0% found this document useful (0 votes)
66 views

CSC342 - Network Security

This document outlines the course objectives, policies, and schedule for the CSC342 - Network Security course. The 3 credit, theory-based course introduces students to network security issues and practical solutions, covering topics such as authentication methods, communication security, cryptography basics, and security implementation over 17 weeks. Students will be evaluated through assignments, quizzes, a midterm exam, and a final exam, with grades calculated as 40% internal assignments and tests, 20% midterm exam, and 60% final exam. The course textbook is Cryptography and Network Security by William Stallings.

Uploaded by

Dilawar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views

CSC342 - Network Security

This document outlines the course objectives, policies, and schedule for the CSC342 - Network Security course. The 3 credit, theory-based course introduces students to network security issues and practical solutions, covering topics such as authentication methods, communication security, cryptography basics, and security implementation over 17 weeks. Students will be evaluated through assignments, quizzes, a midterm exam, and a final exam, with grades calculated as 40% internal assignments and tests, 20% midterm exam, and 60% final exam. The course textbook is Cryptography and Network Security by William Stallings.

Uploaded by

Dilawar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

P a g e |1

COURSE TITLE:

CSC342 NETWORK SECURITY

Credit Hours:
Pre-requisites:

3 (Theory) + 0 (Lab)
CSC341 NETWORK MANAGEMENT

COURSE OBJECTIVES:
In this course, students study security issues in Information Technology and Networking. Students are
introduced to practical solutions for identifying, assessing, and preventing external and internal
threats to networks. Key components include authentication methods, communication security,
infrastructure security, cryptography basics, and security implementation.

CLASS POLICY:

A student must reach the class-room in time. Late comers may join the class but are not
entitled to be marked present.
Attendance shall be marked at the start of the class and students failing to secure 75%
attendance will not be allowed to sit in final exam.
The assignment submission deadline must be observed. In case of late submission, ten percent
may be deducted from each day.
Those who are absent on the announcement date of the assignment/test. Must get the
topic/chapter of test/assignment confirmed through their peers.
Mobile phones must be switched-off in the class-rooms.

GRADING POLICY:
Internal Evaluation
Midterm Exam
Attendance
Assignment/Presentations
Quizzes/Tests

20%
5%
5%
10%
40%

Final-term Exam

60%
100%

Total Internal Evaluation


Final-term Examination
Total Marks

TEXT BOOKS:

William Stalings; Cryptography and Network Security 4th Edition


Network Security; Charlie Kaufman, Radia Perlman and Mike Speciner; Prentice Hall.

P a g e |2

COURSE DESCRIPTION:
WEEK NO
1

6
7

9
10

TOPICS COVERD
Overview of network security
Network security background
Definitions
How security became an issue
Areas of security
Security as a process
Attacks, services and mechanisms
Security goals
Network models
Authentication applications
Security concerns of authentication
Access control
Identification
Authentication
Authorization
Identity management
Password and password management
Kerberos
Email Security
Introduction
Threats in email
Pretty good privacy
IP Security
Application of IPsec
Benefits of IPsec
Routing applications
IPsec services
IP security policy
Web Security
HTTP review
Secure Socket Layer (SSL)
Transport Layer Security (TLS)
Secure Electronic Transaction (SET)
Network Management Security
What is network security management
ISO network management model
Simple network management protocol
Intruders
Viruses
Firewalls
Midterm Exam
Wireless Security
Overview of WLAN

ASSESSMENT

Assignment 1 and 2 week

Quiz 1 and 2 week

Assignment 3, 4 and 5 week

Quiz 3 to 6 week

Week 1 Week 8

P a g e |3

WLAN security
Wireless Transport Layer Security
WAP end to end security
Cryptography
Introduction to cryptography
Services of cryptography
Components of a cryptographic system
Attacks on encrypted schemes (cipher text
only, known plain text and chosen plain text)

11

Private and public cryptography


Hash Algorithm / Message Digest
MD2
MD4
Digital signature
Trusted intermediaries
Key distribution protocol
Certificate
Digital certificate
Certification authority
Certificate revocation list (CRL)
Overview of Microsoft Certificate Server
Certificate Server Configuration
Certificate Server features
Certificate Sever Architecture
Server Engine
Intermediary
Server Database
Final-term Exam

12
13

14

15

16

17

___________________________
Dean of Faculty

Note:
1.
2.
3.

Assignments/Quizzes should be taken in time.


Student who is not satisfactory must be addressed to HoD.
Course outline must be observed.

Assignment 6 to 10 week

Quiz 7 to 11 week

Assignment 11 to 14 week

Quiz 12 to 14 week

10 to 16 week

You might also like