T. Andrew Yang

Email: yang@uhcl.edu

Web:  http://cse.uhcl.edu/yang/

Tel.: (281) 283-3835 

Last updated:

 

3/25/2019: revised schedule (weeks 9-11)

2/12/2019: updated lab links

1/23/2019: corrected ‘Related Links’

1/21/2019: first posted

CSCI 4391-03

Select Topic in Computer Science: Network Defenses

Spring 2019  (1/225/6 + final exam)

·       Important Information:

o   (Required) Join the discussion group for class-related announcements and discussions: https://groups.google.com/d/forum/csci4391spring2019

Class Notes, Topics & Schedule

- Print out the class notes for the day and bring them to the class.

Assignments & Projects

TA Office Hours

Professor Office Hours


Time & Classroom

Tues. & Thur., 1:00pm 2:20pm (Delta 201)

Course Description: Topics to be covered include review of basic concepts and principles related to network defense (networking protocols and cryptography, mission assurance, network policy development and enforcement, etc.), secure network development (network access control, DMZs / proxy servers, network hardening, implementing firewalls, VPNs, etc.), and advanced network defense techniques (honeypots, honeynets, network monitoring, implementing IDS/IPS, etc.)

Prerequisite: Basic understanding of networking technologies (e.g., CSCI 4312 Network Protocols, ITEC 3365 Network Fundamentals) and introduction to cybersecurity (e.g., CSCI 4391 Select Topic - Cyber Attacks and Defense, ITEC 3388 Cyber Security I), or instructor’s approval

Course Objectives: This course provides an essential study of network defense, related vulnerability and security issues, and common tools available for network packet analysis and exploitations.

 

Learning Outcome:

After having successfully completed the class, one should be able to

 

1.     Understand fundamental security issues in computer networks

2.     Understand the common mechanisms used in securing a network

3.     Design a TCP/IP network with IP Security

4.     Design and deploy firewalls to secure a private network

5.     Design and deploy a virtual private network to secure remote connections

6.     Select appropriate methods to detect and counter intrusions to a network

7.     Understand other advanced issues related to network security

Class Format:

Lectures are combined with discussions and hands-on projects.

Students are expected to be active participants, by studying the relevant chapters and/or research papers, and participating at in-class discussions.

A note about Bloom's Taxonomy and your learning

http://blog.curriculet.com/wp-content/uploads/Blooms-Taxonomy.png


Instructor: Dr. T. Andrew Yang

(office) Delta 174

(phone#) (281) 283-3835 (Please leave a message if not available.)

NOTE: If the suite office (D161) is locked, you may use the phone outside the office to call me (by entering the extension 3835).

(email address) yang@uhcl.edu

Important notes:

Emails without a subject line or a signature will be considered as potentially malicious and be discarded. Here is a sample subject line: "CSCI 1320 assignment #1, question 3".

Although email messages tend to be informal, please check the grammar and spelling of your messages to ensure their legibility.

(Web site)  http://cse.uhcl.edu/yang
NOTE: Find the assignments and/or projects at the Assignments & Projects page.

Office Hours : See http://cse.uhcl.edu/yang/teaching/officeHours.htm

NOTE: In addition, you are highly encouraged to send your questions to me by e-mails (yang@uhcl.edu). Try to provide sufficient details in your email message, such as the problem(s) you have encountered, the solution(s) you have tried, and the outcome you have got from these solution(s).

Teaching assistant info and office hours:

 

TA -  Mohamed Nasardeen, Mohamed Ifthikhar; MohamedNasarM9652@UHCL.edu

Office Hours 

Monday:        8 am – 1 pm       

Tuesday:       11 am – 1 pm  

Wednesday:  8 am - 12 pm      
Thursday:      9 am -  12 pm

 

Location Delta 2nd floor PC lab

Note: Contact the instructor (yang@uhcl.edu) immediately if you have any problem with the TA or the office hours.

 


Required Text:

·       E: Chuck Easttom. Network Defense and Countermeasures: Principles and Practices (3rd Edition) (Pearson IT Cybersecurity Curriculum (ITCC)) 3rd Edition, Pearson, 2018. ISBN-10: 0789759969; ISBN-13: 978-0789759962

·       D: Wenliang Du. Computer Security: A Hands-on Approach, CreateSpace Independent Publishing Platform; 1st edition (October 12, 2017). ISBN-10: 154836794X; ISBN-13: 978-1548367947

+ Instructor's handouts in the class and/or on the Web

 

Reference Books

·       Michael Gregg, The Network Security Test Lab: a step-by-step guide, Wiley, 2015. ISBN-10: 1118987055; ISBN-13: 978-1118987056

·       James Forshaw, Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation, No Starch Press, 2017. ISBN-10: 1593277504; ISBN-13: 978-1593277505

·       Chris Sander, Practical Packet Analysis, 3E: Using Wireshark to Solve Real-World Network Problems, 3rd Edition, No Starch Press, 2017. ISBN-10: 1593278020; ISBN-13: 978-1593278021

·       NainarRamdoss, and Orzach, Network Analysis Using Wireshark 2 Cookbook: Practical recipes to analyze and secure your network using Wireshark 2, 2nd Edition, Packt Publishing, 2018. ISBN-10: 1786461676; ISBN-13: 978-1786461674

·       Matthew Monte, Network Attacks and Exploitation: A Framework, Wiley, 2015. ISBN-10: 1118987128; ISBN-13: 978-1118987124

 

Topics and Notes
NOTE: The following schedule will be adhered to as closely as possible, although changes are probable. Always check with your instructor if you are not sure what would be covered next week.

week (dates)

Topics & Slides (Book: Chapters)

Due Dates

1 (1/22, 24)

-       Syllabus; Survey; Pre-test

-       Unit 1: Introduction to Network Security (E.Ch 1)

2 (1/29, 31)

-       Unit 2: Network Attacks (E.Ch 2)

-       Unit dns: DNS and attacks (D.Ch 15)

 

3 (2/5, 7)

-       Unit 3: Cryptography (E.Ch 6)

 

4 (2/12, 14)

-       Unit ss: Security Services

-       Unit 4: Network Defense Principles

-       Unit 6: Network Analysis Tools (self-study)

Lab 1 (2/12)

-       Labs are due on Tuesdays.

5 (2/19, 21)

-       Unit 7: Network Access Control

-       Unit 8: Firewalls, Proxy Servers (E.Ch 3)

§  Unit fh: Firewalls & Hacking (D.Ch 14)

-       Unit 9: Implementing Firewall, DMZs (E.Ch 3)

 

6 (2/26, 28)

-       Unit 10: Application-layer security: HTTPS (D.Ch 18)

Lab 2

7 (3/5, 7)

Review for midterm exam

Exam

 

Midterm Exam (3/7)

8 (3/12, 14)

Spring break; no class meetings

9 (3/19, 21)

-       In-class lab

In-class lab #1 (3/19)

10 (3/26, 28)

-       Unit 11: Network-layer security: IPSec

-       Unit impVPN: Implementing VPNs (E.Ch 7)

Lab 3

11 (4/2, 4)

-       Unit 12: Network Monitoring (IDS/IPS, Honeypots and Honeynets) (E.Ch 5)

 

12 (4/9, 11)

-       Unit 5: Operating System Hardening (E.Ch 8)

Lab 4

13 (4/16, 18)

-       Unit 16: Network Access Control (NAC) and Policy Development & Enforcement

§  openNAC the Network Access Control solution: video

§  Network access control for corporate users: video

§  ForeScout Network Access Control: video

§  Cisco Identity Services Engine (ISE)

§  Threat-Centric Network Access Control (NAC) with ISE 2.1: video

§  Network Access Control - CompTIA Security+ SY0-501 - 2.1: video

§  Network Access Control (NAC): ppt

 

14 (4/23, 25)

-       Unit 17: Network Operational Procedures

-       Unit 18: Mission Assurance

Lab 5

15 (4/30, 5/2)

In-class lab

-       Review for final exam

-       Take your online evaluation at https://apps.uhcl.edu/OnlineEvals

In-class lab #2 (4/30)

Final exam week

Final exam (Thur., 5/9, 1:00pm3:00pm)

Final exam

 

Evaluation:

category

Percentage

Take-home labs (5% each x 5)

25%

Midterm Exam (closed book)

25%

In-class labs (5% each x 2)

10%

Final exam (open book)

30%

Quizzes (2% each x 5)

10%

Total:

100%

++ Attendance Policy: You are expected to attend all classes. There will be no penalty for a person’s first two absences without documented excuse. 1% will be taken for each of the absences after the first two absences without documented excuses. Note: Being tardy is no excuse when a person is found to be absent from the class.

Note: If you ever miss a class, it is your responsibility to get hold of whatever may have been discussed in the class.

+++ Class Participation: Participating in the class is expected. You should ask or answer questions during the in-class or online discussions.

Grading Scale:

The accumulated points from all the categories determine a person's final grade. There will be no extra-credit projects.

Percentile

Grade

 

Percentile

Grade

90% or above

A

 

70% - 73%

C

87% - 89%

A-

 

67% - 69%

C-

84% - 86%

B+

 

64% - 66%

D+

80% - 83%

B

 

60% - 63%

D

77% - 79%

B-

 

57% - 59%

D-

74% - 76%

C+

 

Less than 57%

F

 

 

Tests & Exams:

Both analytic and synthetic abilities are emphasized. Being able to apply the learned knowledge toward problem solving is also highly emphasized in the tests. 

Unless due to unexpected, documented emergency, no make-up exams will be given. No make-up exams will be granted once the exams have been corrected and returned to the class.

Assignments and Late Penalty:

Assignments and projects will be posted at the class web site. Assignments & projects are due before the beginning of the class on the due day. See Topics and Notes for the due dates. 

Points will be deducted from late assignments: 20% for the first 24 hours after the due time, 40% for the next 24 hours, 70% for the third 24 hours, and 100% after that. No extension will be granted except for documented emergency. Starting to work on the assignments as early as possible is always the best strategy.

 

Assignments Guidelines:

a. Identification page: All assignments must have your name, and course name/number/section number (e.g., CSCI 4391-03) at the top of the first page.

b. Proper stapling: Staple all the pages together at the top-left corner. NOTE: Do not use paper clips.

c. Order ! Order! Arrange the solutions following the sequence of the questions. Write the question number at the top-right corner of each page.

d. Word processing: It is required that you type your reports (e.g., print them using a printer). Use a word processor and appropriate typesetting and drawing tools to do the assignments. Spell-check the whole document before printing it. You may lose points due to spelling or grammatical errors. 

Projects:

The projects will involve the design and implementation of encryption/decryption algorithms and/or application of the algorithms to real-world problems. Students are expected to employ the theories and techniques learned in the class to design the system.

Details of the projects will be later made available at Assignments & Projects.

NOTE: Unless otherwise specified, all assignments and projects are individual work. Students should take caution not to violate the academic honesty policies. Check out the details at this link.

Instructor's Notes:

  1. Important: If you think you have lost some points due to grading errors, make sure you approach the instructor within a week after the assignment, project, or test has been returned to you.
  2. To get the most out of this class, you need to read the textbooks and spend time using computers regularly. Be prepared for a class by previewing the material to be covered in that class and participate in discussions and problem-solving exercises, if applicable, in the class.
  3. Understanding what are covered in classes and taking notes are essential for successfully passing the exams.

Related Links:

·       UHCL General Program Requirements (Undergraduate programs): https://catalog.uhcl.edu/current/undergraduate/undergraduate-information/general-program-requirements

 

·       The “6 Drop" rule in Texas (for undergraduate students): https://www.uhcl.edu/registrar/enrollment/six-drop-rule

 

·       ASSESSMENT FOR ACCREDITATION:

The School of Science and Computer Engineering may use assessment tools in this course and other courses for curriculum evaluation.  Educational assessment is defined as the systematic collection, interpretation, and use of information about student characteristics, educational environments, learning outcomes, and client satisfaction to improve program effectiveness, student performance, and professional success. This assessment will be related to the learning objectives for each course and individual student performance will be disaggregated relative to these objectives.  This disaggregated analysis will not impact student grades, but will provide faculty with detailed information that will be used to improve courses, curriculum, and student performance.

·       UHCL Disability Policy:

If you believe that you have a disability requiring an academic adjustment/auxiliary aid, please contact Disability Services by phone at 281-283-2648, or email disability@uhcl.edu, or go to the office in the Student Services Building (SSCB), Room 1.302.

The University of Houston System complies with Section 504 of the Rehabilitation Act of 1973 and the Americans with Disabilities Act of 1990, pertaining to the provision of reasonable academic adjustments/auxiliary aids for students with a disability. In accordance with Section 504 and ADA guidelines, each University within the System strives to provide reasonable academic adjustments/auxiliary aids to students who request and require them.

 

 

Go to the Index