Differences between revisions 23 and 24
Revision 23 as of 2010-01-17 17:23:11
Size: 1938
Editor: 24-183-238-75
Comment:
Revision 24 as of 2010-03-22 01:27:14
Size: 2007
Editor: 24-183-238-75
Comment:
Deletions are marked like this. Additions are marked like this.
Line 22: Line 22:
   * [[http://www.securitywizardry.com/radar.htm|A nice dashboard]]

CPTR 427 Network Security Class Wiki

This page contains general information about security. For your specific class check the list below:

Before you get too involved with looking at what we plan to do this semester, you need to look at what you should already know. Take a look at NetworkSecurity/Prerequisites.

Below is a list of areas we will look at in NetworkSecurity

Books Used in this Class

Required Books

  • Snort Manual (Free)

  • Hacking Exposed 6th Ed. ISBN: 978-0-07-161374-3
    • Each student will be responsible for presenting a chapter from this book.
    • Each student will be responsible for demonstrating an attack related to the chapter they present.
  • The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography ISBN: 0385495323
    • Each student must read this New York Times Best Seller.
    • Cryptography will be studied in conjunction with the assigned chapters.
  • Cryptography and Network Security 4th Ed. ISBN: 0-13-187316-4
    • The theory of cryptography (Symmetric, Public-key, Key-management, Hash and MAC) are covered from this book
    • Applications of theory are partially covered from this book (Kerberos, X.509, IPSec)
    • Dr. A will do all the lecturing on these topics.
  • Labs will be given from handouts and rely on internet and suggested resources. Topics will be take from NetworkSecurity/Lab

Recommended Book(s)

  • Snort IDS and IPS Toolkit ISBN-10: 1-59749-099-7


CategoryHomepage

NetworkSecurity (last edited 2024-01-07 18:12:17 by scot)