Network Security detailed syllabus for Cyber Security (Cyber Security) for 2021 regulation curriculum has been taken from the Anna University official website and presented for the Cyber Security students. For course code, course name, number of credits for a course and other scheme related information, do visit full semester subjects post given below.
For Cyber Security 6th Sem scheme and its subjects, do visit Cyber Security 6th Sem 2021 regulation scheme. The detailed syllabus of network security is as follows.
Course Objectives:
Download the iStudy App for all syllabus and other updates.

Unit I
FUNDAMENDALS OF NETWORKING SECURITY
Overview of networking security- Security Services -Confidentiality, Authentication, Integrity, Nonrepudiation, access Control – Availability and Mechanisms- Security Attacks -Interruption, Interception ,Modification and Fabrication.
Unit II
AUTHENTICATION AND SECURITY
Authentication overview – Authentication protocols – Authentication and key establishment – key exchange – mediated key exchange – User Authentication -password based authentication -password security – Certificate Authority and key management – digital signatures – digital Certificates.
Unit III
Download the iStudy App for all syllabus and other updates.

Unit IV
SECURITY ATTACKS
Buffer overflow attacks & format string vulnerabilities – Denial-of-Service Attacks -Hijacking attacks : exploits and defenses – Internet worms – viruses – spyware -phishing – botnets – TCP session hijacking – ARP attacks – route table modification – UDP hijacking – man-in-the-middle attacks.
Unit V
IP SECURITY AND WEB SECURITY
Network defense tools: Firewalls,VPNs, Intrusion Detection, and filters – Email privacy: Pretty Good Privacy (PGP) and S/MIME – Network security protocols in practice- Introduction to Wireshark – SSL – IPsec, and IKE -DNS security- Secure Socket Layer (SSL) and Transport Layer Security (TLS) – Secure Electronic Transaction (SET)
Practical Exercises
- Using Wireshark explore the different layer protocol headers.
- Demonstrate two different Certificates producing the same MD5 hash
- Computing MACs, HASH and HMAC for messages
- Implement and demonstrate Buffer overflow attack
- Implement and demonstrate Denial of service attacks (DoS ) and DDoS
- Implement the ARP attack and MITM
- Implement the Botnet attack detection using publically available dataset
- Explore and install Snort intrusion detection tool
- Implement Firewall rules using snort
- Generate the network attack and Detect the attack using Snort
Course Outcomes:
Download the iStudy App for all syllabus and other updates.

Text Books:
- Network Security Essentials (Applications and Standards) by William Stallings Pearson Education.
Reference Books:
- Hack Proofing your network by Ryan Russell, Dan Kaminsky, Rain Forest Puppy, Joe Grand, David Ahmad, Hal Flynn Ido Dubrawsky, Steve W.Manzuik and Ryan Permeh, Wiley Dreamtech
- Cryptography and network Security, Third edition, Stallings, PHI/Pearson
- A look back at Security Problems in the TCP/IP Protocol Suite, S. Bellovin, ACSAC 2004.
For detailed syllabus of all other subjects of Cyber Security, 2021 regulation curriculum do visit Cyber Security 6th Sem subject syllabuses for 2021 regulation.
For all Cyber Security results, visit Anna University Cyber Security all semester results direct link.