IT Engineering 2 (IT2)
About Us.
Information Technology Engineering 2 (IT2) (Educational Course) Course Homepage
Tuesdays 08:00 - 10:00 and Wednesday 15:00 - 16:00Room: 109
TAs class: Will be added
Room: 109
Instructors
- Instructor: Mohammad Reza Razian
- Website: mrazian.com
- Email: [MyFamilyName].mr [AT] Gmail
- TA:
- Mr. Salmani (TA's Head)(mehdismi70[AT]Gmail)
- Mr. Zolfaghari (mzolfaghari994[AT]Gmail)
- Mrs. Mostafayi (ghazaaleh_mo[AT]yahoo)
- Mr. Afsahi (asef.afsahi[AT]Gmail)
Description:
Network Security is the process of taking physical and software preventative measures to protect the underlying networking infrastructure from unauthorized access, misuse, malfunction, modification, destruction, or improper disclosure, thereby creating a secure platform for computers, users and programs to perform ... SANS Institute: Network Security Resources https://www.sans.org/network-security/Prerequisites
Computer Networks or an equivalent courseResources
-
Course References:
- Cryptography and Network Security Principles and Practices, By William Stallings 7th Edition
- Introduction to Computer Security, By Matt Bishop
Policies:
Grading policy is as follows. This is tentative.7 Homework
2 Weekly Quiz
11 Final
1 Discipline (Class Participation and Following rules)
There will be no exceptions to the following rules:
If you turn in your assignment one or more day late you will loose grade.
Cell Phones must be turned off (or be silent) when you are in class.
Policy for cheating/copying HWs. Providing your assignment to someone else is considered cheatingon your behalf. All participants will receive -100 for the task at hand.
Your dress should be adopted to Dress code of Semnan University.
TA section
- Crack: [RAR]
Homework
Course Material
- 07/04: Introduction to Course
- Introduction to Course
- Introduction to Data and Network Security [PDF]
- Security literacy
- Cyber war
- what is security
- 07/05: Introduction to Data and Network Security
- Definition of Security (C.I.A)
- OSI Model
- Security Poilicy, Service, Mechanism
- Vulnerability, Intrusion, Attack
- Active and Passive Attacks
- Introduction to Linux
- 07/11: Introduction to Data and Network Security [PDF]
- Defence in depth
- Prevention methods: Authentication
- Intrusion Detection System
- Malware and Different types of it (Virus, Worm and ...)
- 07/12: Security Mechanism Overview (Finished)
- Honeypot
- Backup
- Definition of some keyword in cryptology field
- 07/18: Introduction to Cryptography and Calssic Cryptography [PDF]
- Introduction to Cryptography and Calssic Cryptography
- Definition of some keyword in cryptology field
- 07/19: Introduction to Cryptography and Calssic Cryptography (Continued ...)
- General Caesar cipher
- Brute Force Attack to Caesar
- Frequency Analysis Attack to Caesar
- Definition of some keyword in cryptology field
- Playfair
- 07/25: Introduction to Symmetric Ciphers (Started) [PDF]
- Block cipher vs. stream cipher
- Ideal block cipher
- Substitution-permutation network (SPN)
- Confusion and Diffusion
- Feistel cipher structure
- DES cipher basics
- 08/02: Introduction to Symmetric Ciphers (Continiue ...)
- DES Encryption steps
- 08/03: Introduction to Symmetric Ciphers (Continiue ...)
- DES Encryption steps
- Attack to and cryptoanalysis of DES
- 2DES and 3DES
- AES Encryption [SWF]
- 08/09: Introduction to Symmetric Ciphers (Finished) (helpful resource for deeper view to modes of operation [PPT])
- Why we need to mode of operation
- Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), Counter (CTR)
- Well-known ciphers
- 08/16,17: Introduction to Public Key Cryptography [PDF]
- RSA algorithm
- Fundation of Modular Arithmetic
- 08/23,24: Introduction to Public Key Cryptography
- Fundation of Modular Arithmetic
- RSA Proof of Correctness
- RSA encryption and decryption
- Attacks to RSA
- Diffie Hellman key exchange
- 08/30: Public Key (Finished)
- Truth of RSA
- Diffie Hellman
- 09/01: Intrusion Detection System [PDF]
- History
- FP and FN
- Functions of IDS
- 09/21,22,23-1,23-2: MAC and Hash Function (Started) [PDF]
- Linux hash functions
- Hash function
- MAC
- Mac security
- Collision resistance (Weak and Strong)
- Hash function applications
- Hash vs cryptography
- Birthday paradox attack
- HMAC
- DigitSign and PKI: [PDF]
- Firewall: [PDF]
- Web Security: [PDF]
Useful Resources
In this section you will get familiar to additional resources. These resources help you when have problem or challenges to discussion topics or assigments.
Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition)
Edward Skoudis (Author), Tom Liston (Author)
Best Student of week
Your firstname and lastname - 1
- More Info -
firatname and lastname - 2
- More Info -
Q&A
Piazza question and answer: IT2
© 2016 All Rights Reserved by Mohammad Reza Razian