T. Andrew Yang
|
July 12, 2010 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CSCI 5235 Network Security
Time & Classroom Mon.
& Wedn. 6-8:30pm (Delta 242) Course Prerequisite: CSCI5233 Computer Security and CSCI4132
Network Protocols (or csci5132 Internet Protocols), or the instructor’s
approval. Course Objectives: This course provides an essential study of computer
security issues and methods in networking systems. Topics to be covered
include review of networking, advanced cryptography, access control,
distributed authentication, TCP/IP security, firewalls, IPSec, Virtual
Private Networks, intrusion detection systems, and advanced topics such as
wireless security, identity management, etc. Class Format: Lectures are combined with discussions and, if
applicable, student presentations and discussions of advanced topics.
Students are expected to be active participants, by studying the relevant
chapters and/or research papers, and participating at in-class discussions. Learning Outcomes: The student, after having
successfully completed the class, should be able to 1.
Understand
fundamental security issues in computer networks 2.
Understand the
common mechanisms used in securing a network 3.
Design a TCP/IP
network with IP Security 4.
Design and
deploy firewalls to secure a private network 5.
Design and
deploy a virtual private network to secure remote connections 6.
Select
appropriate methods to detect and counter intrusions to a network 7.
Understand
other advanced issues related to network security Instructor:
Dr. T. A. Yang
Required Text:
+ Instructor's handout and Web-based resources
Safari Books Online is freely available to UH Clear Lake students. To access the Safari
database, visit the UHCL library database at http://prtl.uhcl.edu/portal/page/portal/LIB/HOME/DATABASES.
(Note: An UHCL account is needed if you use a computer outside the campus.) RFC 2828 Internet
Security Glossary. R. Shirey. May 2000. To find a
particular RFC, visit the RFC
Search site.
Symmetric
cryptography (S: Ch 2): 2a, 2b,
2c, 2d, 2e Public-key
cryptography (S: Ch3): 3a, 3b,
3c For other
fundamental knowledge about computer cryptography, visit the CSCI5233 class
at http://sce.uhcl.edu/yang/teaching/currentCourses.htm
to review the lecture notes/slides. Check out the
research papers about WLAN security, mobile security, etc. by clicking this.
Check
http://sce.cl.uh.edu/computing.asp
for lab information, open hours, FAQs, etc. ·
UNIX account information
at: http://sce.uhcl.edu/UnixLabFAQ/ ·
NT account information at: http://sce.uhcl.edu/accountSearch.html ·
All the
software that is available for use in the NT labs can be found at the
following web pages: http://sce.uhcl.edu/NTLabIntroduction.asp.
Grading
Scale:
Projects: The
projects will involve the design and implementation of networking protocols
and/or application. Students are expected to employ the theories and techniques
learned in the class to design the system. Network simulation environments,
such as NS-2, may be used in implementing the projects. Details
of the projects will be later made available at Assignments & Projects.
Both
analytic and synthetic abilities will be tested. Being able to apply the
learned knowledge toward problem solving is highly emphasized in the
tests. Assignments
and projects will be posted at the class web site. Assignments & projects
are due before the beginning of the class on the due day. See Topics and Notes for the due dates. NOTE:
Unless otherwise specified, all assignments and projects are individual
work. Students
should take caution not to violate the academic honesty policies. For
details about the policy, click this
link. a. Identification page: All assignments must
have your name, and course name/number/section number (e.g., CSCI5235-01) at
the top of the first page. b. Proper stapling: Staple all the
pages together at the top-left corner. NOTE: Do not use paper clips. c. Order ! Order! Arrange the solutions
following the sequence of the questions. Write the question number at the
top-right corner of each page. d. Word processing: It is required that
you type your reports (e.g., print them using a printer). Use a word
processor and appropriate typesetting and drawing tools to do the
assignments. Spell-check the whole document before printing it. You
may lose points due to spelling or grammatical errors. Attendance Policy: You
are expected to attend all classes. If you ever miss a class, it is your
responsibility to get hold of whatever may have been discussed in the class. Instructor's
Notes:
Go to
the Index |
Teaching Research o
Grants Services o
Centers
|