CS4525 Principles of Network Security

CS 6525 Network Security

: Dr. Levent ERTAUL

Office: SC-N154
Phone: (510) 885-3356
Email: levent.ertaul@csueastbay.edu
Web: http://www.mcs.csueastbay.edu/~lertaul

Class Schedule:

Section 01    Lecture: HY-ONLINE

Course Requirements

This class will be held hybrid online. The instructor will provide PowerPoint lectures with accompanying audio-video tracks and transcript.  Lecture videos and audios (mpeg) can be downloaded to iPod or iPhones. Students will engage in Discussion Groups, complete Homeworks,  Lab assignments, and prepare an E-portfolio. 


Major announcements related to class will be posted on my web site. (http://www.mcs.csueastbay.edu/~lertaul/) Check regularly announcement section from class web page. (http://www.mcs.csueastbay.edu/~lertaul/)

Students will receive the solutions of assignment problems and personal messages from their  Horizon E-mail accounts. So please check and clear your horizon e-mail accounts regularly.

Students will use TURNITIN application in blackboard to submit their assignments. FYI,  TURNITIN application has plagiarism filter built in . When students submit their assignments TURNITIN application  prepares an ORIGINALITY report. Students can see this report immediately. Originality reports which have greater then  %40 WILL NOT BE ACCEPTED. These assignments will get 0 points. If the originality report is higher then %80, instructor will file plagiarism report.

Students will submit their Homeworks on time. 25 points will be cut for one day late Homeworks. Homeworks which are 2 days late WILL NOT BE ACCEPTED. These homeworks will get 0 points. E-mail submissions WILL NOT be accepted. These homeworks will get 0 points.

Students will use blackboard to engage in discussion group. (see Blackboard help for further details) (http://www.viewletcentral.com/vc/viewlet.html?id=48389415)

Students will use WIKI to create a broader understanding of any subject which is security related (see blackboard help for Wiki)

Office hours will be held on SKYPE.  (Skype ID: CSUEBLERTAUL ) Students can talk with the instructor using SKYPE for their questions during office hours.

Each student is expected to create an E-portfolio (see Blackboard help for E-Portfolios)

What is an E-portfolio and the benefits of creating E-portfolios

E-portfolio is organized collection of digital material that demonstrates your work, efforts, progress, and achievements. The collection reflects your participation in selecting contents, the criteria for judging merit, and evidence of your self reflection. Therefore your eportfolio will reflect the improvement of your understanding and lerning througout the semester in the network security course.

You will create your eportfolio using Blackboard authoring tool and you can put any kind of information (journal papers, links to websites, notes on the lectures, projects, plans, your comments on your classmates’ eportfolios, comments to the instructor, etc.) in any form (ppt, word, hypertxt, sound, video, imge, simulation, etc) you find necessary. In your eportfolio include a cover design with your name, class, a paragrah about the organization of your eportfolio, Table of contents with hyperlinks. For each artifact you included in your eportfolio state the criterion for chosing it and what you have learnt from it. As the last item in your eportfolio write a brief  evaluation of your own learning in this course and the impact of using eportfolio. Be creative and look after quality in the material that you include in your eportfolio. Remember that your portfolio can serve as a binder of resources in the future.

Other people can see and comment on your eportfolio so that you can help in learning of others as well as improving of your own. Eportfolios are tools that interweave learning and assessment.  By examining your portfolio your instructor will get an overall view of your understanding about the subject and thus evaluate you on your cumulative performance.

Some benefits of portfolios  are :

  1. You will take more responsibility and increase your autonomy
  2. Get a broader, more in-depth look at what you know and can do.
  3. Actively monitor your learning and understanding about the course
  4. May help improve your reading and writing skills
  5. Reflect your understanding
  6. increase awareness of your strengths and weaknesses
  7. Create and improve continuosly your own reporsoitory of knowledge to use whenever you need.
  8. Gain experience in creating portfolios which later can be used for other purposes such as to document professional and academic resumes. Users can export their porftolios to be viewed outside of Blackboard, as an HTML package.

Grading Criteria:

Some references on portfolio

What is a Portfolio  http://www.stenhouse.com/pdfs/0060ch01.pdf

Eportfolio examples from students of Portland State University: http://web.pdx.edu/~pgerst/index.htm

Tutorials – eportfolio in blackboard:

Each E-portfolio will have a comment section. Students will use this section to grade each others E-portfolios after each due date. Students will use only A, B, C & F grades. Every student participation in this grading process is required. No participation will result 20%  grade loss in theirs final e-portfolio grades.


Course Description:

Principles of secure network communications. Techniques of authentication and identification, cryptographic key distribution and management, assurance of data integrity. Access Control. Security Policies.  E-mail security, IP security, WEB security, Network management security. Discussions of the system security such as Intruders, Malicious software, Firewalls. Various commercial standards and protocols such as SSL/TLS, IPSec, S/MIME, PGP,  X.509 certificates, PKI, Kerberos and VPN etc. Practical hacking  and defense techniques.

Prerequisites: NONE

Required Text: William Stallings, Network Security Essentials, 4th Edition.         

View larger cover
Network Security Essentials: Applications and Standards, 4/E
William Stallings

ISBN-10: 0136108059
ISBN-13:  9780136108054

Publisher:  Prentice Hall
Copyright:  2011
Format:  Paper; 432 pp
Published:  03/12/2010


Optional Texts: Matt Bishop, Computer Security, Art and Science,    Charlie Kaufman, Network Security, 2nd ed;  Paul Campbell, Security + Guide to Network Security Fundamentals  and LAB Manual for Network Security


REFERENCE BOOKS for Practical Hacking and Defense Techniques.


CRC Press Online - Book: Practical Hacking Techniques and Countermeasures
Mark D. Spivey, Consultant, Tomball, Texas, USA

Price:  $83.95
Cat. #:  AU7057
ISBN:  9780849370571
ISBN 10:  0849370574
Publication Date:  November 02, 2006
Number of Pages:  752





View larger cover
Applied Information Security
Randy Boyle

ISBN-10: 0136122035
ISBN-13:  9780136122036

Publisher:  Prentice Hall
Copyright:  2010
Format:  Paper; 300 pp
Published:  07/16/2009


Official Certified Ethical Hacker Review Guide, 1st Edition

Official Certified Ethical Hacker Review Guide, 1st Edition

Steven DeFino - Intense School

Barry Kaufman - Intense School

ISBN-10: 1435488539  ISBN-13: 9781435488533

384 Pages   Paperbound



Course work and Grading:

Homework 10%
LABs 10%
Midterm 20%
Final 20%
E-Portfolio 25%
Discussion group and WIKI 15%

Final Grades are based on total course %.