Indian Institute of Information Technology, Allahabad

Department of Information Technology

Course Syllabus

1. Name of the Course:  Network Security

2. LTP structure of the course:  2-1-1

3. Objective of the course:  This  course  provides  an  essential  study  of  network  security  issues  and  methods  in  networking systems.

4. Outcome of the course: Students can get knowledge about the network security, implementation and requirements after the successful completion of the course

5. Course Plan:

Component

Unit

Topics for Coverage  

Component 1

Unit 1

Introduction to Network security, Model for Network security, Model for Network access security, Real-time Communication Security: Introduction to TCP/IP protocol stack, Implementation layers for security protocols and implications, IPsec: AH and ESP, IPsec: IKE.

Unit 2

Media- Based-Vulnerabilities, Network Device Vulnerabilities, Back Doors, Denial of Service (DoS), Spoofing, Man-in-the-Middle, and replay, Protocol -Based Attacks, DNS Attack, DNS Spoofing, DNS Poisoning, ARP Poisoning, TCP/IP Hijacking, Virtual LAN (VLAN), Demilitarization Zone (DMZ) , Network Access Control (NAC), Proxy Server , Honey Pot , Network Intrusion Detection Systems (NIDS) and Host Network Intrusion Prevention Systems Protocol Analyzers, Internet Content Filters, Integrated Network Security Hardware .

Component 2

Unit 3

Authentication: Kerberos, X.509 Authentication Service, Scanning: Port Scanning, Port Knocking- Advantages, Disadvantages. Peer to Peer security. Electronic Mail Security: Distribution lists, Establishing keys, Privacy, source authentication, message integrity, non-repudiation, proof of submission, proof of delivery, message flow confidentiality, anonymity, Pretty Good Privacy (PGP)

Unit 4

Firewalls and Web Security: Packet filters, Application level gateways, Encrypted tunnels, Cookies. Assignments on latest network security techniques, Security applications in

wireless sensor network and wireless Communication networks

6. Text Book:  

William Stallings, “Cryptography and Network Security – Principles and Practices”, Prentice Hall of India, Third Edition, 2003.

7. References: