0% found this document useful (0 votes)
15 views14 pages

Individual Project

Individual Project

Uploaded by

Sơn Ngọc
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views14 pages

Individual Project

Individual Project

Uploaded by

Sơn Ngọc
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

ELEMENTS OF NETWORK SECURITY’S PROJECT

Project Allotment: Each student will be allotted one project.

Time: 6 weeks

Report:

+ All report must fullil report’s template.


+ Individual project report: Formating with a standard template and not more
than 30 pages.
+ Individual project presentation: Design by Microsoft Powerpoint or other
tools.
Presentation:

+ Seminar Presentations: each student gives 10 minutes for presentation and 05


minutes for Q&A
+ Language of presentation: Vietnamese/English (Using English is encouraged)
+ Encouraging demostration
Project Evaluation Guidelines:

The project is to be evaluated based on the following parameters


+ Timeliness: 20%
+ Quality of Product/Service: 40%
+ Quality of presentation: 20%
+ Question & Answer: 20%

1
PROJECTs

Project 1: Introduction to VPN (Virtual Private Network) and implement


VPN Client to Site

Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Cisco Packet Tracer/GNS3/EVE-NG; Windows; or Linux
Project 2: Introduction to VPN (Virtual Private Network) and implement
VPN Site to Site

Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Cisco Packet Tracer/GNS3/EVE-NG; Windows; or Linux
Project 3: Introduction to Web Application Firewall (WAF) and
Implement the WAF using open source NAXSI

Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Linux or Windows

2
Project 4: Introduction to Web Application Firewall (WAF) and
Implement the WAF using open source WebKnight

Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Linux or Windows
Project 5: Introduction to Web Application Firewall (WAF) and
Implement the WAF using open source Shadow Daemon

Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Linux or Windows
Project 6: Introduction to Web Application Firewall (WAF) and
Implement the WAF using open source Coraza

Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Linux or Windows
Project 7: Introduction to Web Application Firewall (WAF) and
Implement the WAF using open source OctopusWAF

Contents
+ Brief history
+ Technical overview
3
+ Standards information
+ The use of this technology today
+ Demo //Linux or Windows
Project 8: Introduction to Web Application Firewall (WAF) and
Implement the WAF using open source IronBee

Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Linux or Windows
Project 9: Introduction to Web Application Firewall (WAF) and
Implement the WAF using open source ModSecurity

Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Linux or Windows
Project 10: Introduction to IPSec

Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Cisco Packet Tracer/GNS3/EVE-NG; Windows; or Linux

4
Project 11: Introduction to FTPS

Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
Project 12: Introduction to HTTPS

Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
Project 13: Introduction to DNSSEC

Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
Project 14: Introduction to VPN and Implement the Open Source
OpenVPN for Enterprise Network Systems

Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux

5
Project 15: Introduction to SSH

Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux or Cisco Packet Tracer/GNS3/EVE-NG
Project 16: Introduction to VPN and Implement the SoftEther VPN

Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
Project 17: Introduction to VPN and Implement the OpenConnect VPN

Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
Project 18: Introduction to Firewall and Implement IPCop Firewall

Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux

6
Project 19: Introduction to Firewall and Implement pfSense Firewall

Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
Project 20: Introduction to Firewall and Implement OPNsense Firewall

Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
Project 21: Introduction to Firewall and Implement Smoothwall Firewall

Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
Project 22: Implement the Open Source network access control (NAC)
solution with PacketFence

Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux

7
Project 23: Implement the Intrusion Detection System (IDS) with Suricata

Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
Project 24: Implement the Intrusion Detection System (IDS) with Wazuh

Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
Project 25: Introduction to Firewall and Implement IPFire Firewall

Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
Project 26: Implement the Intrusion Detection System (IDS) with OSSEC

Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux

8
Project 27: Introduction to MD5 - Cryptographic Hash Function
Algorithm

Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
Project 28: Introduction to SHA - Cryptographic Hash Function
Algorithm

Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
Project 29: Introduction to DES - Symmetric-key Block Cipher

Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux

9
Project 30: Introduction to AES - Symmetric Block Cipher

Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
Project 31: Introduction to Triple Data Encryption Standard (TripleDES)

Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
Project 32: Introduction to Blowfish Encryption Algorithm

Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
Project 33: Introduction to Twofish Encryption Algorithm

Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux

10
Project 34: Introduction to HMAC Encryption Algorithm

Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
Project 35: Introduction to Cuckoo Sandbox - Open-source Automated
Malware Analysis System

Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
Project 36: Introduction to Security Onion - Intrusion Detection and
Network Security Monitoring Distribution

Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux

11
Project 37: Introduction to Kismet - Wireless Network Detector, Sniffer,
and Intrusion Detection System

Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
Project 38: Introduction to AlienVault OSSIM: Open-Source Security
Information and Event Management Platform

Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
Project 39: Introduction to Zeek (formerly Bro) - Network Analysis
Framework for Security Monitoring

Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux

12
Project 40: Introduction to ClamAV - Open-Source Antivirus Engine

Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
Project 41: Introduction to Fail2Ban - Log-Parsing Application to Protect
Against Brute-Force Attacks

+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux

13
STANDARD TEMPLATE

DUY TAN UIVERSITY


INTERNATIONAL SCHOOL
***
ELEMENTS OF NETWORK SECURITY COURSE
INDIVIDUAL PROJECT REPORT
PROJECT NAME: [XXXXXXXXXXXXXXXXXXXXXXXXXXX]
STUDENT NAME:
STIDENT ID:
Submit date: [XXXXXXXXXX]
TABLE OF CONTENT
1. Project name ................................................................................................ Page X
2. Project goals ................................................................................................ Page X
3. References and main sources of information .............................................. Page X
4. Contents ....................................................................................................... Page X
4.1. Brief history .............................................................................................. Page X
4.2. Technical overview .................................................................................. Page X
4.3. Standards information .............................................................................. Page X
4.4. The use of this technology today .............................................................. Page X
5. Demostration .............................................................................................. Page X
6. Conclusion ................................................................................................... Page X

14

You might also like