NE4251 Network Security Syllabus:
NE4251 Network Security Syllabus – Anna University PG Syllabus Regulation 2021
COURSE OBJECTIVES:
To learn the fundamentals of cryptography and its application to network security.
To understand the mathematics behind cryptography.
To learn about the security issues in internet protocol.
To understand the security issues in other layers
To study about intrusion detection and prevention system and wireless hacking.
UNIT I INTRODUCTION TO NETWORK SECURITY
Security Services and Mechanisms – Vulnerabilities in wireless communications –security basics – Attack and its types Security essentials on layers – Electronic signatures – PKI and electronic certificate
UNIT II SYMMETRIC AND ASYMMETRIC CIPHERS
Classical Techniques – Substitution Ciphers – Transposition Ciphers. Modern symmetric ciphers : Stream cipher – RC4, Block cipher – DES – AES – Uses of Modes of operation. Modern Asymmetric block ciphers – RSA, ElGamal., MAC – Cryptographic Hash Functions- Key management system- Key Distribution & Key Agreements.
UNIT III SECURITY ISSUES IN INTERNET PROTOCOL
Reconnaissance-Wireshark- TCPDump – Netdiscover – Shodan ,NESSUS,Hping3 NSE Scripts: Introduction – How to write and read NSE script – TCP session Hijacking – UDP session Hijacking -HTTP Session – Hijacking – Spoofing basics – IP, DNS and ARP Spoofing
UNIT IV SECURITY IN OTHER LAYERS
EMail Security and its services – PGP – S/MIME – DNS Security – VPN Concept and its configuration – AAA Concept, RADIUS, TACACS+ technologies, SSL architecture and protocol.
UNIT V INTRUSION DETECTION AND PREVENTION SYSTEM(IDPS) AND WIRELESS HACKING
IDPS introduction – Uses of IDPS Technologies – Key functions of IDPS Technologies , Signature Based Detection , Anomaly Based Detection – Wireless networks – WPA Handshaking – Wireless hacking tools.
COURSE OUTCOMES:
CO1: To design cryptographic algorithms and carry out their implementation.
CO2: To carry out cryptanalysis on cipher.
CO3: To be able to design and implement security based internet protocols.
CO4: To carry out system security for other layers.
CO5: To understand the importance of intrusion detection and prevention system and wireless hacking.
TOTAL: 45 PERIODS
REFERENCES
1. Behrouz A. Ferouzan, Debdeep Mukhopadhyay ―Cryptography & Network Security, 3rd edition, Tata McGraw Hill, 2015.
2. William Stallings “Network Security Essentials Applications and Standards”, Pearson Education., 5th Edition, 2014.
3. Ryan Russell, ” Hack Proofing your network “, Wiley,2nd Edition,2002.
4. David M. Durton, “Elementary Number Theory”, Tata Mcgraw Hill, Sixth Edition, 2009.
5. Jonathan Katz, Yehuda Lindell, “Introduction to Modern Cryptography: Principles and Protocols (Chapman & Hall/CRC Cryptography and Network Security Series)”, 1st Edition , CRC Press Taylor and Francis Group, 2008.
6. Douglas R. Stinson,” Cryptography: Theory and Practice, Third Edition (Discrete Mathematics and Its Applications), Chapman & Hall/CRC, 2005.