Differences between revisions 17 and 24 (spanning 7 versions)
Revision 17 as of 2009-11-04 02:17:17
Size: 1798
Editor: 24-183-238-75
Comment:
Revision 24 as of 2010-03-22 01:27:14
Size: 2007
Editor: 24-183-238-75
Comment:
Deletions are marked like this. Additions are marked like this.
Line 6: Line 6:
This page contains general information about security. For your specific class check the list below:

   * Cptr427Winter2010

Line 7: Line 12:

Line 15: Line 22:
   * [[http://www.securitywizardry.com/radar.htm|A nice dashboard]]
Line 22: Line 30:
   * [[http://www.snort.org/assets/125/snort_manual-2_8_5_1.pdf|Snort Manual]] (Free)
   * Hacking Exposed 6th Ed. ISBN:978-0-07-161374-3
   * [[http://www.snort.org/assets/125/snort_manual-2_8_5_1.pdf | Snort Manual]] (Free)
   * Hacking Exposed 6th Ed. ISBN: 978-0-07-161374-3
Line 33: Line 41:
   * Labs will be given from handouts and rely on internet and suggested resources. Topics will be divided between
      *
   * Labs will be given from handouts and rely on internet and suggested resources. Topics will be take from [[NetworkSecurity/Lab]]
Line 39: Line 46:
'''Recommended Books''' '''Recommended Book(s)'''
Line 42: Line 49:
   
Line 43: Line 51:

   * IpSec

CPTR 427 Network Security Class Wiki

This page contains general information about security. For your specific class check the list below:

Before you get too involved with looking at what we plan to do this semester, you need to look at what you should already know. Take a look at NetworkSecurity/Prerequisites.

Below is a list of areas we will look at in NetworkSecurity

Books Used in this Class

Required Books

  • Snort Manual (Free)

  • Hacking Exposed 6th Ed. ISBN: 978-0-07-161374-3
    • Each student will be responsible for presenting a chapter from this book.
    • Each student will be responsible for demonstrating an attack related to the chapter they present.
  • The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography ISBN: 0385495323
    • Each student must read this New York Times Best Seller.
    • Cryptography will be studied in conjunction with the assigned chapters.
  • Cryptography and Network Security 4th Ed. ISBN: 0-13-187316-4
    • The theory of cryptography (Symmetric, Public-key, Key-management, Hash and MAC) are covered from this book
    • Applications of theory are partially covered from this book (Kerberos, X.509, IPSec)
    • Dr. A will do all the lecturing on these topics.
  • Labs will be given from handouts and rely on internet and suggested resources. Topics will be take from NetworkSecurity/Lab

Recommended Book(s)

  • Snort IDS and IPS Toolkit ISBN-10: 1-59749-099-7


CategoryHomepage

NetworkSecurity (last edited 2024-01-07 18:12:17 by scot)