0% found this document useful (0 votes)
7 views8 pages

Network Security Lab Presentation

The document outlines the Network Security Lab course for B.E. VII Semester at Vasavi College of Engineering, detailing course objectives, outcomes, and a comprehensive lesson plan. Students will learn various cipher techniques, implement encryption algorithms, and utilize network security tools. The course includes practical experiments and programs focusing on encryption, decryption, and network security practices.

Uploaded by

arunadeepthi23
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views8 pages

Network Security Lab Presentation

The document outlines the Network Security Lab course for B.E. VII Semester at Vasavi College of Engineering, detailing course objectives, outcomes, and a comprehensive lesson plan. Students will learn various cipher techniques, implement encryption algorithms, and utilize network security tools. The course includes practical experiments and programs focusing on encryption, decryption, and network security practices.

Uploaded by

arunadeepthi23
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Network Security Lab

Professional Elective-II, B.E. VII – Semester


Vasavi College of Engineering, Hyderabad
Department of Electronics & Communication
Engineering
Course Information
• Course Code: U21PE781EC
• Credits: 1
• L:T:P (Hrs./week): 2:0:0
• SEE Marks: 50
• CIE Marks: 30
• Duration of SEE: 3 Hours
Course Objectives
• Learn Different Cipher Techniques.
• Implement the Algorithms DES, RSA, MD5,
SHA-1.
• Use Network Security Tools and Vulnerability
Assessment Tools.
Course Outcomes
• Develop code for classical Encryption
Techniques.
• Build cryptosystems using symmetric and public
key encryption algorithms.
• Construct code for authentication algorithms.
• Develop a signature scheme using Digital
Signature Standard.
• Demonstrate network security systems using
open-source tools.
Experiments Overview
• Introduction to Network Security Lab
• Cipher encryption and decryption: Caesar, Playfair
• Hill Cipher, Vigenère Cipher
• Transposition techniques
• DES algorithm for encryption and decryption
• Connect remote machine using Secure Shell (SSH)
• AES encryption and decryption algorithm
• Implementation of RSA algorithm
• Diffie-Hellman Key Exchange algorithm
• Message digest using MD5 algorithm
• Firewall configuration in packet tracer
• RC4 logic using cryptography
• Message digest using SHA-1 algorithm
• KF Sensor Tool for creating and monitoring honeypot
Lesson Plan Overview
• Instructor: Dr. S. Aruna Deepthi / S. Jhansi
• Class: B.E (ECE-AB&C) VII-Semester
• Subject: Network Security Lab
• Academic Year: 2024-2025
Detailed Lesson Plan
• 9.8.24: Introduction to network security lab
• 16.8.24: Cipher encryption and decryption - Caesar, Playfair
• 23.8.24: Hill cipher, Vigenère cipher
• 30.8.24: Transposition techniques
• 6.9.24: DES algorithm for encryption and decryption
• 13.9.24: Connect remote machine using SSH
• 20.9.24: AES encryption and decryption algorithm
• 27.9.24: Implementation of RSA algorithm
• 4.10.24: Diffie-Hellman Key Exchange algorithm
• 11.10.24: Message digest using MD5 algorithm
• 18.10.24: RC4 logic using cryptography
• 25.10.24: Message digest using SHA-1 algorithm
• 1.11.24: KF Sensor Tool for creating and monitoring honeypot
• 8.11.24: Case studies
• 22.11.24: Revision
• 29.11.24: Lab Exam
Programs Details
• Connect remote machine using SSH
• Basic firewall configuration in packet tracer
• Encryption and decryption using substitution techniques: Caesar,
Playfair, Hill, Vigenère
• Transposition techniques: Rail fence, row & column transformation
• Apply DES and AES algorithms for practical applications
• Implement RSA and Diffie-Hellman Key Exchange algorithms
• Calculate message digest using MD5 and SHA-1 algorithms
• RC4 logic and blowfish encryption
• Working with KF Sensor Tool for honeypot creation and monitoring

You might also like