Differences between revisions 40 and 62 (spanning 22 versions)
Revision 40 as of 2011-03-20 14:44:58
Size: 2238
Editor: 24-151-193-255
Comment:
Revision 62 as of 2013-09-11 13:31:28
Size: 1793
Editor: scot
Comment:
Deletions are marked like this. Additions are marked like this.
Line 6: Line 6:
 * [[attachment:CPTR427_2011_Syllabus.pdf|2011 Syllabus]]
 * [[attachment:CPTR427_2011_Schedule.pdf|2011 Schedule]]
{{http://imgs.xkcd.com/comics/cryptography.png}}
Line 9: Line 8:
This page contains resources for Network Security CPTR 427. For assignments etc. see the [[https://www.southern.edu/moodle2|Eclass website]]. This page contains resources for Network Security CPTR 427. For assignments etc. see the [[https://eclass.e.southern.edu|Eclass website]].
Line 12: Line 11:
== Topics and resources == == Topics, Resources and Ideas for the future ==
Line 14: Line 13:
   * NetworkSecurityEssentials4 notes not from lectures or discussions
   * [[NetworkSecurity/Lab]]
   * [[NetworkSecurity/Tools]]
   * [[NetworkSecurity/Hacking]]
   * [[NetworkSecurity/Encryption]]
   * [[NetworkSecurity/FireWall]]
   * /NetworkSecurityEssentials4 notes from the book used in 2013.
   * [[/Lab]]
   * [[/Tools]]
   * [[/Programs]]
   * [[/Hacking]]
   * [[/Encryption]]
   * [[/Spam]]
   * [[/FireWall]]
   * [[/Topics]]
   * [[/SageIdeas]]
Line 22: Line 25:
   * Two proxy tools that allow editing and observing http(s) are [[NetworkSecurity/WebScarab|Web scarab]] and [[http://www.parosproxy.org/|Paros Proxy]]    * Two proxy tools that allow editing and observing http(s) are [[NetworkSecurity/WebScarab|Web scarab]] and [[http://www.parosproxy.org/|Paros Proxy]] - there is also some nice proxies specifically for firefox.
Line 25: Line 28:
   * [[http://web.nvd.nist.gov/view/vuln/search?execution=e2s1|National Vulnerability Database]]
   * Back in the stone age (relatively speaking of course) Dr. A took a course called [[Csce877]].
Line 29: Line 34:
'''Required Books''' '''Recommended Additional Books'''
Line 32: Line 37:
   * The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography ISBN: 0385495323
      * Each student must read this New York Times Best Seller.
      * Cryptography will be studied in conjunction with the assigned chapters.
   * Network Security Essentials 4th Ed. ISBN: 0-13-610805-9 NetworkSecurityEssentials4
      * The theory of cryptography (Symmetric, Public-key, Key-management, Hash and MAC) are covered from this book
      * Applications of theory are partially covered from this book (Kerberos, X.509, IPSec)
      * Dr. A will do all the lecturing on these topics.
   * Labs will be given from handouts. Topics will be take from [[NetworkSecurity/Lab]]

'''Recommended Book(s)'''

   * Snort IDS and IPS Toolkit ISBN-10: 1-59749-099-7
   * [[http://ofps.oreilly.com/titles/9781449320317/ch_Security.html|MVC 4 Security, Authentication and Authorization]]
Line 47: Line 41:
   * Cptr427Winter2010       * /Cptr427Winter2010

CPTR 427 Network Security Class Wiki

http://imgs.xkcd.com/comics/cryptography.png

This page contains resources for Network Security CPTR 427. For assignments etc. see the Eclass website. For information on what you should already know, take a look at NetworkSecurity/Prerequisites.

Topics, Resources and Ideas for the future

Books Used in this Class

Recommended Additional Books

Past Year Class Pages

NetworkSecurity (last edited 2024-01-07 18:12:17 by scot)