CCS354 Network Security
UNIT SYLLABUS CONTENT BEYOND SYLLABUS
I INTRODUCTION Quantum Cryptography: This is a new field of
cryptography that uses the principles of quantum
Basics of cryptography, mechanics to secure data.
conventional and public-key
cryptography, hash functions,
authentication, and digital
signatures
II KEY MANAGEMENT AND Quantum Key Distribution: This is a key distribution
AUTHENTICATION protocol that uses quantum mechanics to guarantee
secure communication. It enables two parties to
Key Management and produce a shared random secret key known only to
Distribution: Symmetric Key them, which can then be used to encrypt and decrypt
Distribution, Distribution of messages.
Public Keys, X.509
Certificates,
Public-Key Infrastructure.
User Authentication: Remote Biometric Authentication: This involves studying
User-Authentication systems that use biometric data for authentication, such
Principles, Remote User- as fingerprint, face, iris, or voice recognition.
Authentication
Using Symmetric Encryption,
Kerberos Systems, Remote
User Authentication Using
Asymmetric Encryption.
III ACCESS CONTROL AND Advanced Network Access Control:
SECURITY This could include studying more complex NAC
models, such as those incorporating machine learning
Network Access Control: for anomaly detection or those designed for specific
Network Access Control, environments like cloud or IoT.
Extensible Authentication
Protocol, IEEE 802.1X Port- Transport Layer Security in IoT:
Based Network Access Control Understanding the unique challenges and solutions for
implementing transport layer security in Internet of
- IP Security - Internet Key Things (IoT) devices.
Exchange (IKE).
Transport-Level Security: Web
Security Considerations,
Secure Sockets Layer,
Transport Layer Security,
HTTPS standard, Secure Shell
(SSH) application
IV APPLICATION LAYER Advanced Email Security: This could include
SECURITY studying more complex email security solutions, such
as Advanced Threat Protection (ATP) systems that use
Electronic Mail Security: machine learning to detect phishing and malware
Pretty Good Privacy, S/MIME, attacks, or understanding the role of DMARC (Domain-
Domain Keys Identified Mail. based Message Authentication, Reporting &
Conformance) in preventing email spoofing.
Wireless Network Security: Security in BYOD (Bring Your Own Device)
Mobile Device Security. Environments: This involves understanding the
security challenges and solutions in environments
where employees use their personal devices for work
purposes.
V SECURITY PRACTICES Next-Generation Firewalls (NGFWs)
Firewalls and Intrusion Next-Generation Firewalls (NGFWs) go beyond
Detection Systems: Intrusion traditional firewalls by performing deep packet
Detection Password inspection, in addition to port/protocol and surface-level
Management, Firewall packet inspection. NGFWs add application-level
inspection, intrusion prevention, and the ability to bring
Characteristics
intelligence from outside the firewall. These advanced
Types of Firewalls, Firewall features enhance network security and provide better
Basing, Firewall Location and protection against modern threats
Configurations. Block chains,
Cloud Security and IoT
security.
Prepared By Verified By