Network Security Theoretical & Practical Perspective



Similar documents
AICTE Approved Short Term Course on HR Analytics- Hands on Training. (Under QIP Sponsored)

AICTE SPONSORED SHORT TERM COURSE ON. Planning and Managing Human Resources: Tools & Techniques. (Under the Scheme of QIP, Min of HRD, Govt.

CAD-CAM Application in CNC Machining with Solid & Surface Modelling

Chap. 1: Introduction

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

Venue IIT Kharagpur Extension Centre HC Block, Sector III Salt Lake City, Kolkata

Dept. of Financial Information Security

Cryptography and Network Security

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

IT and Cyber Security Training Courses

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Bachelor of Information Technology (Network Security)

CRYPTOG NETWORK SECURITY

Observation and Findings

Quantum Safe Security Workgroup Presentation. Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014

CESG Certification of Cyber Security Training Courses


Recent trends in Chemical Engineering

Single Sign-On Secure Authentication Password Mechanism

P.G.DEPARTMENT OF POLITICAL SCIENCE UTKAL UNIVERSITY, VANI VIHAR, BHUBANESWAR, ODISHA TRAINING PROGRAMME ON RESEARCH METHODOLOG DECEMBER 2013,

Information System Security

CPSC 467b: Cryptography and Computer Security

Faculty Development Programme on Contemporary HR Trends & Practices 6-19 April, 2015

COSC 472 Network Security

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Web Technologies

ESKISP Conduct security testing, under supervision

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Information Technology Diploma in Web Technologies

Part-time MSc in Cyber Security from Northumbria University. masters.qa.com

MSc Information Technology - E521

IT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies

One- Year Master of Education (Full- Time Studies) Information for Applicants

Course Outline Computing Science Department Faculty of Science. COMP Credits Computer Network Security (3,1,0) Fall 2015

Network Security - ISA 656 Review

CRYPTOGRAPHY IN NETWORK SECURITY

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

University of Wisconsin-Whitewater Curriculum Proposal Form #3 New Course

(IŞIK - IT201) 1 / 6 COURSE PROFILE. Theory+PS+Lab (hour/week) Local Credits. Course Name Code Semester Term ECTS

Network Security Course Specifications

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

TLS and SRTP for Skype Connect. Technical Datasheet

Certificate in Cyber Security

Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech

MSc Cyber Security. identity. hacker. virus. network. information

Chapter 1: Introduction

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

NETWORK INFRASTRUCTURE SECURITY

ENTREPRENEURSHIP DEVELOPMENT

Notes on Network Security - Introduction

Information Security and Cryptography

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

Proposal for a Graduate Certificate in Information Assurance Education Track 2. Submitted. by the. School of Technology West Lafayette Campus

7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11.

544 Computer and Network Security

ITEM FOR FINANCE COMMITTEE

Wireless Mobile Internet Security. 2nd Edition

Privacy & Security of Mobile Cloud Computing (MCC)

INFOCOMM & DIGITAL MEDIA (IT NETWORK AND SYSTEM ADMINISTRATION)

Module 7 Security CS655! 7-1!

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Intrusion Detection for Mobile Ad Hoc Networks

Training courses 2015/2016

Cryptography and Network Security Chapter 1

Cross-Cultural Management

Overview TECHIS Carry out security testing activities

CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015

Chapter 8. Network Security

University Institute of Technology, Burdwan University

Page 1 of 6 Application Form ZU/PG.F1 (2015/2016)

Center of Academic Excellence Cyber Operations Program 2013 Application

FACULTY NORMS - PRESCRIBED BY AICTE FOR VARIOUS PROGRAMMES (Engineering & Technology, Architecture, Planning, Pharmacy, MBA & MCA)

Compter Networks Chapter 9: Network Security

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

Gold Lock Desktop White Paper

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Michelle Govan & Anand Philip Network & Security Engineering

AMIE PROSPECTUS. (Complete Details of joining AMIE)

Cryptography & Network Security

ANGEL TREE OUTREACH APPLICATION FORM

NOS for Network Support (903)

DIRECTOR. Copy to : Deans & HODs Associate Deans Chairman centers Registrar AR (Establishment) In charge Institute web site

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

The Pension Portal. Helping you take your pension business into the paperless age

Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart. OV-Chipkaart Security Issues Tutorial for Non-Expert Readers

CRYPTOGRAPHY AND NETWORK SECURITY

MANONMANIAM SUNDARANAR UNIVERSITY, TIRUNELVELI, TAMILNADU Ph.D Registration

Information Security in Business: Issues and Solutions

A Preliminary Evaluation of the new Cisco Network Security Course

e-code Academy Information Security Diploma Training Discerption

30 Independent Study. 60 (e.g. lectures, seminars and supervised group activity)

IT Networks & Security CERT Luncheon Series: Cryptography

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

CS549: Cryptography and Network Security

Security Goals Services

Release: 1. ICANWK502A Implement secure encryption technologies

Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits)

