Applied Science University

brickborderSecurity

Nov 3, 2013 (3 years and 10 months ago)

78 views


1
?









CourseTitle

Credit Hours

Course No.

Prerequisite

Year (semester)

Lec./Lab. Credit

Network
Security

3

1304310

130
1326

2010
-
2011(
2
)

Lecture: 3

Lab : 0


Coordinator Name

Lecturer

Room No
.

E
-
mail

Office Hours

Dr. Shadi Masadeh

Dr. Shadi Masadeh


Sh_almasadeh@asu.edu.jo

Mon, Wend : 9:30
-
11:00

Course
Objectives:

This course is an introductory class in network security and security applications. Both the theory behind
security methods and t
heir applications in today's business environments will be present
ed
.


Course
Description:

Introduction to
network security; network security requirements, security policy;
cryptography and its
application
s

to network security;
network
security threats; ap
plications of cryptography; secret key
and public key cryptographic algorithms; hash functions; authentication; security for electronic mail;
Firewalls and intrusion detection techniques
; building secure channels; hardining netwrok systems
and potential th
reats to network systems
.


Intended Learning Outcomes :

Successful completion of this

course

should lead to the following learning outcomes :

A
-

Knowledge and Und
erstanding :

A1)
List
the basic
s

of network security

requirements and services
.

A2)
List
the
concept of
security policy
.

A3)
List
the concept of
encryption/decryptions and it is applications
.

A4)
List
the concep
t of
Public Key Infrastructures PKI
.

A5) List the concepts
Authentication, Authorization
,
Access Rights and Privileges,
Integrity,
Non
-
Rep
udiation
and Confidentiality
.

A6) List the concepts
Security Prevention, Detection and Recovery.

B
-

Intellectual

Skills:

B1) Distinguish between
symmetric and asymmetric
cryptosystems
.

B2) Analyze and compare the different
network security
Techniques.

B3)
Analyze and compare
secure and non
-
secure channels.

B4) Analyze and compare
firewalls prevention techniques
.

B5)
Analyze
and compare
different hiding techniques.

B6)
Analyze different hacking techniques.

C)

Subject Specific
S
kills
:

C1)
Implement solutions
of firewall systems
.

C2) Implement solutions of
Intrusion detection systems
.

C
3
)
Implement solution of Secure channels VPN
.

C4)
Learn
how
harden network systems
.

D)
Transferable
S
kills:

D1)

Home works and quizzes
.

D2)

Practical Labs
.

D
3
)

Case study
.






Applied Science University

Faculty:

Information Technology


Department :


Computer Networks Systems


( Course Syl l abus )




2
?
Course Contents :


Week

Topics

Topic D
etails

Reference
(chapter)

Assess
-
ment

1

Introduction to
Cryptography
and Secuiryt
Threates

Introduction
to security

Secure Networking Threats



The attack process



Attacker types



Vulnerability Types

[
1
]
Chp.
2,

[
2
]Chp.
1

and

[3]C
h
p.1



2

Classical

Cryptography

Classical encryption techniques



Symmetric cipher



Subsitution cipher



Transpo
sition cipher

[
2
]Chp.
2

Report 1

3

Symmetric

Cryptography

Symmetric Cipher



Data Encryption Standard DES



DES Example

[
2
]Chp.
3

ASS.1

4

Asym
metric
Cryptography

A
Symmetric Cipher



Public key principles



RSA algorithm



RSA Example

[2]Ch9

First

EXAM

5

Message
Authentication
s

and Hash
functions



Authentication functions



MAC functions



Hash functions

[
2
]Chp.
11


6
+7

Firewalls

FW
types and
basics



Pack
et filtering FWs



Statfull FWs



Proxy FWs



Writing FW rules



FW examples

[1]Chp2
and

[2]Chp20

ASS.
2

8


Case Study



9

Entity
Authentication
and
Applications



Passwords



Challenge response



Zero
-
Knowledge



RADIUS

[3]Chp14

ASS.
3

10+11

Virtual Private
Networks
V
PNs

VPN Design Considerations



VPN basics



Physical Security issues



Layer 2 Security Considerations



IP Addressing Design considerations

[1]Chp.6

And
[3]Chp12

ASS.
4

12

IPSec

IPSec

VPN Design considerations



Types of IPSec



IPSec modes of operations

[1]Chp.9
a
nd

[2]chp16

Second
EXAm

13

Ma
l
icious
Software

Maicious Software



Maicious Software Types and classifications



Viruses and related threats



Viruses countermeasures

[2]ch19


14

WEB Security


Overview



SSL



TLS



SMIME

[2]Chp.17

ASS.
5

15


Project Presentation



1
6


Final Exam


FINAL
EXAM




3
?
Course quality improvement :



From the
market and
new subjects in the field.




From the monitoring of students feedback (Evaluation sheet).


Grade Distribution

:



Assessment

Grade

Date

-

First Exam

20
%


-

Second Exam

20
%


-

Assignments ( Reports /Quizzes/ Seminar / Tutorials ….
)

20%


-

Final Examination

4
0%


*
Make
-
up exams will be offered for valid reasons. It may be different from regular exams in content and format.


Reading List:


Text Book

[1]

Network Security Architectures
, Convery, Prentice Hall/Cisco

Press, 2004.


ISBN: 1
-
58705
-
115
-
X


[2
]
Cryptography and Network Security

principles and practicies
,
William Stallings,

Prentice Ha
ll
, 200
3
. ISBN:
0
-
13
-
111502
-
2

[3] Introduction to Cryptogra
phy and
Network Security,
Behrouz A. Forouzan.
McGraw
-
Hill International Edition 2008.
. ISBN:
978
-
0
-
07
-
110223
-
0

Other

References

[
1
]
Inside

Network Perimeter Security, 2nd edition
, Northcutt,

Zeltser, Winters,
Frederick & Ritchey, SAMS/Prentice Ha
ll
, 2005
. ISBN: 0672327376

[
2
]

Network Security Principles and Practices,
Malik, Cisco Press/Prentice Hall,
ISBN: 1
-
58705
-
025
-
0

[
3
]
Network Intrusion Detection
, 3rd edition, Northcutt & Novak, Prentice
Hall/SAMS
-

ISBN: 0735712654

Last updated on
16
-
0
2
-
201
1

by :

Dr.Shadi Masadeh