Network Security Lab_DCF S5
Network Security Lab_DCF S5
Course Objectives:
● To Identify attacks and efficiently block the attacks and to Develop firewall based
solutions against security threats
● To employ access control techniques to the existing computer platforms.
● Installation of relevant software to Demonstrate Virtual box, port scanning, Finding
active machines and version of remote OS.
● To demonstrate active and passive fingerprinting, sniffing the router traffic, use of
dumpsec.
● To Demonstrate IDS, Rootkits, Open ssl command, setup and monitoring honeypot
and to Study a security related problem and recommend solutions.
Course Prerequisites:
Course
Topic /Description Course Title Semester
Code
Knowledge of Computer Network Computer Network Engineering
Softwares and Components. IV
Lab
Basic Knowledge of problem Problem Solving and
solving II
Programming
Course Outcomes:
Duration Cognitive
COn Description
(Hours) Level
Identify attacks and efficiently block the attacks and
CO1 to develop firewall based solutions against security 9 Applying
threats.
CO2 Understand the use of access control techniques. 11 Applying
Install and use relevant network softwares to identify
the various properties of a network and demonstrate
Applying
CO3 active and passive fingerprinting and sniffing the router 8
traffic.
Demonstrate IDS, Rootkits, Open ssl command, setup
CO4 and monitor honeypot and to Study a security related 14 Applying
problem and recommend solutions.
Lab Examination 3
CO-PO Mapping:
Course
PO1 PO2 PO3 PO4 PO5 PO6 PO7
Outcomes
CO1 3 3 3 2
CO2 3 3 3 2
CO3 3 3 3 2
CO4 3 3 3 2
Course Outline:
Blooms
Module Duration
Name of Experiment Taxonomy
Outcomes (Hours)
Level
Identify attacks and efficiently block the attacks and to develop
CO1 firewall based solutions against security threats.
**Open-ended Experiments:
(Not for End Semester Examination but compulsory to be included in Continuous Internal
Evaluation. Students can do open-ended experiments as a group of 2-3. There is no
duplication in experiments between groups.)
Perform wireless audit on an access point or a router and decrypt WEP and WPA ( Net
Stumbler)
Demonstrate intrusion detection system (ids) using any tool (snort or any other s/w)
Text / Reference:
Build Your Own Security Lab: A field guide for network Testing, Michael Gregg,
T1
Wiley India edition, ISBN: 9788126516919.
Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004,
T2 ISBN 0-321-24744-2.