MEng, BSc Applied Computer Science

Chapter 10. Cloud Security Mechanisms

Transcription:

AICTE SPONSORED SHORT-TERM COURSE on Network Security Theoretical & Practical Perspective (August 2 7, 2010) (One Week) Organised by Continuing Education Programme (CEP) in http://sit.iitkgp.ernet.in/~netsec2010 Coordinators Dr. S.K. Ghosh Associate Professor IIT Kharagpur 721302 Email: skg@iitkgp.ac.in Dr. Debdeep Mukhopadhyay Assistant Professor Department of Computer Science & Engineering IIT Kharagpur 721302 Email: depdeep@cse.iitkgp.ernet.in Contact details Email: netsec2010@gmail.com Website: http://sit.iitkgp.ernet.in/~netsec2010

OVERVIEW Communication networks are often used to transfer valuable and confidential information for a variety of purposes. As a consequence, they attract the attention of attackers to steal or misuse information, or to disrupt or destroy the information flow. Some attacks are planned and specifically targeted, whereas others may be opportunistic, resulting from eavesdropping activities. Further, the threats to network are continually increasing with discovery of new vulnerabilities, and solutions to counter those threats are needed. This course attempts to provide an insight into the enduring principles of network security and will introduce some of the theoretical and practical concepts of network security. TOPICS TO BE COVERED TCP/IP Protocols & Internetworking Security Issues in TCP/IP Overview of Cryptography Secret key & public key cryptography Block ciphers, Stream ciphers, Digital signature Cryptanalysis of Classical Cryptosystems Certification, Public Key Infra structure (PKI) Security Policies / Models Network layer, transport layer, application layer security Attack graph, Vulnerability, Exploitation framework Overview of Wireless security, Cloud security COURSE MATERIALS Necessary course materials will be provided to the participants during the course. WHO CAN ATTEND The course is meant for (1) Teachers of AICTE approved Engineering Colleges/Universities Few seats will be available to (please check website for details) (2) Faculty from other engineering colleges (3) Students with minimum qualification of BE/BTech in CS/IT/ECE/EE (Final year student with good academic career may also be considered) (4) Executives from Industry, Corporate, Government Organizations. All applicants are expected to have basic knowledge of (i)computer Networks and (ii)engineering Mathematics.

HOW TO APPLY The filled registration form (along with Demand Draft, if applicable) should reach the course coordinator on or before July 10, 2010. COURSE FEE AICTE Teachers: No Registration Fee will be charged from the teachers nominated by the AICTE approved Engineering Colleges/ Universities. The selected teachers from AICTE approved Engineering Colleges/ Universities will be paid a maximum of AC 3 tier by the shortest route. [As per rule of CEP, IIT Kharagpur] For other interested participants, a separate notification will be available in the website http://sit.iitkgp.ernet.in/~netsec2010 NOTIFICATION OF PARTICIPATION All Selected Participants will be informed through email by 20 July 2010. The list of participants will be available in the course website also. FOOD & ACCOMMODATION All Participants will be provided food (breakfast, lunch, dinner) & accommodation (Non AC Twin sharing, Dormitory) in the Institute campus. Details of accommodation will be sent to the participants in due course. IMPORTANT DATES Last date for receiving applications Notification to Selected Participants July 10, 2010 July 20, 2010 Course dates August 02 to August 07, 2010

REGISTRATION FORM AICTE SPONSORED SHORT-TERM COURSE ON Network Security Theoretical & Practical Perspective August 2 7, 2010 Application form, duly filled (in BLOCK letter) should reach the course coordinator on or before July 10, 2010 1. Name (in Full) : 2. Male or Female : (for accommodation purpose) 3. Designation : 4. Specialization : 5. Institute/Organization : 6. Mailing Address : State PIN 7. Email : 8. Telephone No. : Mobile No: 9. Highest Educational Qualification: 10. Professional Experience (in years) : Please register me for the course on Network Security Theoretical & Practical Perspective, to be conducted at IIT Kharagpur during August 2 7, 2010. Signature of the Applicant & Date

Certificate (on your Institute Letter Head) Certified that Mr/Ms/Dr. is being nominated for attending short term course on Network Security Theoretical & Practical Perspective at IIT Kharagpur during August 2 7, 2010. Our Institute/College/University is approved by AICTE. Signature of the Head of the Institution / Competent Authority Name : Designation: Institute: [Seal of the Institute]