Crypto codes in Network Information Security Illustration

Network Security Course Syllabus (COM 732.3 Pokhara University)

Course Title: Network Security
Course Code: COM 732.3 (For Bachelor’s of Engineering)
Credit: 3
Class Load: 3 hours


Course Objective of Network Security:
The course objective is to in part fundamental understanding of every facts of information security, from the basics to advanced cryptography, authentication, secure web, email services and emerging best practices with security standards.
Course Contents:
1. Introduction                                                                                                              [4hrs]
Security, Attacks, Attack Types, Viruses, Worms, Trojan, Horses, Hacker, Techniques, Security Services, Network Security Model, Security Levels, Internet Standard and RFCs
2. Conventional Encryption/Secret Key Cryptography                                            [9hrs]
Cryptography, Cryptanalysis, Cipher Structure, Encryption Algorithms, Data Encryption Standard (DES), International Data Encryption Algorithm (IDEA), Advanced Encryption Standard (ASE), Modes of Operation, Symmetric Block Ciphers, Cipher Block Chaining (CBC), Multiple Encryption DES
3. Public Key Cryptography and Message Digests                                                   [10hrs]
Hashes, Secure Hash Algorithm (SHA), Encryption with Message Digest (MD), MD5, Public Key Cryptography Principles, Public Key Cryptography Algorithms, RAS, Digital Signature Standard (DSS)
4. Authentication and Public Key Infrastructure (PKI)                                           [6hrs]
Overview of Authentication Systems (Password, Address, Cryptographic), Security Handshake Pitfalls, Authentication Standards, Kerberos, PKI Turst Models, Revocation, Realtime Communication Security
5. Network  Security                                                                                                     [8hrs]
Email Security, PGP, S/MIME, IPSecurity, Architecture, Authentication Header, Security Association, Key Management, Web Security, Secure Socket Layer (SSL), Transport Layer Security (TLS), Secure Electronic Transaction (SET), Network Management Security, Different versions of SNMPs
6. System Wide Security                                                                                               [3hrs]
Intruders, Viruses, Firewall, DMZ
7. Other Issues                                                                                                               [5hrs]
Legal Issues, Various criminal laws related to information Security, Privacy Issues, Policy, Importance of Policy, Various Policies, Risk Management, Measure Risks, Information Security Processes.

  1. Charlie Kaufman, Radia perlman, Mike Speciner, Network Security Private Communication in Public World, Second Edition, 2004, Pearson.
  2. William Stallings, Network Security Essentials-Applications & Standards, Pearson.
  3. Eric Maiwald, Fundamentals of Network Security, 2004, Osborne/McGraw Hill, Dreamtech Press
  4. Matt Bishop, Computer Security, Art and Science, Pearson

About The Author

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top