IT Engineering 2 (IT2)

About Us.

Information Technology Engineering 2 (IT2) (Educational Course) Course Homepage

Tuesdays 08:00 - 10:00 and Wednesday 15:00 - 16:00
Room: 109
TAs class: Will be added
Room: 109

Instructors

Instructor: Mohammad Reza Razian
Website: mrazian.com
Email: [MyFamilyName].mr [AT] Gmail
TA:
Mr. Salmani (TA's Head)(mehdismi70[AT]Gmail)
Mr. Zolfaghari (mzolfaghari994[AT]Gmail)
Mrs. Mostafayi (ghazaaleh_mo[AT]yahoo)
Mr. Afsahi (asef.afsahi[AT]Gmail)

Description:

Network Security is the process of taking physical and software preventative measures to protect the underlying networking infrastructure from unauthorized access, misuse, malfunction, modification, destruction, or improper disclosure, thereby creating a secure platform for computers, users and programs to perform ... SANS Institute: Network Security Resources https://www.sans.org/network-security/

Prerequisites

Computer Networks or an equivalent course

Resources

    Course References:
  • Cryptography and Network Security Principles and Practices, By William Stallings 7th Edition
  • Introduction to Computer Security, By Matt Bishop

Policies:

Grading policy is as follows. This is tentative.
7 Homework
2 Weekly Quiz
11 Final
1 Discipline (Class Participation and Following rules)

There will be no exceptions to the following rules:

  1. If you turn in your assignment one or more day late you will loose grade.

  2. Cell Phones must be turned off (or be silent) when you are in class.

  3. Policy for cheating/copying HWs. Providing your assignment to someone else is considered cheatingon your behalf. All participants will receive -100 for the task at hand.

  4. Your dress should be adopted to Dress code of Semnan University.

Important Info

TA section

Homework
  • Homework 2 - v1.0 - VoIP security: [PDF] Due Azar 12th, 23:59:59
  • Homework 1 - v1.0 - Software Cracking and Buffer Overflow: [PDF] and another files (In Piazza), Due Aban 09th, 23:59:59
  • Homework 0 - v1.0: [PDF] Due Mehr 16th, 23:59:59

Course Material
  1. 07/04: Introduction to Course
    1. Introduction to Course
    2. Introduction to Data and Network Security [PDF]
    3. Security literacy
    4. Cyber war
    5. what is security
  2. 07/05: Introduction to Data and Network Security
    1. Definition of Security (C.I.A)
    2. OSI Model
    3. Security Poilicy, Service, Mechanism
    4. Vulnerability, Intrusion, Attack
    5. Active and Passive Attacks
    6. Introduction to Linux
  3. 07/11: Introduction to Data and Network Security [PDF]
    1. Defence in depth
    2. Prevention methods: Authentication
    3. Intrusion Detection System
    4. Malware and Different types of it (Virus, Worm and ...)
  4. 07/12: Security Mechanism Overview (Finished)
    1. Honeypot
    2. Backup
    3. Definition of some keyword in cryptology field
  5. 07/18: Introduction to Cryptography and Calssic Cryptography [PDF]
    1. Introduction to Cryptography and Calssic Cryptography
    2. Definition of some keyword in cryptology field
  6. 07/19: Introduction to Cryptography and Calssic Cryptography (Continued ...)
    1. General Caesar cipher
    2. Brute Force Attack to Caesar
    3. Frequency Analysis Attack to Caesar
    4. Definition of some keyword in cryptology field
    5. Playfair
  7. 07/25: Introduction to Symmetric Ciphers (Started) [PDF]
    1. Block cipher vs. stream cipher
    2. Ideal block cipher
    3. Substitution-permutation network (SPN)
    4. Confusion and Diffusion
    5. Feistel cipher structure
    6. DES cipher basics
  8. 08/02: Introduction to Symmetric Ciphers (Continiue ...)
    1. DES Encryption steps
  9. 08/03: Introduction to Symmetric Ciphers (Continiue ...)
    1. DES Encryption steps
    2. Attack to and cryptoanalysis of DES
    3. 2DES and 3DES
    4. AES Encryption [SWF]
  10. 08/09: Introduction to Symmetric Ciphers (Finished) (helpful resource for deeper view to modes of operation [PPT])
    1. Why we need to mode of operation
    2. Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), Counter (CTR)

    3. Well-known ciphers
  11. 08/16,17: Introduction to Public Key Cryptography [PDF]
    1. RSA algorithm
    2. Fundation of Modular Arithmetic
  12. 08/23,24: Introduction to Public Key Cryptography
    1. Fundation of Modular Arithmetic
    2. RSA Proof of Correctness
    3. RSA encryption and decryption
    4. Attacks to RSA
    5. Diffie Hellman key exchange
  13. 08/30: Public Key (Finished)
    1. Truth of RSA
    2. Diffie Hellman
  14. 09/01: Intrusion Detection System [PDF]
    1. History
    2. FP and FN
    3. Functions of IDS
  15. 09/21,22,23-1,23-2: MAC and Hash Function (Started) [PDF]
    1. Linux hash functions
    2. Hash function
    3. MAC
    4. Mac security
    5. Collision resistance (Weak and Strong)
    6. Hash function applications
    7. Hash vs cryptography
    8. Birthday paradox attack
    9. HMAC
    1. DigitSign and PKI: [PDF]
  16. Firewall: [PDF]
  17. Web Security: [PDF]
Useful Resources

In this section you will get familiar to additional resources. These resources help you when have problem or challenges to discussion topics or assigments.

Cryptography and Network Security (7th Edition)
William Stalling
Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition)
Edward Skoudis (Author), Tom Liston (Author)
CEH v9: Certified Ethical Hacker Version 9 Study Guide 3rd Edition
by Oriyano (Author)
Best Student of week

Your firstname and lastname - 1

- More Info -

firatname and lastname - 2

- More Info -

Q&A

Piazza question and answer: IT2