CS 438/538

From CS Wiki
Jump to: navigation, search

CS 438/538: Network Security

Catalog Description: Practical topics in network security; policy and mechanism, malicious code; intrusion detection, prevention, response; cryptographic techniques for privacy and integrity; emphasis on trade-offs between risk of misuse, cost of prevention, and societal issues; concepts implemented in programming assignments.

Type: CS 438 is a technical elective for all Computer Science majors; Required course for Computer Science majors with Information Assurance emphasis option. CS 538 is available for graduate credit.

Total Credits: 3

Contact Hours: 3 lecture hours per week

Course Coordinator: James Alves-Foss

URL: None. Recommended Preparation: Knowledge of C or C++.

Prereq: CS 336

Textbook: "Network Security Essentials, Applications and Standards," 5th Edition, William Stallings, Prentice Hall or equivalent

Textbook URL: http://www.pearsonhighered.com/educator/academic/product/0,3110,0136108059,00.html

Course Topics

  1. IT System Components
  2. Networking Concepts
  3. Network Defense and Defense in Depth
  4. Legal and Ethical Issues in Network Security
  5. Cryptography: Symmetric Encryption and Confidentiality
  6. Cryptography: Asymmetric Encryption and Authentication
  7. Network Authentication and Key Distribution
  8. Transport Layer Security
  9. Network Layer Security
  10. Wireless Network Security, Mobile, and Sensor Networks
  11. Application Security: e.g. Email, Web security
  12. Network Security tools: e.g. Firewalls, VPNs, IDS
  13. Network Security Management and Administration

Course Outcomes

  1. Describe the hardware components of modern computing environments and their individual functions
  2. Describe the fundamental concepts, technologies, components and issues related to communications and beta networks.
  3. Describe the basic network architecture given a specific need and set of hosts/clients.
  4. Track and identify the packets involved in a simple TCP connection.
  5. Use network monitoring and mapping tools such as WireShark and Nmap
  6. Apply their knowledge of network technologies to design and construct a working network.
  7. Analyze a trace of packets to identify the establishment of a TCP connection.
  8. Identify the elements of a cryptographic system.
  9. Describe cryptographic algorithms (symmetric & asymmetric), protocols, tools, and techniques and understand which are appropriate for a given situation.
  10. Understand the uses, strengths and weaknesses, modes and issues that have to be addressed in an implementation.
  11. Describe networking concepts as they pertain to Network security and defense.
  12. Apply knowledge, skills and tools to implement and maintain network defense measures.
  13. Describe the challenges associated with wireless sensor networks including but not limited to coordination, energy efficiency, self organization and security.
  14. Describe and discuss current networking technologies, architectures and protocols.
  15. Describe mobile device networking concepts such as mobile device connectivity and mobile device infrastructure.