Network Security (NS)

About Us.

Network Security (Educational Course) Course Homepage

Thursday 15:00 - 18:00
Room: 201
TAs class: Thursday 07:45 - 08:45
Room: 109


Instructor: Mohammad Reza Razian
Email: [MyFamilyName].mr [AT] gmail
Mr. Vahdati (Email: ra.[TAFamilyName] [AT] Gmail


Network Security is the process of taking physical and software preventative measures to protect the underlying networking infrastructure from unauthorized access, misuse, malfunction, modification, destruction, or improper disclosure, thereby creating a secure platform for computers, users and programs to perform ... SANS Institute: Network Security Resources


Computer Networks or an equivalent course


    Course References:
  • Cryptography and Network Security Principles and Practices, By William Stallings. To access, click here


Grading policy is as follows (21 points). This is tentative.
6 Homework
10 Final
4 Midterm
1 Discipline (Class Participation and Following rules)

There will be no exceptions to the following rules:

  1. If you turn in your assignment one or more day late you will loose grade.

  2. Cell Phones must be turned off (or be silent) when you are in class.

  3. Policy for cheating/copying HWs. Providing your assignment to someone else is considered cheatingon your behalf. All participants will receive -100 for the task at hand.

  4. Your dress should be adopted to Dress code of Roshd-e-Danesh University.

Important Info

TA section
  • SQL Injection: [PDF]
  • Linux Introduction: [PDF]
  • Introduction to Kali Linux: [PDF]

  • Homework 2 - v1.0: [ZIP] Due Khordad 10th, 23:59:59
  • Homework 1 - v1.0: [PDF] Due Farvardin 17th, 23:59:59

Course Material
  1. 11/19: Introduction to Course
    1. Course resources
  2. 11/26: Introduction to Course
    1. Course paper
    2. Course assignment
    3. Introduction to Data and Network Security
Useful Resources

In this section you will introduce to so,e additional resources to read them when you have problem or challenges to discussion topics.

Network Security Essentials Applications and Standards (5th Edition)
William Stalling
Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition)
Edward Skoudis (Author), Tom Liston (Author)
CEH v9: Certified Ethical Hacker Version 9 Study Guide 3rd Edition
by Oriyano (Author)
Best Student of week

Your firstname and lastname - 1

- More Info -

firatname and lastname - 2

- More Info -


Piazza question and answer: NS Pizza