Introduction to Network Security J. H. Wang Feb. 24, 2011.

Slides:



Advertisements
Similar presentations
1 Computer Engineering Department Islamic University of Gaza ECOM 5347 Network Security Undergraduate Course Fall Prof. Mohammad A. Mikki Room.
Advertisements

CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Course Introduction.
ECE 355 Introduction to Computer Networks and Data Communications
Introduction to CS170. CS170 has multiple sections Each section has its own class websites URLs for different sections: Section 000:
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
“Network Security” Introduction. My Introduction Obaid Ullah Owais Khan Obaid Ullah Owais Khan B.E (I.T) – Hamdard University(2003), Karachi B.E (I.T)
1 CSE 651: Introduction to Network Security Steve Lai Spring 2010.
1 CSE 5351: Introduction to Cryptography Ten H. Lai Spring 2015 MW 3:55-5:15 PM, CL133.
Introduction to Operating Systems J. H. Wang Sep. 18, 2012.
Introduction to Information Security J. H. Wang Sep. 15, 2014.
Course Introduction Software Engineering
Network Security CS nd Term Course Syllabus Cairo University Faculty of Computers and Information.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
Introduction to Discrete Mathematics J. H. Wang Sep. 14, 2010.
Introduction to Operating Systems J. H. Wang Sep. 18, 2015.
@Yuan Xue CS 285 Network Security Fall 2008.
Course Overview for Web Computing J. H. Wang Sep. 19, 2011.
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
Computer Network Management Course
Introduction to Information Security J. H. Wang Sep. 10, 2013.
Data Warehousing/Mining 1 Data Warehousing/Mining Comp 150DW Course Overview Instructor: Dan Hebert.
1 CAP6133: Advanced Topics in Computer Security and Computer Forensics (spring’08) Class Overview Dr. Cliff Zou.
Object Oriented Programming (FIT-II) J. H. Wang Feb. 20, 2009.
Introduction to Operating Systems J. H. Wang Sep. 15, 2010.
1 CNT 4704 Analysis of Computer Communication Networks Cliff Zou Department of Electrical Engineering and Computer Science University of Central Florida.
8/25/2010CS 686 Course Outline and Questionnaire EJ Jung CS 686 Special Topics in CS Privacy and Security.
IST 210: Organization of Data
Introduction to Computer Programming (FIT-I pro) J. H. Wang Sep. 17, 2007.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
Course Overview for Compilers J. H. Wang Sep. 14, 2015.
Object Oriented Programming (FIT-II) J. H. Wang Jan. 31, 2008.
1 CDA 4527 Computer Networking Prof. Cliff Zou School of Computer Science University of Central Florida Fall 2005.
ICOM 5995 (crypto) - Noack Crypto - Administrivia Prontuario - Please time-share and ask questions Info is in my homepage amadeus.uprm.edu/~noack/ Make.
1 CDA 4527 Computer Communication Networking (not “analysis”) Prof. Cliff Zou School of Electrical Engineering and Computer Science University of Central.
Mohammad Alauthman 1/22/20162 This 3-credit first course for computer science & IT majors, which provides students the basic understanding.
Course Overview for Compilers J. H. Wang Sep. 20, 2011.
Introduction to Operating Systems J. H. Wang Sep. 13, 2013.
1 CNT 4704 Analysis of Computer Communication Networks Cliff Zou Department of Electrical Engineering and Computer Science University of Central Florida.
ECE 374: Computer Networks & Internet Introduction Spring 2012 Prof. Michael Zink.
Lecture 1 Page 1 CS 236 Online Introduction CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Course Overview: Linear Algebra
IST 210: ORGANIZATION OF DATA Introduction IST210 1.
KAIST CS710 Topics in Computational Architecture Wireless Networks and Security : Issues, Challenges and Research Trends Syllabus Network &
Computer Security Course Syllabus 1 Computer Security Lecturer : H.Ben Othmen.
Course Overview Stephen M. Thebaut, Ph.D. University of Florida Software Engineering.
CEN 621 Cryptography and Network Security Spring Term CEN 621 Cryptography and Network Security Spring Term INTERNATIONAL BURCH UNIVERSITY.
Introduction to Operating Systems
Computer Engineering Department Islamic University of Gaza
Course Introduction 공학대학원 데이타베이스
Syllabus Introduction to Computer Science
CNT 4704 Computer Communication Networking (not “analysis”)
Purpose of Class To prepare students for research and advanced work in security topics To familiarize students working in other networking areas with important.
Introduction to Information Security
Introduction to Information Security
CNT 4704 Computer Communication Networking (not “analysis”)
사물네트워크 시스템 보안 - Focused on Advanced Cryptography-
CNT 4704 Computer Communication Networking (not “analysis”)
Computer Networks Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 1 1.
CSCD 434 Network Security Spring 2012 Lecture 1 Course Overview.
Introduction to Operating Systems
Introduction to the course
CNT 4704 Analysis of Computer Communication Networks
CNT 4704 Analysis of Computer Communication Networks
Student Class Presentations Schedule
Computer Engineering Department Islamic University of Gaza ECOM 5347
CSCD 434 Network Security Spring 2019 Lecture 1 Course Overview.
ITEC 202 Operating Systems
Introduction to Course
Presentation transcript:

