0% found this document useful (0 votes)
41 views3 pages

Network Security Course Outline For ADP

Uploaded by

zartasha574
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views3 pages

Network Security Course Outline For ADP

Uploaded by

zartasha574
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Islamia University Bahawalpur (RYK Campus)

Network Security BSADPCS 8th Semester(1M+2M)

Schedule :

Day_:- Tuesday,Wednesday
Lecture Room : 2.01L
Time: 10:45am to1 1:45am,9:15 amto 10:30am

Instructor: Aima Aziz


Objective The course aims to provide you fundamental knowledge of Communication
network technologies, cryptology and simple crypto systems, Advanced
Encryption standard, Confidentiality and message authentication technologies
with particular focus on Internet Security standards.

Recommended Books:
Data communications and networking latest edition ,Behrouz.A.Forouzan
Cryptography and Network Security, 5th Edition, William Stallings.
Corporate Computer and Network Security, 2nd Edition, Raymond Panko.
Midterm A single 60-minute midterm Final Will cover the whole course and will be
from the material covered of 2 hour duration
during the first 8 weeks

Quizzes There will be at least one quiz in two week.

Networking Several exercises will be given throughout the course. The purpose of these
Assignments exercises is to give students practice on the topics discussed in the lectures.
This hands-on practice should give students better understanding of the course
material and to enhance their skills.

Cheating/ Cheating is not only unethical; it is also against the university rules and tolerated
Plagiarism Policy Any form of cheating in assignments, homework problems, quizzes, and exams
will result in an action according to the University rules .

Attendance Policy Students missing more than 20 % of the lectures will not be allowed to
appear in Final exams

Grading Policy
 Attendance 5%
 Quizzes 5%
 Assignments 5%
 Presentation 5%
 Midterm 30%
 Final 50%
 Total 100%
Lectures Detail

Week Topics Assignments

1-3 Internetwork
 Introduction to computer networks
 Network Objectives and Criteria
 Internet Structure vs Network Structure
 Connectivity Requirements
 (Direct connection vs Indirect connection)
 Network edge & core
 (connectionless vs connection-oriented)
 Duties and responsibilities of OSI Layers
 Physical vs Logical Topologies
 Concept of Collision & congestion
 Connecting Devices overview
 (Hubs/switches, routers, modem/codec etc)

4-5 Addressing /naming Assignment 1


 Physical Address vs Logical Address
 Logical Addressing Scheme
 IPv4 Subnetting
 Classfull subnetting vs Classless subnetting
 IPV6 Subnetting
6-7 Reliability Assignment 2
 Corruption
 Collision control mechanism protocols
 CSMA/ CA and CSMA / CD
 Lost Packets
 Delay and Losses in packet switched networks Assignment 3
 Processing , Queuing ,Transmission and Propagation
Delay etc
 Flow and Congestion control
 Acknowledgement (ACK) / Negative
Acknowledgement(NAK)
 Fragmentation
 Packet size problem controlling
 In-order delivery
Sequence Number , Time to live (TTL) / Time stamp, Round
Trip time (RTT).
8 Multiplexing/Demultiplexing
 Resource Sharing and Multiplexing Protocols
 Time division multiplexing(TDM)
Synchronous vs statistical time division (STDM)
 Frequency division multiplexing (FDM)

Midterm
9-10  Introduction, Three objectives of IT Security, Three Assignment 4
foundations of IT Security
 Introduction to classical Cryptology and Cryptosystems
 The Threat environment, Basic Security Terminology
 Symmetric-Key vs Asymmetric-Key Cryptography
11-12  Traditional Ciphers , Simple Modern Ciphers, Modern
Round Ciphers
 Advanced Encryption Standard(AES)
 Data Encryption Standard(DES)
 Public Key Algorithm (RSA)
 Diffie-Hellman cryptosystem

13-14  Security Services Assignment 5


 Message and Entity security
 Message Confidentiality
 Message Integrity
 Hash Function; SHA-1
 Message Authentication
 Digital Signature
 Nonrepudiation
 Entity Authentication
 Password, Challenge response
15-16  Key Management
 Symmetric-key distribution, Public-Key distribution
 Internet security standards
SET, SSL, IPSec; VPNs, Firewalls,Viruses
 Presentation
 Wrap-up and course summary

Final Term

You might also like