Back close

Course Detail

Course Name Network Security
Course Code 24CY602
Program M. Tech. in Cyber Security
Semester 1
Credits 3
Campus Coimbatore

Syllabus

Syllabus

Techniques for Network Protection: Firewalls, packet filter and stateful firewalls, application aware firewalls, personal firewalls, Proxies, NAT, Intrusion Detection System-Snort, Signature and Anomaly based detection- Evasion and poisoning attacks, Honeypots and Honeynets, Network Log management- syslog or SPLUNK; RBAC, Network reconnaissance-Nmap and vulnerability audits-openVAS; DNS-Dig tool: DNS based attacks, Phishing, DNSSEC-DS and NSEC records; Network based malware attacks: Remote access Trojan-Poison Ivy and Domain name generation algorithm based Botnets; LAN attacks: ARP Cache poisoning, MAC flooding, Man in the middle attacks, Port Stealing, DHCP attacks, VLAN hopping, Password Cracking-John the Ripper ; Secure Network Communication: SCP, SSH, SSL3.0, TLS 1.2, STARTTLS, IPSec, VPN and Secure HTTP; Understanding the dark web, TOR traffic, Attacks on SSL/TLS: SSL stripping, Drown and Poodle attack; Encrypting and Signing Emails: PGP- GPG/openPGP, DKIM and SPF; Single Sign On (SSO)-OAUTH and OPENID; Network packet creation and Manipulation using scapy and dpkt libraries; SDN Security

Objectives and Outcomes

Prerequisites

Basic knowledge about computer networks and troubleshooting of network systems.

 

Course Outcome
Course Outcome Bloom’s Taxonomy Level
CO1 Understand various techniques for Network Protection and explore new tools and attacks in network security domain L2
CO2 Exploring DNS based attacks and DNSSEC L3
CO3 Familiarize the LAN based attacks and its mitigations L4
CO4 Exploring Secure Network Communication protocols and attacks L5
CO  Exploring the protocols used for SSO and challenges, attacks related to Email communication L4 
CO-PO Mapping

CO-PO Mapping

CO/PO

PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PSO1 PSO2 PSO3
CO 1 2 2 2 3 3 1 2 2 2 2
CO 2 2 2 2 3 3 1 2 3 3 3
CO 3 2 2 3 3 3 1 2 3 3 3
CO 4 2 2 3 3 3 1 2 3 3 3
CO 5 2 2 3 3 3 1 2 3 3 3

Text Books / References

  1. William Stallings, Cryptography and Network Security: Principles and Practice , 7th Edition, Pearson edition, 2016
  2. Vincent J. Nestler et. al, Principles of computer security Lab Manual , 4th Edition, McGraw-Hill, 2014
  3. Behrouz A. Forouzan, Cryptography & Network Security , McGraw-Hill, 2007
  4. C. Kaufman, R. Perlman and M. Speciner, Network Security: Private Communication in a Public World , 2nd Edition, Prentice Hall PTR, 2002.

DISCLAIMER: The appearance of external links on this web site does not constitute endorsement by the School of Biotechnology/Amrita Vishwa Vidyapeetham or the information, products or services contained therein. For other than authorized activities, the Amrita Vishwa Vidyapeetham does not exercise any editorial control over the information you may find at these locations. These links are provided consistent with the stated purpose of this web site.

Admissions Apply Now