Network Security SWISS GERMAN UNIVERSITY. Administration Charles Lim Charles.lims@gmail.com



Similar documents
CS 464/564 Networked Systems Security SYLLABUS

Computer and Network Security PG Unit Outline School of Information Sciences and Engineering

Network Security Essentials:

(IŞIK - IT201) 1 / 6 COURSE PROFILE. Theory+PS+Lab (hour/week) Local Credits. Course Name Code Semester Term ECTS

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Course Syllabus. Course code: Academic Staff Specifics. Office Number and Location

Information Security Course Specifications

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

Tele3119 Trusted Networks Course Outline 2013

Curran, K. Tutorials. Independent study (including assessment) N/A

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

CRYPTOG NETWORK SECURITY

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

CS 450/650 Fundamentals of Integrated Computer Security

Weighted Total Mark. Weighted Exam Mark

Common Syllabus Revised

Computer Security (EDA263 / DIT 641)

Introduction to Cyber Security / Information Security

Course Design Document. IS403: Advanced Information Security and Trust

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

Boston University MET CS 690. Network Security

F21CN: Computer Network Security: Overview

CRIPT - Cryptography and Network Security

University of Wisconsin-Whitewater Curriculum Proposal Form #3 New Course

CRYPTOGRAPHY AND NETWORK SECURITY

NETWORK ADMINISTRATION AND SECURITY

UVic Department of Electrical and Computer Engineering

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

CNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan

Cryptography and network security CNET4523

Information, Network & Cyber Security

CSC 474 Information Systems Security

e-code Academy Information Security Diploma Training Discerption

CS 5490/6490: Network Security Fall 2015

CIS 6930/4930 Computer and Network Security. Dr. Yao Liu

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

Course Outline Computing Science Department Faculty of Science. COMP Credits Computer Network Security (3,1,0) Fall 2015

Network Security Course Specifications

Networking: EC Council Network Security Administrator NSA

Netzwerksicherheit [NetSec] Systemsicherheit [SysSec]

CSCI 4541/6541: NETWORK SECURITY

Chapter 7 Transport-Level Security

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

Syllabus. No: CIS 200. Title: Fundamentals of Network Security. Credits: 4. Coordinator: Dr. B. Dike-Anyiam, Computer Science & Networking Lecturer

Network Security. Introduction. Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015

How To Pass A Credit Course At Florida State College At Jacksonville

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

Implementing Cisco IOS Network Security v2.0 (IINS)

Network Security Protocols

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities

Chapter 8. Network Security

Table of Contents. Introduction. Audience. At Course Completion

Gujarat University Syllabus M.Tech (Networking & Communications) II

CCNA Security 2.0 Scope and Sequence

City University of Hong Kong. Information on a Course offered by Department of Computer Science with effect from Semester A in 2014 / 2015

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

CMPSCI 453 Computer Networking. Professor V. Arun Department of Computer Science University of Massachusetts Amherst

CS 458 / 658 Computer Security and Privacy. Course mechanics. Course website. Module 1 Introduction to Computer Security and Privacy.

How To Use Pretty Good Privacy (Pgp) For A Secure Communication

CCNA Security v1.0 Scope and Sequence

NETWORK SECURITY (W/LAB) Course Syllabus

Course mechanics. CS 458 / 658 Computer Security and Privacy. Course website. Additional communication

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Data Encryption and Network Security

CS Ethical Hacking Spring 2016

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits)

CSE/EE 461 Lecture 23

SE 4472a / ECE 9064a: Information Security

HOWARD. UNIVERSITY School of Business

MW , TU 1-3; and other times by appointment

NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS. Division: Applied Science (AS) Liberal Arts (LA) Workforce Development (WD)

Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999

CS4320 Computer and Network Security. Fall 2015 Syllabus

IT Networking and Security

Wireless Mobile Internet Security. 2nd Edition

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Lecture 1 - Overview

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

Tim Bovles WILEY. Wiley Publishing, Inc.

