Draft ICTEd468 Network Security
Draft ICTEd468 Network Security
1. Course Description
The course, Network Security, is a major course for students studying towards acquiring the Bachelor in
Information Communication Technology Education (BICTE). This course aims to provide fundamental
skills needed to understand the internal and external security threats against a network, and to implement
security policies that will protect an organization’s information. The course objective is to impart
fundamental understanding of every facet of information security, security policies, cryptography,
authentication, security of network, system, user and program, identifying malware, perform vulnerability
analysis, auditing and attacks and responses to those attacks.
2. General Objectives
3. Course Outlines:
Practical Works
Visit an organization in your
local place and develop security
policies and procedures for that
organization. Present the
prepared report in front of your
classmates and the stakeholders
of that organization.
Explain the Public-Key Encryption 3. Cryptography
3.1 Basic Cryptography
Structure.
3.1.1 Symmetric Cryptosystems
Apply the Symmetric Cryptosystem. 3.1.2 Public Key Cryptography
3.1.3 Cryptographic Checksums
Explain the requirements for digital 3.1.4 Digital Signature
signature. 3.1.5 Hashing
3.2 Key Management
Explain the key management strategies. 3.2.1 Session and Interchange Keys
Develop cipher text 3.2.2 Key Exchange and Generation
3.2.3 Cryptographic Key Infrastructures
Identify and implement different types of 3.2.4 Storing and Revoking Keys
authentication methods 3.3 Cipher Techniques
3.3.1 Stream and Block Ciphers
7+5
3.3.2 Authenticated Encryption
3.4 Authentication
3.4.1 Authentication Basics
3.4.2 Passwords
3.4.3 Password Selection
3.4.4 Attacking Passwords
3.4.5 Password Aging
3.4.6 Biometrics
3.4.7 Multifactor Authentication
Practical Works
Write program to create cipher text
Write program to validate strong
password
Analyze the network infrastructure. 4. Security and Protection 8+10
Configure Network devices to enhance 4.1 Network Security
4.1.1 Network Infrastructure Analysis
security. 4.1.2 Encryption and Decryption in
Explain the different types of encryption Network
4.1.3 Firewall and its types
and decryption techniques in network. 4.1.4 Wired and Wireless Security
Identify and discuss the different 4.1.5 Virtual Private Network
4.2 System Security
strategies used to secure wired and 4.3 Email, Web and Database Security
wireless network. 4.4 User Security
4.4.1 Access
Explain the mechanism of System, User, 4.4.2 Files and Devices
Program, Email, Web and Database 4.4.3 Electronic Communications
4.5 Program Security
Security. 4.5.1 Common Security-Related
Install and configure the firewall to Programming Problems
Practical Works
achieve its benefits. Configure routers, switches, and
Make use of VPN to secure electronic other network devices to enhance
security.
communication. Assess and secure web applications
against common security threats.
Use tools like OWASP ZAP or Burp
Suite for web application security
testing.
Configure firewalls to control and
monitor network traffic.
Explain the different methods of intrusion 5. Threats, Assessment and Solutions 9+12
5.1 Malware
detection. 5.1.1 Introduction
Perform vulnerability analysis. 5.1.2 Trojan Horses
5.1.3 Computer Viruses
Conduct penetration testing. 5.1.4 Computer Worms
Know different types of Malicious 5.1.5 Bots and Botnets
5.1.6 Other Malware
Software. 5.1.7 Theory of Computer Viruses
Design an auditing system. 5.1.8 Defenses
5.2 Vulnerability Analysis
Engage in simulated attacks and develop 5.2.1 Penetration Studies
5.2.2 Vulnerability Classification
response techniques to overcome the
5.3 Auditing
attacks. 5.3.1 Definition
5.3.2 Designing an Auditing System
5.3.3 Examples: Auditing File Systems
5.4 Intrusion Detection
5.4.1 Principles
5.4.2 Basic Intrusion Detection
5.4.3 Organization of Intrusion Detection
Systems
5.5 Attacks and Responses
5.5.1 Attacks
5.5.2 Representing Attacks
5.5.3 Intrusion Response
5.5.4 Digital Forensics
Practical Works
Conduct vulnerability assessments
on systems and networks using tools
such as Nessus or OpenVAS.
Conduct security audits to assess the
overall security posture of an
organization.
Develop and deliver security
awareness training programs for
naive users.
Engage in simulated attacks on
systems to identify vulnerabilities.
Use tools like Metasploit or
Wireshark to analyze network traffic
and find potential security
weaknesses.
4. Instructional Techniques
The instructional techniques for this course are divided into two groups. First group consists of
general instructional techniques applicable to most of the units. The second group consists of specific
instructional techniques applicable to specific units.
4.1 General Techniques
Providing the reading materials to the students to familiarize the units.
Lecture, question-answer, discussion, brainstorming, practical, and buzz session.
Examination Division, office of the Dean, Faculty of Education will conduct final
examination at the end of semester.
1) Objective type question (Multiple choice 10questionsx1mark) 10 marks
2) Short answer questions (6 questions x 5 marks) 30 marks
Total 40 marks
Bishop, M. (2018). Computer Security: Art and Science, 2nd Edition. Addison-Wisely
Professional.
Ortega, J.M. (2023). Python for Security and Networking: Leverage Python modules
and tools in securing your network and applications, 3rd Edition. Packt Publishing
Stinson, D.R., & Paterson M.B. (2018). Cryptography: Theory and Practice, 4th
Edition. CRC Press