Network Security (NS)
About Us.
Network Security (Educational Course) Course Homepage
Tuesdays 10:30 - 11:30 and Wednesday 08:30 - 10:30Room: 109
TAs class: Tuesdays 11:30 - 12:30
Room: 109
Instructors
- Instructor: Mohammad Reza Razian
- Website: mrazian.com
- Email: [MyFamilyName].mr [AT] gmail
- TA:
- Mr. Abdollahi (Email: en.m.abdollahy [AT] Gmail
Description:
Network Security is the process of taking physical and software preventative measures to protect the underlying networking infrastructure from unauthorized access, misuse, malfunction, modification, destruction, or improper disclosure, thereby creating a secure platform for computers, users and programs to perform ... SANS Institute: Network Security Resources https://www.sans.org/network-security/Prerequisites
Computer Networks or an equivalent courseResources
-
Course References:
- Cryptography and Network Security Principles and Practices, By William Stallings 5th Edition
- Introduction to Computer Security, By Matt Bishop
Policies:
Grading policy is as follows. This is tentative.5 Homework
10 Final
4 Midterm
1 Discipline (Class Participation and Following rules)
There will be no exceptions to the following rules:
If you turn in your assignment one or more day late you will loose grade.
Cell Phones must be turned off (or be silent) when you are in class.
Policy for cheating/copying HWs. Providing your assignment to someone else is considered cheatingon your behalf. All participants will receive -100 for the task at hand.
Your dress should be adopted to Dress code of Roshd-e-Danesh University.
Important Info
- Midterm grades: [PDF]
Homework
Course Material
- 11/21: Introduction to Course
- Course resources
- Course paper
- Course assignment
- Introduction to Data and Network Security
- 11/28: Introduction to Data and Network Security [PDF]
- Security literacy
- Cyber war
- what is security
- Linux
- 12/05: Linux
- Linux File System
- cd
- ls
- mkdir, touch, man
- 12/19: Introduction to Data and Network Security (Finished) and Security Mechanism Overview [PDF]
- Security Attacks
- Secure Model
- Access Control
- Privacy
- Defence in depth
- Prevention methods: Authentication
- 12/26: Introduction to Cryptography and Calssic Cryptography [PDF]
- Monoalphabetic Substitution Ciphers
- Caesar
- General Caesar cipher
- Brute Force Attack to Caesar
- Frequency Analysis Attack to Caesar
- Definition of some keyword in cryptology field
- Playfair
- 01/17: Introduction to Cryptography and Calssic Cryptography
- OTP
- Steganography
- 01/24-1: Introduction to Symmetric Ciphers (Started) [PDF]
- Block cipher vs. stream cipher
- Ideal block cipher
- Substitution-permutation network (SPN)
- Confusion and Diffusion
- Feistel cipher structure
- DES cipher basics
- DES Encryption steps
- Attack to and cryptoanalysis of DES
- 2DES and 3DES
- AES Encryption [SWF]
- 01/24-2: Introduction to Cryptography and Calssic Cryptography
- Linux
- 02/07: Introduction to Symmetric Ciphers (Finished) (helpful resource for deeper view to modes of operation [PPT])
- Why we need to mode of operation
- Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), Counter (CTR)
- Well-known ciphers
- 02/14: Introduction to Public Key Cryptography [PDF]
- Drawbacks (limitations) of symmetric ciphers
- Drawbacks of symmetric ciphers
- Public Key Cryptography Standard (PKCS)
- Public Key and Private Key
- Confidentiality, Digital signature and Key distribution using PKCS
- RSA algorithm
- Fundation of Modular Arithmetic
- RSA encryption and decryption
- 02/21: IDS [PDF]
- MAC and Hash Function (Started) [PDF]
- Linux hash functions
- Hash function
- MAC
- Difference between having integrity with
- MAC and Hash Function (Continiue ...)
- Mac security
- Collision resistance (Weak and Strong)
- Hash function applications
- Hash vs cryptography
- Birthday paradox attack
- Firewall: [PDF]
- Web Security [PDF]
Useful Resources
In this section you will introduce to so,e additional resources to read them when you have problem or challenges to discussion topics.
Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition)
Edward Skoudis (Author), Tom Liston (Author)
Best Student of week
Your firstname and lastname - 1
- More Info -
firatname and lastname - 2
- More Info -
Q&A
Piazza question and answer: IT2
© 2016 All Rights Reserved by Mohammad Reza Razian