This course is currently focused on network security. In order to understand the network security problem, the security section will begin with a review of various forms of network attacks including scanning, exploits and denial-of-service attacks. We will also review various cryptographic mechanisms like symmetric encryption, message digests, and public key crypto. We then turn to network-side security management including both passive measures like firewall defense schemes including packet virtualrs, and bastion hosts. design a complete secure network using firewalls and security options is major point of this course.


Language: The class is taught in English.
Assistant: Select one student to manage, handle and collect the assignments, projects, and Lab activities.
Final Examination: Written examination, (50%)
Coursework 1: 5 Courseworks (individual), (30% = 5 * 6%)
Coursework 2: Project and Presentation (individually) , (20%)


  • Session 1: Introduction to Network Security: Who’s vulnerable,Who’s attacking, What are the kinds of attacks, How do we protect ourselves,What do you do when you’ve been attacked
  • Session 2: Cryptography: History, Basic terminologies, Symmetric key encryption, Asymmetric key encryption, Hashing Structure
  • Session 3: Wired vs WIRELESS SECURITY: Differences between Sired and Wireless , Differences based on Security Wireless Security: Shared key authentication, Key Authentication, Wi-Fi Protected Access (APA)
  • Session 4 - Lab 1: Attacks: Crisis, Computer Crimes, Hacker Attacks, Modes of Computer Security, Password Security, Network Security, Web Security, Distributed Systems Security, Database Security
  • Session 5 - Lab 2: Virus, Worms and Trojans: Definition Of a Computer Virus, History Of Computer Viruses, The Virus Languages, Symptoms, Classifying Viruses , Classifying virus Categories , Classifying virus types, Protection/Prevention, 9 Antivirus
  • Session 6 - Lab 3: Firewalls: What is a firewall, Why an organization needs a firewall, Types of firewalls and technologies, Deploying a firewall, What is a VPN
  • Session 7 - Lab 4: Intrusion Detection System(IDS) and Intrusion Prevention System(IPS): Intrusion, Types of Intrusion, Intrusion Detection Models, Intrusion Prevention Models
  • Session 8 - Lab 5: Wireless LAN Security: Benefits, Standards, Functionality, Security Issues, Solutions and Implementations
  • Session 9 - Lab 6: Network Security (Principles & Practices): Introduction to Network Security, Defining Security Zones, DMZ
  • Wireshark win 32
  • Wireshark win 64