T. Andrew Yang Email:
yang@uhcl.edu Web page:
http://sce.uhcl.edu/yang/ Tel.: (281) 283-3835 |
Last updated: 7/24/2012: updated schedule and slides 7/10/2012: updated schedule and slides 6/26/2012: updated schedule 6/19/2012: slides
updated 6/14/2012: Cisco
resources, slides updated 6/8/2012: topics
rescheduled 6/4/2012: first published |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CSCI 5235 Network Security
Time & Classroom Tues.
& Thur. 6-8:30pm (Delta 202) Course Prerequisite:
CSCI5233 Computer Security and CSCI4132 Network Protocols (or csci5132
Internet Protocols), or the instructor’s
approval. Course Objectives:
This course provides an essential study of computer security issues and
methods in networking systems. Topics to be covered include review of
networking, advanced cryptography, access control, distributed
authentication, TCP/IP security, firewalls, IPSec, Virtual Private Networks,
intrusion detection systems, and advanced topics such as wireless security,
identity management, etc. Class Format: Lectures
are combined with discussions and, if applicable, student presentations and
discussions of advanced topics. Students are expected to be active
participants, by studying the relevant chapters and/or research papers, and
participating at in-class discussions. Learning Outcomes: The student, after having successfully completed
the class, should be able to 1.
Understand fundamental
security issues in computer networks 2.
Understand the common
mechanisms used in securing a network 3.
Design a TCP/IP network
with IP Security 4.
Design and deploy
firewalls to secure a private network 5.
Design and deploy a
virtual private network to secure remote connections 6.
Select appropriate
methods to detect and counter intrusions to a network 7.
Understand other
advanced issues related to network security Instructor:
Dr. T. A. Yang
Required Text:
+ Instructor's handout and Web-based resources
RFC 2828 Internet
Security Glossary. R. Shirey. May 2000. To
find a particular RFC, visit the RFC Search site. o
Network
Security Baseline (2008, local copy) o
IP Addressing Services – Protecting
Your Core: Infrastructure Protection Access Control Lists Transit
Access Control Lists: Filtering at Your Edge o
Cisco IOS Commands
Master List (Release 12.4): http://www.cisco.com/en/US/docs/ios/mcl/124mainlinemcl/124_book.html
o
Cisco Security Appliance
Command Line Configuration Guide, Version 8.0: http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/conf_gd.html o
Configuration Guide for
the Cisco Secure PIX Firewall Version 6.0: http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_60/config/index.htm
o
PIX Command Reference: http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094885.shtml
o
Cisco Command Summary: http://networking.ringofsaturn.com/Cisco/ciscocommandguide.php
o
Other useful sites:
For fundamental
knowledge about computer cryptography, visit the CSCI5233 class at http://sce.uhcl.edu/yang/teaching/currentCourses.htm
to review the lecture notes/slides. Check out the research papers
about WLAN security, mobile security, etc. by clicking this link.
·
NT account information at: http://sce.uhcl.edu/accountSearch.html ·
All the software that is
available for use in the NT labs can be found at the following web pages: http://sce.uhcl.edu/NTLabIntroduction.asp.
Grading
Scale:
Projects: The
projects will involve the design and implementation of networking protocols
and/or application. Students are expected to employ the theories and
techniques learned in the class to design the system. Network simulation
environments, such as Wire Shark and NS-2, may be used in implementing the
projects. Details
of the projects are available at Assignments
& Projects.
Both
analytic and synthetic abilities will be tested. Being able to apply the
learned knowledge toward problem solving is highly emphasized in the
tests. Assignments
and projects will be posted at the class web site. Assignments & projects
are due before the beginning of the class on the due day. See Topics and Notes for the due dates. NOTE:
Unless otherwise specified, all assignments and projects are individual
work. Students
should take caution not to violate the academic honesty policies. For
details about the policy, click this
link. a. Identification page: All assignments must have your
name, and course name/number/section number (e.g., CSCI5235-01) at the top of
the first page. b. Proper stapling: Staple all the pages together
at the top-left corner. NOTE: Do not use paper clips. c. Order ! Order! Arrange the solutions following
the sequence of the questions. Write the question number at the top-right
corner of each page. d. Word processing: It is required that you type
your reports (e.g., print them using a printer). Use a word processor and
appropriate typesetting and drawing tools to do the assignments. Spell-check
the whole document before printing it. You may lose points due to spelling or
grammatical errors. Attendance Policy: You
are expected to attend all classes. If you ever miss a class, it is your
responsibility to get hold of whatever may have been discussed in the class. Instructor's
Notes:
Go
to the Index |