CS 438/538: Network Security
Catalog Description: Practical topics in network security; policy and mechanism, malicious code; intrusion detection, prevention, response; cryptographic techniques for privacy and integrity; emphasis on trade-offs between risk of misuse, cost of prevention, and societal issues; concepts implemented in programming assignments.
Type: CS 438 is a technical elective for all Computer Science majors; Required course for Computer Science majors with Information Assurance emphasis option. CS 538 is available for graduate credit.
Total Credits: 3
Contact Hours: 3 lecture hours per week
Course Coordinator: James Alves-Foss
Prereq: Have passed all CS 200 level course with a C or better
Textbook: "Network Security Essentials, Applications and Standards," 5th Edition, William Stallings, Prentice Hall or equivalent
- IT System Components
- Networking Concepts
- Network Defense and Defense in Depth
- Legal and Ethical Issues in Network Security
- Cryptography: Symmetric Encryption and Confidentiality
- Cryptography: Asymmetric Encryption and Authentication
- Network Authentication and Key Distribution
- Transport Layer Security
- Network Layer Security
- Wireless Network Security, Mobile, and Sensor Networks
- Application Security: e.g. Email, Web security
- Network Security tools: e.g. Firewalls, VPNs, IDS
- Network Security Management and Administration
- Describe the hardware components of modern computing environments and their individual functions
- Describe the fundamental concepts, technologies, components and issues related to communications and beta networks.
- Describe the basic network architecture given a specific need and set of hosts/clients.
- Track and identify the packets involved in a simple TCP connection.
- Use network monitoring and mapping tools such as WireShark and Nmap
- Apply their knowledge of network technologies to design and construct a working network.
- Analyze a trace of packets to identify the establishment of a TCP connection.
- Identify the elements of a cryptographic system.
- Describe cryptographic algorithms (symmetric & asymmetric), protocols, tools, and techniques and understand which are appropriate for a given situation.
- Understand the uses, strengths and weaknesses, modes and issues that have to be addressed in an implementation.
- Describe networking concepts as they pertain to Network security and defense.
- Apply knowledge, skills and tools to implement and maintain network defense measures.
- Describe the challenges associated with wireless sensor networks including but not limited to coordination, energy efficiency, self organization and security.
- Describe and discuss current networking technologies, architectures and protocols.
- Describe mobile device networking concepts such as mobile device connectivity and mobile device infrastructure.