Syllabus Ns (Network Security)
Syllabus Ns (Network Security)
Syllabus Ns (Network Security)
B.Teech.
Semes
S ter V
NETTWORK SECURITTY
CY50
009
EFFECTTIVE FRO
OM June‐2
2023
Sylllabus verrsion: 1.00
Subject
Subject Title
Code
CY5009 Network Security
Course Outcomes:
Upon completion of the course, the student will be able to:
CO1: Design solutions to provide confidentiality and integrity.
CO2: Develop solutions to provide user authentication.
CO3: Design secure web and email communication.
CO4: Create secure wireless communication.
CO5: Develop solutions based on secure IP communication.
CO6: Design secure network using Intrusion Detection System and firewall.
Unit – II
2 Key Distribution and User Authentication 6
Symmetric Key Distribution Using Symmetric Encryption, Kerberos,
Key Distribution Using Asymmetric Encryption, X.509 Certificates,
Public‐Key Infrastructure, Federated Identity Management
Unit – III
3 Transport‐Level Security and Email Security 6
Web Security Considerations, Secure Socket Layer and Transport Layer
Security, HTTPS, Secure Shell (SSH), Pretty Good Privacy, S/MIME,
Domain Keys Identified Mail
Unit – IV
4 Wireless Network Security 6
IEEE 802.11 Wireless LAN Overview, IEEE 802.11i Wireless LAN
Security, Wireless Application Protocol Overview, Wireless Transport
Layer Security, WAP End‐to‐End Security
Unit – V
5 IP Security 6
IP Security Overview, IP Security Policy, Encapsulating Security
Payload, Combining Security Associations, Internet Key Exchange,
Cryptographic Suites
Unit – VI
6 Intruders and Firewalls 6
Intruders, Intrusion Detection, Password Management, The Need for
Firewalls, Firewall Characteristics, Types of Firewalls, Firewall Basing,
Firewall Location and Configurations
Text book:
1. William Stallings, "Network Security Essentials: Applications and Standards",
Pearson.
Reference books:
1. Bernard Menezes, "Network Security and Cryptography", Cengage Learning
2. William Stalling, "Cryptography and Network Security", Pearson
3. Behrouz A. Forouzan, Debdeep Mukhopadhyay, "Cryptography and Network
Security", McGraw Hill (Indian Edition)
4. Straub, Detmar W., Goodman, Seymour, Baskerville, Richard L, "Information
Security : Policy, Processes, and Practices", PHI
5. Atul Kahate, "Cryptography and Network Security", McGraw Hill
Sr.
Network Security(Practical’s) Hours
No.
Programme Outcomes:
PO1 ✓ ✓ ✓ ✓
PO2 ✓ ✓ ✓ ✓ ✓ ✓
PO3
✓ ✓ ✓ ✓ ✓
PO4
✓ ✓ ✓
PO5
✓ ✓ ✓
PO6
PO7
PO8
PO9
PO10
PO11
PO12