Syllabus
Unit 1
Overview of network security principles, concepts, and terminology. Threats to network security, including attacks on confidentiality, integrity, and availability. Network security goals and objectives. IP tables,NAT.Intrusion detection systems ,Types.Honeypots.
Unit 2
Network protocols and standards, SSL,TLS,IPsec,HTTPS. Wireless network architecture and protocols, Security risks and threats in wireless networks, Wireless security standards, including WPA and WPA2. Mobile security architecture, Mobile device security risks and threats, Mobile security standards, including iOS and Android.
Unit 3
Common network attacks. Wireshark ,packet sniffing.LAN attacks, ARP cache spoofing, ettercap.Analysing network vulnerability using NMAP.Use of metasploit and metasploitable to perform common attacks over the network.Usage of aircrack-ng suite. Legal issues in network security, cyber crime and cyber law. Ethical issues in network security, privacy and intellectual property rights.
Objectives and Outcomes
Course Objectives
- To understand the various techniques for network protection.
- To gain knowledge on security and privacy issues on various networks.
- To study the use of modern tools and techniques used in analysing various security parameters of the network.
Course Outcomes
After completing this course, students will be able to
CO1
|
Analyse the network security protocols and standards.
|
CO2
|
Evaluate the various network security threats.
|
CO3
|
Apply modern tools to simulate network attacks.
|
CO4
|
Interpret the ethical aspects of network security.
|
CO-PO Mapping
PO/PSO
|
PO1
|
PO2
|
PO3
|
PO4
|
PO5
|
PO6
|
PO7
|
PO8
|
PO9
|
PO10
|
PO11
|
PO12
|
PSO1
|
PSO2
|
PSO3
|
CO
|
CO1
|
3
|
3
|
2
|
2
|
3
|
–
|
–
|
–
|
2
|
2
|
–
|
3
|
1
|
2
|
1
|
CO2
|
3
|
3
|
3
|
3
|
3
|
–
|
–
|
–
|
2
|
2
|
–
|
3
|
2
|
2
|
1
|
CO3
|
3
|
2
|
3
|
3
|
3
|
–
|
–
|
–
|
2
|
2
|
–
|
3
|
2
|
2
|
1
|
CO4
|
3
|
2
|
3
|
3
|
3
|
–
|
–
|
–
|
2
|
2
|
–
|
3
|
1
|
2
|
1
|
Text Books / References
Text Books / References
William Stallings, Cryptography and Network Security: Principles and Practice,8thEdition, Pearson edition, 2020.
Behrouz A. Forouzan, Cryptography & Network Security, McGraw-Hill, 3rd Edition 2015.
Jeremy Faircloth, Penetration Tester’s Open Source Toolkit,4th Edition,2016.