Prerequisite
Basic network troubleshooting, OSI layers, Basic usage of Linux utility
Objectives
- To configure virtual networks using network simulator
- To install and exploit security tools for protecting a network
- To implement cryptographic algorithm for building a secure communication network
- To exploit the vulnerabilities in a LAN environment and launch attacks
- To analyze the network packet using Wireshark
- To perform the web penetration testing using Burp suite
- To perform vulnerability assessment of wireless devices
- To exploit vulnerabilities in the systems with Metasploit
- To perform the log analysis Wazuh, Splunk
- Incident Monitoring using Security Onion
The experiments make use of Linux and other open source security tools.
Course Outcome
Course Outcome |
Bloom’s Taxonomy Level |
|
CO 1 |
Implementation of various network exploits and its mitigation techniques using simulators and real devices |
L2 |
CO 2 |
To exploit vulnerabilities in LAN, wireless devices and identify the same using penetration testing |
L4 |
CO 3 |
Exploring the reverse engineering techniques for proper classification of Benign and malicious Desktop applications |
L4 |
CO 4 |
Implementation of Intrusion detection system by applying machine learning algorithms. |
L5 |
CO-PO Mapping
CO-PO Mapping |
||||||||||||||
CO/PO |
PO 1 |
PO 2 |
PO 3 |
PO 4 |
PO 5 |
PO 6 |
PO 7 |
PO 8 |
PO 9 |
PO 10 |
PSO1 |
PSO2 |
PSO3 |
|
CO 1 |
2 |
3 |
3 |
3 |
3 |
2 |
– |
1 |
– |
– |
3 |
3 |
3 |
|
CO 2 |
2 |
3 |
3 |
3 |
3 |
2 |
– |
1 |
– |
– |
3 |
3 |
3 |
|
CO 3 |
2 |
3 |
3 |
3 |
3 |
2 |
– |
1 |
– |
– |
3 |
3 |
3 |
|
CO 4 |
2 |
3 |
3 |
3 |
3 |
2 |
– |
1 |
– |
– |
3 |
3 |
3 |