IP protocol stack, Implementation layers for security protocols and implications, IPsec: AH and ESP, IPsec: IKE. |
Unit 2 | Media- Based-Vulnerabilities, Network Device Vulnerabilities, Back Doors, Denial of Service (DoS), Spoofing, Man-in-the-Middle, and replay, Protocol -Based Attacks, DNS Attack, DNS Spoofing, DNS Poisoning, ARP Poisoning, TCP/IP Hijacking, Virtual LAN (VLAN), Demilitarization Zone (DMZ) , Network Access Control (NAC), Proxy Server , Honey Pot , Network Intrusion Detection Systems (NIDS) and Host Network Intrusion Prevention Systems Protocol Analyzers, Internet Content Filters, Integrated Network Security Hardware . | |
Component 2 | Unit 3 | Authentication: Kerberos, X.509 Authentication Service, Scanning: Port Scanning, Port Knocking- Advantages, Disadvantages. Peer to Peer security. Electronic Mail Security: Distribution lists, Establishing keys, Privacy, source authentication, message integrity, non-repudiation, proof of submission, proof of delivery, message flow confidentiality, anonymity, Pretty Good Privacy (PGP) |
Unit 4 | Firewalls and Web Security: Packet filters, Application level gateways, Encrypted tunnels, Cookies. Assignments on latest network security techniques, Security applications in wireless sensor network and wireless Communication networks |
6. Text Book:
William Stallings, “Cryptography and Network Security – Principles and Practices”, Prentice Hall of India, Third Edition, 2003.
7. References: