0% found this document useful (0 votes)
3 views

Network Security Lab_DCF S5

The Diploma Cyber Forensics and Information Security course focuses on Network Security Lab with objectives to identify and block attacks, develop firewall solutions, and employ access control techniques. Students will learn to install relevant software for network analysis, demonstrate active and passive fingerprinting, and set up intrusion detection systems. The course includes practical experiments, lab examinations, and references to key texts in the field.

Uploaded by

principal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Network Security Lab_DCF S5

The Diploma Cyber Forensics and Information Security course focuses on Network Security Lab with objectives to identify and block attacks, develop firewall solutions, and employ access control techniques. Students will learn to install relevant software for network analysis, demonstrate active and passive fingerprinting, and set up intrusion detection systems. The course includes practical experiments, lab examinations, and references to key texts in the field.

Uploaded by

principal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Program: Diploma Cyber Forensics and Information Security

Course Code: 5287 Course Title: Network Security Lab

Semester: 5 Credits: 1.5


Course Category: Program Core Course
Periods / Week: 4 (L:4 T:0 P:0) Periods / Semester: 45

Course Objectives:

● To Identify attacks and efficiently block the attacks and to Develop firewall based
solutions against security threats
● To employ access control techniques to the existing computer platforms.
● Installation of relevant software to Demonstrate Virtual box, port scanning, Finding
active machines and version of remote OS.
● To demonstrate active and passive fingerprinting, sniffing the router traffic, use of
dumpsec.
● To Demonstrate IDS, Rootkits, Open ssl command, setup and monitoring honeypot
and to Study a security related problem and recommend solutions.

Course Prerequisites:

Course
Topic /Description Course Title Semester
Code
Knowledge of Computer Network Computer Network Engineering
Softwares and Components. IV
Lab
Basic Knowledge of problem Problem Solving and
solving II
Programming

Course Outcomes:

On completion of the course, students will be able to:

Duration Cognitive
COn Description
(Hours) Level
Identify attacks and efficiently block the attacks and
CO1 to develop firewall based solutions against security 9 Applying
threats.
CO2 Understand the use of access control techniques. 11 Applying
Install and use relevant network softwares to identify
the various properties of a network and demonstrate
Applying
CO3 active and passive fingerprinting and sniffing the router 8
traffic.
Demonstrate IDS, Rootkits, Open ssl command, setup
CO4 and monitor honeypot and to Study a security related 14 Applying
problem and recommend solutions.
Lab Examination 3

CO-PO Mapping:

Course
PO1 PO2 PO3 PO4 PO5 PO6 PO7
Outcomes
CO1 3 3 3 2
CO2 3 3 3 2
CO3 3 3 3 2
CO4 3 3 3 2

3-Strongly mapped, 2-Moderately mapped, 1-Weakly mapped

Course Outline:

Blooms
Module Duration
Name of Experiment Taxonomy
Outcomes (Hours)
Level
Identify attacks and efficiently block the attacks and to develop
CO1 firewall based solutions against security threats.

Network and Service Configuration : Get


familiar with VNetLab platform; figure out
M1.01 3 Applying
the topology of given virtual network using
network tools; configure routing tables;

Setup dynamic services such as Web, SSH


M1.02 3 Applying
and NFS server.

Firewall configuration using iptables:


M1.03 Develop a set of ip table rules according 3 Applying
to the given specifications.
Understand the use of access control techniques and To install and use
CO2 relevant network softwares to identify the various properties of a
network.
M2.01 Implement access control lists 3 Applying
Learn to install Wine/Virtual Box/ or any other
equivalent s/w on the host OS. Perform an
M2.02 experiment for Port Scanning with nmap, Applying
5
superscan or any other equivalent software.
1. Using nmap
i. Find Open ports on a system
ii. Find machines which are active
iii. Find the version of remote OS on
M2.03 Applying
other systems 3
iv. Find the version of s/w installed on
other system (using nmap or any
other software)
Lab examination 1.5

Demonstrate active and passive fingerprinting and sniffing the router


CO3
traffic.

Perform an experiment on Active and Passive


4 Applying
MO1 finger printing using XProbe2 and nmap
Perform an experiment to demonstrate how to
sniff for router traffic by using the tool Cain and 4 Applying
MO2
Abel / wireshark / tcpdump.
Demonstrate IDS, Rootkits, Open ssl command, setup and monitor
CO4 honeypot and to Study a security related problem and recommend
solutions.
Demonstrate Intrusion Detection System (IDS)
2 Applying
MO1 using any tool eg. Snort or any other s/w

MO2 Install RootKits and study the features. 2 Applying

Generate minimum 10 passwords of length 12


MO3 2 Applying
characters using open ssl command
Setup a honey pot and monitor the honey
MO4 2 Applying
pot on network.
Open ended projects** 6
Lab examination 1.5

**Open-ended Experiments:
(Not for End Semester Examination but compulsory to be included in Continuous Internal
Evaluation. Students can do open-ended experiments as a group of 2-3. There is no
duplication in experiments between groups.)
Perform wireless audit on an access point or a router and decrypt WEP and WPA ( Net
Stumbler)
Demonstrate intrusion detection system (ids) using any tool (snort or any other s/w)

Text / Reference:

T/R Book Title / Author

Build Your Own Security Lab: A field guide for network Testing, Michael Gregg,
T1
Wiley India edition, ISBN: 9788126516919.
Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004,
T2 ISBN 0-321-24744-2.

You might also like