0% found this document useful (0 votes)
79 views3 pages

Network and Cyber Security

Uploaded by

Vilash
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
79 views3 pages

Network and Cyber Security

Uploaded by

Vilash
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

GUJARAT TECHNOLOGICAL UNIVERSITY

Syllabus for Master of Computer Applications, 3rd Semester With effective


Subject Name: Network & Cyber Security from academic
Subject Code: 639410 year 2020-21

1. Teaching and Examination Scheme:

Teaching
Credits Examination Marks
Scheme Total
Theory Marks Practical Marks Marks
L T P C
ESE (E) PA (M) ESE (V) PA (I)
3 - 2 4 70 30 30 20 150

2. Course Outcomes:

Course Outcome Component Course Outcome (Learner will be able to)


CO1: Concepts of Network Security  Learn and describe about various network security and
cyber security concepts, devices used to enhance
security of networks.
CO2: Concepts of Cryptography and  Learn and describe about various cryptographic
IP Security techniques, digital signatures, various hashing
algorithms and their importance and internet protocol
architecture.
CO3:Network Scanning and  Learn and identify various devices present across
Identification network, identify the open ports on the active devices,
identify the OS information and banner information of
various servers and machines.
CO4:Network Monitoring and  Learn and capture traffic from the active network,
Analysis analyse packets & protocols and create their own
Network Monitoring System
CO5: Wireless Security  Learn and describe various security authentications and
standards used, detect and mitigate various attacks
performed on wireless network infrastructure.

3. Course Duration: The course duration is of 40 sessions of 60 minutes each.

4. Course Contents:
70 Marks
Module No. of
Contents (External
No: Sessions
Evaluation)
Introduction to Network Security & Cyber Security
Concepts:
Network Security and its need, CIA (Confidentiality,
Integrity, Availability), AAA (Authentication, Authorization,
I Accounting), Network Devices (Host, Router, Switch, 6 15
Bridge, etc..) on Each Layer of OSI Model, Working of DNS,
DHCP, IDS (Intrusion Detection System), IPS (Intrusion
Prevention System), Firewall and its types, Web Proxies,
Internet Security Protocols
Introduction to Cryptography & IP Security:
Key Terms: Encryption, Decryption, Plain Text, Cipher Text,
II 5 15
Secret Code, Types of Cryptographic Functions, Secret Key
Cryptography, Public Key Cryptography, Hashing, Hash

Page no. 1 of 3
GUJARAT TECHNOLOGICAL UNIVERSITY
Syllabus for Master of Computer Applications, 3rd Semester With effective
Subject Name: Network & Cyber Security from academic
Subject Code: 639410 year 2020-21

Algorithms, Digital Signatures, IP Security Architecture –


Authentication Header, Encapsulating Security Payload,
Combining Security Associations, Internet Key Exchange
(IKE).
Network Security Assessment - 1:
Passive Information Gathering: IP Address & Domain
Identification, Banner Grabbing (Netcat, Telnet & other
tools), Identifying Domain Ownership (WHOIS, DNS
III 11 15
Lookup & other tools), Active Information Gathering:
Detecting Active Systems, ICMP Ping, Port Scanning and its
techniques, Port Scanning Tools (Nmap, Zenmap, Superscan
& other tools), OS Fingerprinting – Active & Passive.
Network Security Assessment - 2:
Physical Interception, Traffic Capturing Tools (Wireshark),
IV Packet Analysis, Protocol Analysis, Traffic Timeline 10 15
Analysis, Setting up your own Network Intrusion Detection
System (SNORT-NIDS).
Wireless Security:
Wi-Fi basics – Wireless Clients and NICs, Wireless Access
Points (WAP), Wireless Communication Standards, Wi-Fi
Security – 802.1x Authentication, Wireless LAN Threats –
V Wardriving (NetStumbler, Kismet), Eavesdropping, Rogue 8 10
and Unauthorized Access Points, Evil Twin Attack, DOS,
WLAN Encrytion Flaws: Cracking WPA/WPA2 PSK,
Decrypting WEP and WPA Packets, ARP poising and MAC
spoofing, Security Wireless Security.

5. Pedagogy:
 ICT enabled Classroom teaching
 Case study
 Practical / live assignment
 Interactive class room discussions

6. Evaluation:

Students shall be evaluated on the following components:


Internal Evaluation ( Total - 20 Marks)
A
 Continuous Evaluation Component 10 marks
 Class Presence & Participation 10 marks
B Mid-Semester examination (30 Marks)
C End –Semester Examination(Theory) (70 Marks)
D End –Semester Examination(Practical/Viva) (30 Marks)

7. Reference Books:

No. Author Name of the Book Publisher


Build Your Own Security Lab: A Field
1. Michael Gregg Wiley Publishing
Guide for Network Testing
2. Charlie Kaufman, Network Security: Private Communication Pearson Indian

Page no. 2 of 3
GUJARAT TECHNOLOGICAL UNIVERSITY
Syllabus for Master of Computer Applications, 3rd Semester With effective
Subject Name: Network & Cyber Security from academic
Subject Code: 639410 year 2020-21

Radia Perlman and in a Public World Education Services


Mike Speciner Ltd.
Cryptography and Network Security:
3 William Stallings Pearson
Principles and Practice
4. Lisa Bock Learn Wireshark Packt Publishing
Nmap® Cookbook: The Fat-Free Guide to Create space
5. Nicholas Marsh
Network Scanning Independent Pub
Networking Monitoring And Analysis : A
6. ED Wilson Prentice Hall PTR
Protocol Approach to Troubleshooting
Network Security Assessment: Know your
7. Chris McNab O’Reilly
Network

8. Practical

List of suggestive practical list is as follows.

Sr.
Suggested practical List
No.
1 To study various wired & wireless network devices based on layers of OSI Model.
2 To study various attacks based on layers of OSI Model.
3 To perform following operations using Netcat:
 Port Scanning & Port Listening  Banner Grabbing
 File/Data Transfer  Chat Server
4 Study the use of network reconnaissance tools like dig, traceroute, nslookup to gather
information about networks and domain registrars.
5 To perform Open Source Intelligence (OSINT) about any specific domain. (WHOIS, DNS
Lookup & other Tools) – A Passive Information Gathering Technique.
6 To perform port scanning using various methods & techniques provided by Nmap or Zenmap.
7 To implement a packet capturing tool (Wireshark) and capture the real time traffic.
8 To study & analyse the captured packets for different protocols & search queries using
Wireshark.
9 Observe performance in promiscuous as well as non-promiscous mode in Wireshark and also
show that packets can be traced based on different filters.
10 Use the Nessus tool to scan the network for vulnerabilities.
11 To implement/configure Intrusion Detection System for Log Collection based on default &
customized rules. (Ex. Snort IDS)
12 To study the features of firewall in providing Network Security and policy implementation on
any basic firewall.
13 To implement whitelisting & blacklisting policy in the firewall.
14 To study ARP Protocol & perform ARP poising attack.
15 To study WEP, WPA2PSK and perform WEP, WPA cracking.
16 To study and report on latest Network Security Crimes, Network Security Challenges and
Solutions to overcome them.
17 To Implement Caesar cipher encryption-decryption & Playfair cipher encryption-decryption
18 To write a program to generate SHA-1 hash & to implement a digital signature algorithm.
19 To perform various encryption-decryption techniques with cryptool.
Technique like caesar cipher, Monoaplhabetic cipher, polyalphabetic cipher, rectangular
cipher, columnar cipher, Hill cipher etc.

Page no. 3 of 3

You might also like