Course Contents
This course provides an in depth review of the theoretical and applied topics in network security. Students satisfactorily completing the course will be able to formulate a security model for network environments, and apply cryptography, protocol design, and emergent network security technologies to meet the requirements of that model. Specifically, will study major security protocols and standards, network attacks and defenses, database security, virus, malware, denial of service, firewalls, intrusion detection, and wireless security.
Course Synopsis
This course covers essential concepts of network security, network security primitives, and authentication techniques. This course also focuses on the latest security and privacy issues in networking and computer systems. Finally, this course explores the state-of-art network security and applied cryptography research problems and solutions via literature survey and research projects.
Course Learning Outcomes
Have a knowledge of the types of countermeasures that can be put in place in computer systems, networks, and network infrastructures to identify, reduce or prevent problems caused by network attacks or misuse. Be able to undertake practical work that explores techniques covered in this course and comment on their findings
No Information Yet
Book Title : Cryptography and Network Security: Principles and Practice
Author : William Stallings
Edition : 6th Edition
Publisher :
Book Title : Security in Computing
Author : Charles P. Pfleeger, Shari Lawrence Pfleeger
Edition : 4th Edition
Publisher :
Book Title : Computer Security: Art and Science
Author : Matthew Bishop
Edition :
Publisher :
Book Title : Network Security Secrets and Solutions
Author : Stuart McClure, Joel Scambray, George Kurtz
Edition :
Publisher :
Book Title : Introduction to Network Security
Author : D. Jacobson, Chapman and Hall
Edition :
Publisher :
Book Title : Computer Network Security: Theory and Practice
Author : Jie Wang
Edition :
Publisher : Springer
Book Title : Network Security: The Complete Reference
Author : Mark Rhodes-Ousley, Roberta Bragg, and Keith Strassberg
Edition : 1st Edition
Publisher : McGraw-Hill Osborne Media
Book Title : Network Security and Management
Author : Brijendra Singh
Edition : 3rd Edition
Publisher : PHI Learning Private Limited
No Information Yet