Network and Cyber Security
Network and Cyber Security
Teaching
Credits Examination Marks
Scheme Total
Theory Marks Practical Marks Marks
L T P C
ESE (E) PA (M) ESE (V) PA (I)
3 - 2 4 70 30 30 20 150
2. Course Outcomes:
4. Course Contents:
70 Marks
Module No. of
Contents (External
No: Sessions
Evaluation)
Introduction to Network Security & Cyber Security
Concepts:
Network Security and its need, CIA (Confidentiality,
Integrity, Availability), AAA (Authentication, Authorization,
I Accounting), Network Devices (Host, Router, Switch, 6 15
Bridge, etc..) on Each Layer of OSI Model, Working of DNS,
DHCP, IDS (Intrusion Detection System), IPS (Intrusion
Prevention System), Firewall and its types, Web Proxies,
Internet Security Protocols
Introduction to Cryptography & IP Security:
Key Terms: Encryption, Decryption, Plain Text, Cipher Text,
II 5 15
Secret Code, Types of Cryptographic Functions, Secret Key
Cryptography, Public Key Cryptography, Hashing, Hash
Page no. 1 of 3
GUJARAT TECHNOLOGICAL UNIVERSITY
Syllabus for Master of Computer Applications, 3rd Semester With effective
Subject Name: Network & Cyber Security from academic
Subject Code: 639410 year 2020-21
5. Pedagogy:
ICT enabled Classroom teaching
Case study
Practical / live assignment
Interactive class room discussions
6. Evaluation:
7. Reference Books:
Page no. 2 of 3
GUJARAT TECHNOLOGICAL UNIVERSITY
Syllabus for Master of Computer Applications, 3rd Semester With effective
Subject Name: Network & Cyber Security from academic
Subject Code: 639410 year 2020-21
8. Practical
Sr.
Suggested practical List
No.
1 To study various wired & wireless network devices based on layers of OSI Model.
2 To study various attacks based on layers of OSI Model.
3 To perform following operations using Netcat:
Port Scanning & Port Listening Banner Grabbing
File/Data Transfer Chat Server
4 Study the use of network reconnaissance tools like dig, traceroute, nslookup to gather
information about networks and domain registrars.
5 To perform Open Source Intelligence (OSINT) about any specific domain. (WHOIS, DNS
Lookup & other Tools) – A Passive Information Gathering Technique.
6 To perform port scanning using various methods & techniques provided by Nmap or Zenmap.
7 To implement a packet capturing tool (Wireshark) and capture the real time traffic.
8 To study & analyse the captured packets for different protocols & search queries using
Wireshark.
9 Observe performance in promiscuous as well as non-promiscous mode in Wireshark and also
show that packets can be traced based on different filters.
10 Use the Nessus tool to scan the network for vulnerabilities.
11 To implement/configure Intrusion Detection System for Log Collection based on default &
customized rules. (Ex. Snort IDS)
12 To study the features of firewall in providing Network Security and policy implementation on
any basic firewall.
13 To implement whitelisting & blacklisting policy in the firewall.
14 To study ARP Protocol & perform ARP poising attack.
15 To study WEP, WPA2PSK and perform WEP, WPA cracking.
16 To study and report on latest Network Security Crimes, Network Security Challenges and
Solutions to overcome them.
17 To Implement Caesar cipher encryption-decryption & Playfair cipher encryption-decryption
18 To write a program to generate SHA-1 hash & to implement a digital signature algorithm.
19 To perform various encryption-decryption techniques with cryptool.
Technique like caesar cipher, Monoaplhabetic cipher, polyalphabetic cipher, rectangular
cipher, columnar cipher, Hill cipher etc.
Page no. 3 of 3