Introduction to Network Security J. H. Wang Feb. 24, 2011

Instructor –Jenq-Haur Wang ( 王正豪 ) –Assistant Professor, CSIE, NTUT –Office: R1534, Technology Building – –Homepage: –Tel: ext –Office Hour: 10:10-12:00am every Wednesday and Thursday

Course Overview Course: Network Security Time: 15:10-18:00pm on Thursdays Classroom: R526, 6th Teaching Building Prerequisite: Discrete Mathematics, Computer Networks Course webpage:

Target Students For those who –Major in Computer Science or Information Technology, and –Are familiar with basic computer networks and discrete mathematics, and –Are preparing to investigate more details in selected topics and recent developments in network and system security

Resources Textbook: Network Security Essentials: Applications and Standards, 4th ed., by William Stallings, Pearson Education, Inc., (International Edition, imported by Kai-Fa Publishing) – –Online chapters and appendices available References: – Cryptography and Network Security: Principles and Practice, Fifth Edition, by William Stallings, Prentice-Hall, 2011 (from which our textbook is adapted) –Slides, documents, and tools

Teaching Lectures Homework assignments –Homework should be turned in within two weeks Lab exercises or topical surveys –How to use a security tool –How do intruders attack our systems –How do we protect against attacks Mid-term and final exams

Grading Policy (Tentative) grading policy –Homework assignments: 30% –Attendance, lab exercises or topical surveys: 25% –Midterm and final exams: 45%

Course Description Introduction to basic concepts in network security and their applications –Cryptography Encryption, hash function, digital signature –Network security applications HTTPS, wireless security, security, IP security –System security Intrusion, virus, firewall

Outline & Schedule Outline –Introduction –Cryptography (Ch. 2-3) Symmetric encryption and message confidentiality Public-key cryptography and message authentication –Network security applications (Ch. 4-8) Key distribution and user authentication Transport-level security Wireless network security Electronic mail security IP security –System security (Ch. 9-11) Intruders Malicious software Firewalls

Outline & Schedule (Cont’) –Online chapters (Ch.12-13) Network management security Legal and ethical aspects

Outline & Schedule (Cont’) (Tentative) Schedule –Introduction: 1-2 wks –Cryptography: 3-4 wks –Network security applications: 7-8 wks TCP/IP Web, SSH, , IP security –System security: 1-2 wks Intrusion detection, password, virus, firewall Due to the time limits, we will try to cover most of the major topics above without going too much into details –E.g.: mathematical parts such as number theory (Appendix A) –A broad overview, and then focus on selected topics in depth

Additional Resources Review on computer networking and TCP/IP protocols Slides on network and information security Useful tools for network and system security Web resources and recommended reading (at the end of each chapter)

More on Lab Exercises or Topical Surveys We might give lab exercises or surveys in network security-related topics, e.g.: –Demonstration on how to use a network security tool –Comparison of security standards or algorithms –Potential security weakness in systems, and possible solutions or countermeasures –…

Thanks for Your Attention!