Phone: (510) 885-3356
Section 01 Lecture: HY-ONLINE
This class will be held hybrid online. The instructor will provide PowerPoint lectures with accompanying audio-video tracks and transcript. Lecture videos and audios (mpeg) can be downloaded to iPod or iPhones. Students will complete Homeworks and Lab assignments
Major announcements related to class will be posted on my web site. (http://www.mcs.csueastbay.edu/~lertaul/) Check regularly announcement section from class web page. (http://www.mcs.csueastbay.edu/~lertaul/)
Students will receive the solutions of assignment problems and personal messages from their Horizon E-mail accounts. So please check and clear your horizon e-mail accounts regularly.
Students will use TURNITIN application in blackboard to submit their assignments. FYI, TURNITIN application has plagiarism filter built in . When students submit their assignments TURNITIN application prepares an ORIGINALITY report. Students can see this report immediately. Originality reports which have greater then %40 WILL NOT BE ACCEPTED. These assignments will get 0 points. If the originality report is higher then %80, instructor will file plagiarism report.
Students will submit their Homeworks on time. 25 points will be cut for one day late Homeworks. Homeworks which are 2 days late WILL NOT BE ACCEPTED. These homeworks will get 0 points. E-mail submissions WILL NOT be accepted. These homeworks will get 0 points.
Office hours will be held on SKYPE. (Skype ID: CSUEBLERTAUL ) Students can talk with the instructor using SKYPE for their questions during office hours.
Principles of secure network communications. Techniques of authentication and identification, cryptographic key distribution and management, assurance of data integrity. Access Control. Security Policies. E-mail security, IP security, WEB security, Network management security. Discussions of the system security such as Intruders, Malicious software, Firewalls. Various commercial standards and protocols such as SSL/TLS, IPSec, S/MIME, PGP, X.509 certificates, PKI, Kerberos and VPN etc. Practical hacking and defense techniques.
Network Security Essentials: Applications and Standards, 4/E
Publisher: Prentice Hall
Format: Paper; 432 pp
Optional Texts: Matt Bishop, Computer Security, Art and Science, Charlie Kaufman, Network Security, 2nd ed; Paul Campbell, Security + Guide to Network Security Fundamentals and LAB Manual for Network Security
REFERENCE BOOKS for Practical Hacking and Defense Techniques.
Press Online - Book: Practical Hacking Techniques and Countermeasures
Mark D. Spivey, Consultant, Tomball, Texas, USA
Cat. #: AU7057
ISBN 10: 0849370574
Publication Date: November 02, 2006
Number of Pages: 752
Publisher: Prentice Hall
Format: Paper; 300 pp
ISBN-10: 1435488539 ISBN-13: 9781435488533
384 Pages Paperbound
© 2010 Published
STUDENT LEARNING OUTCOMES
Students will be able to
1. Describe key network security requirements
2. Present main concepts of symmetric cryptography (DES, AES algorithms)
3. Present main concepts of a symmetric cryptography (RSA, Diffe-Hellman, ECC)
4. Present an overview of the basic structure and usage of cryptographic hash functions (SHA-1, MD5)
5. Present an overview of techniques for remote user authentication using symmetric encryptions (Kerberos)
6. Describe Web security threats and security approaches
7. Present an overview of Secure Socket Layer (SSL/TLS)
8. Present an overview of the operation of PGP (Pretty Good Privacy)
9. Understand the functionality of S/MIME and security threats it addresses
10. Present an overview of IP security (IPsec)
11. Present an overview of Firewalls, Viruses and Intrusion Detection Systems
12. Practice different Hacking Techniques
13. Apply critical thinking and problem solving skills by analyzing security problems, designing solutions, and evaluating results.
14. Demonstrate communication skills in both written and oral form, and work in a team environment.(WIKI, EP and Discussion group activities)
15. Independently and collaboratively acquire new network sec security skills through analysis of current computer science literature and industrial practices. (EP)
Course work and Grading:
Final Grades are based on total course %.