0% found this document useful (0 votes)
8 views

network security syllabus

The document outlines the syllabus for the course CCS354 Network Security at AAA College of Engineering and Technology for the academic year 2024-2025. It covers objectives such as cryptography fundamentals, key management, network security techniques, and real-time security practices across five units, along with practical exercises and course outcomes. Additionally, it includes recommended textbooks and references for further study.

Uploaded by

Rajathi S
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

network security syllabus

The document outlines the syllabus for the course CCS354 Network Security at AAA College of Engineering and Technology for the academic year 2024-2025. It covers objectives such as cryptography fundamentals, key management, network security techniques, and real-time security practices across five units, along with practical exercises and course outcomes. Additionally, it includes recommended textbooks and references for further study.

Uploaded by

Rajathi S
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Regulation : 2021

AAA COLLEGE OF ENGINEERNG AND TECHNOLOGY


Kamarajar Educational Road, Revision:0
Amathur, Sivakasi – 626 005.
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Date : 17.02.2025
SYLLABUS

Name of the Course Instructor: Mrs. S.Rajathi Class / Semester : III / VI

Course Code & Name: CCS354 Network Security Academic Year : 2024 – 2025

OBJECTIVES:
 To learn the fundamentals of cryptography.
 To learn the key management techniques and authentication approaches.
 To explore the network and transport layer security techniques.
 To understand the application layer security standards.

 To learn the real time security practices.


UNIT I INTRODUCTION 8+1
Basics of cryptography, conventional and public-key cryptography, hash functions, authentication, and
digital signatures. Content Beyond the Syllabus: Four square cipher

UNIT II KEY MANAGEMENT AND AUTHENTICATION 7+1


Key Management and Distribution: Symmetric Key Distribution, Distribution of Public Keys, X.509
Certificates, Public-Key Infrastructure. User Authentication: Remote User-Authentication Principles,
Remote User-Authentication Using Symmetric Encryption, Kerberos Systems, Remote User Authentication
Using Asymmetric Encryption. Content Beyond the Syllabus: Blow fish

UNIT III ACCESS CONTROL AND SECURITY 4+1


Network Access Control: Network Access Control, Extensible Authentication Protocol, IEEE 802.1X Port-Based
Network Access Control - IP Security - Internet Key Exchange (IKE). Transport-Level Security: Web Security
Considerations, Secure Sockets Layer, Transport Layer Security, HTTPS standard, Secure Shell (SSH) application.
Content Beyond the Syllabus: Secure File Transfer protocol

UNIT IV APPLICATION LAYER SECURITY 5+1


Electronic Mail Security: Pretty Good Privacy, S/MIME, DomainKeys Identified Mail. Wireless Network Security:
Mobile Device Security Content Beyond Syllabus : Anti-Virus Software

UNIT V SECURITY PRACTICES 6+1


Firewalls and Intrusion Detection Systems: Intrusion Detection Password Management, Firewall Characteristics
Types of Firewalls, Firewall Basing, Firewall Location and Configurations. Blockchains, Cloud Security and IoT
security Content Beyond the Syllabus: Cloud Security Applications
TOTAL : 30 + 5 PERIODS
PRACTICAL EXERCISES: 30 PERIODS
1. Implement symmetric key algorithms
2. Implement asymmetric key algorithms and key exchange algorithms
3. Implement digital signature schemes
4. Installation of Wire shark, tcpdump and observe data transferred in client-server communication using UDP/TCP
and identify the UDP/TCP datagram.
5. Check message integrity and confidentiality using SSL
6. Experiment Eavesdropping, Dictionary attacks, MITM attacks
7. Experiment with Sniff Traffic using ARP Poisoning
8. Demonstrate intrusion detection system using any tool.
9. Explore network monitoring tools
10. Study to configure Firewall, VPN

COURSE OUTCOMES:
At the end of this course, the students will be able to
CO1: Classify the encryption techniques
CO2: Illustrate the key management technique and authentication.
CO3 Evaluate the security techniques applied to network and transport layer
CO4: Discuss the application layer security standards.
CO5: Apply security practices for real time applications.

TEXT BOOKS:
1. Cryptography and Network Security: Principles and Practice, 6th Edition, William Stallings,
2014, Pearson, ISBN 13:9780133354690.
REFERENCES:
1. Network Security: Private Communications in a Public World, M. Speciner, R. Perlman,
C. Kaufman, Prentice Hall, 2002.
2. Linux iptables Pocket Reference, Gregor N. Purdy, O'Reilly, 2004, ISBN-13: 978- 0596005696.
3. Linux Firewalls, by Michael Rash, No Starch Press, October 2007, ISBN: 978-1-59327-141- 1
4. Network Security, Firewalls And VPNs, J. Michael Stewart, Jones & Bartlett Learning, 2013, ISBN-
10: 1284031675, ISBN-13: 978-1284031676.
5. The Network Security Test Lab: A Step-By-Step Guide, Michael Gregg, Dreamtech Press, 2015,
ISBN-10:8126558148, ISBN-13: 978-8126558148.

CO’s-PO’s & PSO’s MAPPING


CO’s PO’s PSO’s
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 3 2 2 2 - - - 2 1 2 1 2 3 1
2 1 1 3 2 2 - - - 2 2 1 1 3 1 2
3 1 2 1 1 2 - - - 3 3 1 3 2 1 3
4 2 2 3 2 3 - - - 3 3 2 1 2 1 3
5 2 1 3 2 2 - - - 2 1 1 3 2 1 1
AVg. 1.8 1.8 2.4 1.8 2.2 - - - 2.4 2 1.4 1.8 2.2 1.4 2
1 - low, 2 - medium, 3 - high, ‘-' - no correlation

You might also like