EECS 588: Computer and Network Security. Introduction January 14, 2014

Transcription:

Network Security SWISS GERMAN UNIVERSITY Administration Charles Lim Charles.lims@gmail.com

Agenda Administrative Course Information Lecturing Information Getting to know each other Questions & Answers 2

About me Charles Lim, Msc., ECSA, ECSP, ECIH, CEH, CEI Researcher Information Security Research Group and Lecturer, Swiss German University Head of Information Technology Laboratories charles_lims@gmail.com and charles.lim@sgu.ac.id Organization Involvement Indonesia Honeynet Project Chapter Lead (http://www.honeynet.or.id) Technical Member Komite Akreditasi Nasional (KAN) of BSN Technical Member to KEMKOMINFO for regulating Web Applications, Public Key Infrastructure Member of Academy CSIRT (Computer Security Incident Response Team) http://www.acad-csirt.or.id Independent Researcher of IDSIRTII (http://www.idsirtii.or.id) S W I S S G E R M A N U N I V E R S I T Y

Objective Course Information To introduce the course covers theory and practice of network security, focusing in particular on the security aspects of the web and Internet. To learn cryptographic tools used to provide security including symmetric encryption, public key encryption, key exchange, and digital signature To learn how to secure network application using protocols and applications such as Kerberos, SSL, IPSEC, TLS, PGP, S/MIME, SET, and others. System security issues, such as viruses, intrusion, firewalls, and others will also be covered. Prerequisites Computer Networks Basic Mathematics Eagerness to learn 4

Learning Outcome Students should master the following topics: Understand security threats to computer systems and computer networks and how to identify countermeasures to the threats in accordance to security goals Understand and strategize a plan to the right security tools to reduce risks of the threats Understand that decision and action taken to countermeasures the threats also need to comply to the regulations and professional ethics 5

Lectures Week #1 Lectures & Laboratory Monday 9:00 10:30 & 11:00 12:30 Wednesday 13:30 15:00 & 15:30 17:00 Friday 9:00 10:30 & 11:00 12:30 Week #2 Wednesday 9:00 10:30 & 11:00 12:30 Room Resources http://people.sgu.ac.id/charleslim/ostfalia 6

Wk. Ses. Lecture Schedules Topics 1 1 Overview, Network Threats & Attacks 1 2 Cryptography 1 3 Cryptography 1 4 Authentication, Kerberos 7

Wk. Ses. Lecture Schedules Topics 1 5 IP Security, Email Security 1 6 Web Security 2 7 Intruders, Malware 2 8 Firewalls 8

Lecture contents & styles Lecture Notes Presented at each session Stored in pdf format Discussions Misc. Video Real world examples URL http://people.sgu.ac.id/charleslim/ostfalia/ 9

Student Participations Attendance is an absolute for this course, it counts toward your grade Each student is responsible for sharing questions and insights with other class members. 10

Review Questions A handout of review questions will be distributed at the end of class or provided online Use these questions for review the materials we discussed in class These review questions will come in handy to prepare for Final Exam 11

More Practical Resources SANS Reading Room http://www.sans.org Seminar Purdue University CERIAS video seminars on various security issues http://cerias.purdue.edu/news_and_ev ents/events/security_seminar/ 12

Schedule Final Exam Friday 9:00 10:30 Comprehensive (covering all lectures) Review questions after every lecture 13

Text Book & References Computer & Network Security Theory and Practice, Jie Wang, Springer Network Security Essentials Applications & Standards, 4 th edition, William Stallings, Pearson References Cryptography & Network Security, 4 th edition, William Stallings, Pearson Security in Computing, 4 th edition, Charles Pfleeger, Prentice Hall 14

Lecturer Information Charles Lim, Msc., ECSA, ECSP, ECIH, CEH, CEI Email charles.lims@gmail.com <preferred> Questions/Communication During Office Hours Via Email or Group Web site Posting Resources http://www.people.sgu.ac.id/charleslim/ostfalia 15

Grading FINAL EXAM 100% Use your review questions as guide to your final exam 16

Acknowledgement Many of the lecture notes are adapted from those of the textbook authors: Jia Wang & William Stallings 17