Download presentation
Presentation is loading. Please wait.
Published byMegan Day Modified over 9 years ago
1
Acknowledgements: William Stallings.William Stallings All rights Reserved Session 0 Syllabus Network Security Essentials Applications and Standards 5 th edition William Stallings Prentice Hall 2014 1 Network Security
2
Acknowledgements: William Stallings.William Stallings All rights Reserved Course Logistics Course TitleCSC 188 A – Intro to Network Security & CSC 288 A – Network Security – Fall 2014 DurationSeptember 2, 2014 – December 20, 2014 (see Fall 2014 Calendar) Fall 2014 Calendar DaysTuesday and Thursday 8:05PM-9:30PM Adams Hall - Room 0019 CRN94427, 94006 Credits3.0 InstructorVincent Costa E-Mailvincent.costa@hofstra.edu IM, Google+papacosta@gmail.com Office HoursTuesdays, 7-8PM or email or Google+ 2
3
Acknowledgements: William Stallings.William Stallings All rights Reserved Course Overview and Description A survey of current issues, techniques, software, hardware and architectures related to network security. Examination of the protocols used for Internet services, their vulnerabilities and how they can be secured. Analysis of firewall design, cryptographic techniques, intrusion detection, port scanning, viruses, Trojan horses and denial of services attacks. Basic principles of secure networking and application design will be studied and discussed. Prerequisites: None Note: This is a cross listed course, which means the audience is both graduate and undergraduate. 3
4
Acknowledgements: William Stallings.William Stallings All rights Reserved Required Text William Stallings, Network Security Essentials: Applications and Standards –5/e, Prentice-Hall, 2014, ISBN-13: 9780133370430 William Stallings, Network Security Essentials: Applications and Standards –5/e, Prentice-Hall, 2014, ISBN-13: 9780133370430 This text retails for $101.80. An alternative is to use the Online eTextbook, which is only $40.99. Online eTextbook 4
5
Acknowledgements: William Stallings.William Stallings All rights Reserved Reference Cheswick, W. and Bellovin, S., Firewalls and Network Security: Repelling the Wiley Hacker, Addison Wesley, 2003, 464 pp., ISBN 0-201- 63466-4 William Stallings, Cryptography and Network Security: Principles and Practice, 6/e, Prentice Hall, 2014, 731 pp., ISBN-13: 978-0-13-335469-0 Bruce Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2/e, Wiley, 1996, 784 pp., ISBN 0-47-111709-9 5
6
Acknowledgements: William Stallings.William Stallings All rights Reserved Grading There will be several assignments during the class, three of these will count towards your grade (you’ll get advanced notice). There will also be a mid-term and an end-term exam. These will be assigned about a week before the due date. Class participation and involvement counts! This should be an interactive experience even though we are remote. Please feel free to share information and ideas. Be willing to assist others. There will be a final project or paper due toward the end of the semester. The purpose of this is to encourage extensive research in the network security field. (This is for Graduate Students only) There will be no makeup tests (mid-term and end-term exams) or extended deadlines. Submitting the test on an alternative date is at the discretion of the instructor, but prior arrangements should be made (unless, in case of emergencies, when proper documentation should be provided). 6
7
Acknowledgements: William Stallings.William Stallings All rights Reserved Point Allocation 7 Undergrad AssessmentPoints Assignments 1-35% each Mid-Term40% End-Term40% Participation5% Graduate AssessmentPoints Assignments 1-35% each Mid-Term25% End-Term (Presentation)25% Participation5% Final Paper/Project30%
8
Acknowledgements: William Stallings.William Stallings All rights Reserved Attendance Attendance will be taken and is mandatory. This is a hands-on, interactive class. If you do not attend the sessions regularly, you will have a high probability of failing. Participation is important to fully appreciate the subject. If you cannot keep up with the sessions for some reason (travel, business commitments, etc.), please let me know 8
9
Acknowledgements: William Stallings.William Stallings All rights Reserved Course Outline 9 SessionsDescription Session 0&1Course Outline, Introduction Session 2Conventional Encryption (Part 1) Session 3Conventional Encryption (Part 2) Session 4Public Key Encryption (Part 1) Session 5Public Key Encryption (Part 2) Session 6Authentication Applications Session 7Email Security Session 8IP Security, Networking, Tools (Part 1) Session 9IP Security, Networking, Tools (Part 2) Session 10Firewalls Session 11Web Security Session 12Intruders Session 13Viruses
10
Acknowledgements: William Stallings.William Stallings All rights Reserved Programming Assignments There may be some programming assignments but these will probably involve examining and modifying public domain code (mostly Python). The programs will be graded 80% on correctness and 20% on style (general structure, comments, etc.) 10
11
Acknowledgements: William Stallings.William Stallings All rights Reserved Slides, Links and News All course material will be distributed through Hofstra’s Blackboard. There will be two classes per week. However, the material will not be available until after the class. These are contained under Course Documents. Slides will be available in PowerPoint format and PDF. There will also be helpful and interesting links along with news items in the Discussion Board and the Wiki. 11
12
Acknowledgements: William Stallings.William Stallings All rights Reserved Class Rules Unless specifically stated otherwise, assignments are to be completed individually. You are encouraged to discuss the understanding of a particular issue or class material with fellow students, but code and solutions have to be your own effort. Academic honesty is to be taken very seriously. If you submit work that references another person’s efforts, then you must properly attribute it to that person, otherwise it is plagiarism and you will receive zero credits. 12
13
Acknowledgements: William Stallings.William Stallings All rights Reserved Class Rules This is not a course on how to crack systems, however, it is practically impossible for us to avoid discussing security weaknesses in existing systems. Any attempt to use such information to gain unauthorized access to any system will be dealt with harshly. 13
14
Acknowledgements: William Stallings.William Stallings All rights Reserved Simple Ground Rules Cell Phones – “Vibrate” or “Airplane Mode” Distractions – Twitter, Facebook, Mail, YouTube, Google, DiigoDiigo Smart Spaces – Twitter, Mail, YouTube, Google, DiigoDiigo Don’t Cheat – selfishness Collaborate – selflessness Be Mindfall – Observe, Absorb, Don’t Judge No Hacking – Be respectful 14
15
Acknowledgements: William Stallings.William Stallings All rights Reserved Questions Any questions? There are no dumb questions Use the Internet for questions (IM, Discussion Board, Email) if necessary 15
16
Acknowledgements: William Stallings.William Stallings All rights Reserved Welcome! So welcome to the class. I hope you enjoy it. Work hard and have fun! 16
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.