0% found this document useful (0 votes)
7 views

Course Plan Part A CS463 B.tech.

Course plan

Uploaded by

t.abhi.160103
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

Course Plan Part A CS463 B.tech.

Course plan

Uploaded by

t.abhi.160103
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Department of Computer Science and Engineering

National Institute of Technology Karnataka, Surathkal

Course Plan

Name of the course: Network


Course Code: CS463 No. of Credits (L-T-P): (3-1-0)4
Security

Year: B.Tech.(CSE)
Academic Session: Odd Sem, 2024-
Semester: 7th Course Type: Elective
2025
Section: -

A. Prerequisites (if any): Number Theory & Cryptography

B. Name and Contact Details of the Course Instructor:


Dr. Mahendra Pratap Singh
Tel. No. +91824-2473402
E-mail id: [email protected]
C. Assessment Pattern (Use Bloom’s taxonomy to design rubrics for evaluating students’ performance):

Evaluation Component

Level Knowledge Assessment


No. Level Quiz/Class Mid Semester End-Semester Course Attendance (100%)
Test (20%) Examination Examination Project/Case (10%)
(20%) (30%) Study (20%)

K1 Remember 25 20 10 10 10 15

K2 Understand 25 20 20 20 20 21

K3 Apply 20 25 30 25 20 25

K4 Analyze 10 15 15 20 15 15

K5 Evaluate 10 15 15 15 15 14

K6 Create 10 10 10 10 10 10

Total 100

D. Assessment Process:

Evaluation Component Assessment Frequency Assessed by Reviewed by

Quiz/Class Test Per Unit/Topic Course Instructor DUGC

Mid Semester Course Instructor DUGC


Once a semester
Examination
End Semester Course Instructor DUGC
Once a semester
Examination

Course Project/Case Course Instructor DUGC


Thrice a semester
Study

Attendance Per Lecture Course Instructor DUGC

E. Course Objectives:

Sl. No. Course Objectives

1 Outline the objectives of network security essentials.

2 Describe the network protocols running at various layers.

3 Understand the vulnerabilities at different layers.

4 Employ cryptography to secure the application layer and network layer.

5 Employ methods to secure different layers.

F. Course (Learning) Outcomes (COs):

COs Course Outcomes

1 Understand the basic working principles of computer networks.

2 Identify various threats to network security.

3 Understand and analyze various protocols employed to secure network.

4 Design/create customized network security policies.

5 Apply the knowledge to design secure network systems.

G. Course Articulation Matrix:


(Note: Enter correlation levels 1, 2, or 3 as defined below: 1 - Slight (Low), 2 - Moderate (Medium) 3 - Substantial (High),
and If there is no correlation, put “-”_)

COs PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2

1 2 1 - - - 3 - - - - - - - -

2 - - 2 1 - - 3 2 - - - - 3 1

3 1 2 - - 3 - - - - 2 1 - - -

4 - - 3 1 - - - 2 - 2 - - 1 3

5 3 - - 2 - 2 - - - 1 1 - - -

Avg. 2 1.5 2.5 1.33 3 2.5 3 2 - 1.67 1 - 2 2


H. Program Articulation Matrix:
(Note: Enter correlation levels 1, 2, or 3 as defined below: 1 - Slight (Low), 2 - Moderate (Medium) 3 - Substantial (High),
and If there is no correlation, put “-”)

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2

2 2 3 1 3 3 3 2 - 2 1 - 2 2

I. Course Syllabus:

Module Topic to be covered No. of hrs. (L-T-P)

1 Introduction: OSI Architecture, Security Attacks, Security Services, Security 5-2-0


Mechanism, Network Security Model

2 Key Distribution and Management: Symmetric and Asymmetric Key Distribution, 5-2-0
X.509 Certificate, Public Key Infrastructure (PKIX)

3 Authentication: Traditional Authentication Techniques, Mutual Authentication, One- 5-2-0


way Authentication, Remote User Authentication, Kerberos, X.509 Authentication

4 Transport-Layer Security: Secure Socket Layer (SSL), Transport Layer Security 5-2-0
(TLS), HTTPS, Secure Shell (SSH)

5 IP Security: Tunnel mode, Transport Mode, Authentication Header (AH) & 5-2-0
Encapsulating Security Payload (ESP), Key Exchange

6 Wireless Network Security: Wireless LAN Overview, Wireless LAN Security, Wired 5-2-0
Equivalence Privacy (WEP), Wireless Application Protocol (WAP), Wireless
Transport Layer Security (WTLS)

7 Electronic Mail Security: Pretty Good Privacy (PGP), Secure Multipurpose Internet 5-2-0
Mail(S/MIME)

8 Malicious Software, Intrusion Detection and Prevention Systems, Firewall, 5-2-0


Organizational security issues, Security policies for network operations, Disaster
recovery and business continuity

J. List of Textbooks & Reference books, Online Course Resources:

Items Sl. No. Title, Author, Publisher, etc.

1 Introduction to Computer Security by Michael Goodrich and Robert Tamassia, Pearson.

Security+ Guide to Network Security Fundamentals, by Mark Ciampa, “2nd Edition,


2
Textbooks Cengage Learning.

Network Security Essentials - Applications and Standard, by William Stalling, Pearson


3 Education.

Roberta Bragg, Mark Rhodes and Ousley, Network Security: The Complete
Reference books 1
Reference.
Kaufman, Perlman and Speciner, Network Security: Private Communications in a Public
2
World (2003, 2/e; Prentice Hall).

3 Pfleeger and Pfleeger, Security in Computing (2007, 4/e; Prentice Hall).

1 https://nptel.ac.in/courses/106/105/106105031/
Online Resources
2 https://nptel.ac.in/courses/106/105/106105162/

Name and signature of course instructor with date:

Name and signature of DUGC/DPGC Secretary with date:

Name and signature of DUGC/DPGC Chairman with date:

Name and signature of HOD with date:

**** END ****

You might also like