Differences between revisions 31 and 33 (spanning 2 versions)
Revision 31 as of 2011-01-09 15:21:18
Size: 2486
Editor: 71-88-174-166
Comment:
Revision 33 as of 2011-01-09 16:36:08
Size: 1879
Editor: 71-88-174-166
Comment:
Deletions are marked like this. Additions are marked like this.
Line 6: Line 6:
This page contains information about Network Security CPTR 427. For assignments see the [[http://eclassbeta.southern.edu/moodle|Eclass website]]. For past class check the bottom of this page for links. This page contains resources for Network Security CPTR 427. For assignments see the [[https://www.southern.edu/moodle2|Eclass website]].
For information on '''what you should already know''', take a look at [[NetworkSecurity/Prerequisites]].
Line 8: Line 9:
 * [[NetworkSecurity/Syllabus|Syllabus Winter 2011]]
 * [[NetworkSecurity/Schedule|Schedule Winter 2011]]


Before you get too involved with looking at what we plan to do this semester, you need to look at '''what you should already know'''. Take a look at [[NetworkSecurity/Prerequisites]].



Below is a list of areas and resources we will look at in NetworkSecurity
==Topics and resources==
Line 35: Line 28:
   * Hacking Exposed 6th Ed. ISBN: 978-0-07-161374-3
      * Each student will be responsible for presenting a chapter from this book.
      * Each student will be responsible for demonstrating an attack related to the chapter they present.
Line 41: Line 31:
   * Cryptography and Network Security 4th Ed. ISBN: 0-13-187316-4    * Network Security Essentials 4th Ed. ISBN: 0-13-610805-9
Line 45: Line 35:
   * Labs will be given from handouts and rely on internet and suggested resources. Topics will be take from [[NetworkSecurity/Lab]]


   * Labs will be given from handouts. Topics will be take from [[NetworkSecurity/Lab]]
Line 54: Line 41:
Past Year Class Pages. == Past Year Class Pages ==

CPTR 427 Network Security Class Wiki

This page contains resources for Network Security CPTR 427. For assignments see the Eclass website. For information on what you should already know, take a look at NetworkSecurity/Prerequisites.

==Topics and resources==

Books Used in this Class

Required Books

  • Snort Manual (Free)

  • The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography ISBN: 0385495323
    • Each student must read this New York Times Best Seller.
    • Cryptography will be studied in conjunction with the assigned chapters.
  • Network Security Essentials 4th Ed. ISBN: 0-13-610805-9
    • The theory of cryptography (Symmetric, Public-key, Key-management, Hash and MAC) are covered from this book
    • Applications of theory are partially covered from this book (Kerberos, X.509, IPSec)
    • Dr. A will do all the lecturing on these topics.
  • Labs will be given from handouts. Topics will be take from NetworkSecurity/Lab

Recommended Book(s)

  • Snort IDS and IPS Toolkit ISBN-10: 1-59749-099-7

Past Year Class Pages

NetworkSecurity (last edited 2024-01-07 18:12:17 by scot)