CYBV_479_Wireless_Networking_and_Security_Syllabus_Spring_2019
CYBV_479_Wireless_Networking_and_Security_Syllabus_Spring_2019
Syllabus
The University of Arizona, South
Spring, 2019
COURSE DESCRIPTION:
CYBV/NETV 479 provides students an introduction to wireless networking, mobile device
hardware and software architectures as well as the application of security fundamentals for
mobile computing systems. Students will be able to describe user associations and routing
in a cellular/mobile network, interaction of elements within the cellular/mobile core, and
end-to-end delivery of a packet and/or signal and what happens with the hand-off at each
step along the communications path. They will be able to explain differences in core
architecture between different generations of cellular and mobile network technologies.
CYBV/NETV 479 conforms to the National Security Agency (NSA) Center of Academic
Excellence in Cyber Operations (CAE-CO) academic requirements for cellular and mobile
technologies and wireless security.
Prerequisites: BASV 326, INFV320, and CSCV352 or Consent of Instructor
REQUIREMENTS:
Requirements for the course are: 5 Quizzes; 8 Labs; a Midterm Examination; and a Final
Examination. Students will be expected to draw on assigned readings to complete all
course writing assignments and Labs.
GRADING:
The final grade in the course will be based upon:
5 Quizzes: 24% See Course Schedule/D2L
(48 points each)
8 Labs: 24% See Course Schedule/D2L
(30 points each)
Midterm Examination: 25% See Course Schedule/D2L
(250 points)
Final Examination: 27% See Course Schedule/D2L
(270 points)
GRADING SCALE DISTRIBUTION
A 90 to 100 % 900 – 1000 Points A
B 80 to 89% 800 – 899 Points B
C 70 to 79% 700 – 799 Points C
D 60 to 69% 600 - 699 Points D
E Below 60% 0 – 599 Points E
Grading Policy: University policy regarding grades and grading systems is available at:
http://catalog.arizona.edu/policy/grades-and-grading-system
Requests for incompletes (I) and withdrawal (W) must be made in accordance
with university policies that are available at
http://registrar.arizona.edu/grades/grading-policy-manual-university-academic-
grading-policies-withdrawal-grades
COURSE SCHEDULE:
Class 3 – UMTS
Class 3 Learning Objectives – Upon completion students will be able to identify
and describe:
o UMTS Architecture and Paths
o UMTS Signaling and Messages
o UMTS Protocols
o Establishment of a UMTS speech call
o UMTS packet data
o HSPA
• Class 3 Assignments
o Class 3 Lecture & Presentation
o Read Chapter 3 - Wireless Networks
o CellSim Lab 2
Class 4 – CDMA2000
• Class 4 Learning Objectives – Upon completion students will be able to identify
and describe:
o CDMA2000 Architecture and Paths
o CDMA2000 Signaling and Messages
o CDMA2000 Protocols
o EVDO
o EVDV
• Class 4 Assignments
o Class 4 Lecture & Presentation
o Read Chapter 4 – Wireless Networks
o CellSim Lab 3
Class 5 – LTE
• Class 5 Learning Objectives – Upon completion students will be able to identify
and describe:
o LTE Architecture and Paths
o LTE Signaling and Messages
o LTE Protocols
o Multiple Input Multiple Output (MIMO)
o Carrier aggregation
o LTE-Advanced
• Class 5 Assignments
o Class 5 Lecture & Presentation
o Read Chapter 7 – Wireless Networks
o Quiz 2
o CellSim Lab 4
Class 6 - Mobile Location Based Services, Mobile Registration and Mobile Security
• Class 6 Learning Objectives – Upon completion students will be able to identify
and describe:
o Location Based Services (LBS)
o LBS architecture
o Locating techniques
o LBS applications
o Mobile registration procedures
o Mobile security
• Class 6 Assignments
o Class 6 Lecture & Presentation
Class 12 – 802.11 WiFi Open, WEP, WPA2 PSK & WPA2 Enterprise Networks
• Class 12 Learning Objectives – Upon completion students will be able to identify
and describe:
o Network architecture, Frequencies, Channel distribution
o Handshake/Beacons, Probes, Authentication, and Association procedures
o 802.11 Open and WEP Network attacks
§ Network Sniffing/Monitoring
§ Network Impersonation
§ Session Hijacking
§ Man-in-the-Middle
§ Denial of Service
o 802.11 WPA2 PSK & WPA2-Enterprise Network attacks
§ Network Sniffing/Monitoring
§ Dictionary Attacks
§ Radius Server Attacks
§ Denial of Service
o WEP Encryption
§ Encryption & Decryption Process
§ Weaknesses
§ Attacks
§ Mitigation Techniques
o WPA2 PSK & WPA2-Enterprise Encryption
• Class 12 Assignments
o Class 12 Lecture & Presentation
o Read Chapter 10 - Wireless Networks
Class 14 – RFID
• Class 14 Learning Objectives – Upon completion students will be able to
identify and describe:
o Active RFID Capabilities & Characteristics
§ Architectures
§ Frequencies
§ Data Formats
§ Attacks
• Long-Range Tag Reading
• RFID Analysis
o Frequency
o Modulation
o Data Decoding
• Cloning
o Passive RFID Capabilities & Characteristics
§ Architectures
§ Frequencies
§ Data Formats
§ Attacks
• Long-Range Tag Reading
• RFID Analysis
o Frequency
o Modulation
o Data Decoding
• Cloning
• ProxBrute Attacks
• Class 14 Assignments
o Class 14 Lecture & Presentation
o Quiz 5
Final Examination
University of Arizona Final Examination Policy:
https://www.registrar.arizona.edu/courses/final-examination-regulations-and-
information?audience=students&cat1=10&cat2=31
You are responsible for checking the D2L site regularly for classwork and
announcements. The course site may be accessed through http://d2l.arizona.edu/
If access to D2L is not available for an extended period of time (greater than one entire
evening - 6pm till 11pm) you can reasonably expect that the due date for assignments
will be changed to the next day (assignment still due by 11 pm). Technical assistance is
available 24/7 through the UA Help Desk at (520) 626-TECH (8324) or
http://uits.arizona.edu/departments/the247
ACADEMIC INTEGRITY:
Student Responsibilities: Students are responsible for understanding and following the
UA Code of Academic Integrity. Students engaging in academic dishonesty diminish
their education and bring discredit to the academic community and the campus. Students
should avoid situations likely to compromise academic integrity.
http://deanofstudents.arizona.edu/policies-and-codes/code-academic-integrity
CODE OF CONDUCT:
Please review the University’s Code of Conduct information, which can be found at:
https://deanofstudents.arizona.edu/policies-codes
ABSENCE POLICY:
Continuous student participation in all online class activities is a vital component of this
course. Students are encouraged to notify the instructor—in advance whenever
possible—if a student will not be able to access D2L or participate in online discussion
forums for more than a Class due to travel, illness, emergency, or similar situation. In
addition to illness, emergency, or other unavoidable situation, the following kinds of
student absence from regular class attendance or online participation will be excused by
the instructor:
All holidays or special events observed by organized religions will be honored for
those students who show affiliation with that particular religion.
Absences pre-approved the UA Dean of Students (or Dean’s designee) will be
honored.