{"id":300,"date":"2016-11-03T16:35:01","date_gmt":"2016-11-03T16:35:01","guid":{"rendered":"http:\/\/www.inspirenignite.com\/anna-university\/?p=300"},"modified":"2019-07-17T06:59:04","modified_gmt":"2019-07-17T06:59:04","slug":"anna-university-b-tech-it-r13-7th-security-laboratory-detailed-syllabus","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/anna-university\/anna-university-b-tech-it-r13-7th-security-laboratory-detailed-syllabus\/","title":{"rendered":"Anna University B.Tech IT (R13) 7th Security Laboratory Detailed Syllabus"},"content":{"rendered":"<p>Security Laboratory Syllabus for B.Tech 7th sem is covered here. This gives the details about credits, number of hours and other details along with reference books for the course.<\/p>\n<p>The detailed syllabus for Security Laboratory B.Tech (R13) seventhsem is as follows<\/p>\n<p><strong>OBJECTIVES:<\/strong> The student should be made to:<\/p>\n<ul>\n<li>Be exposed to the different cipher techniques<\/li>\n<li>Learn to implement the algorithms DES, RSA,MD5,SHA-1<\/li>\n<li>Learn to use tools like GnuPG, KF sensor, Net Strumbler<\/li>\n<\/ul>\n<p><strong>LIST OF EXPERIMENTS<\/strong><\/p>\n<ol>\n<li>Implement the following SUBSTITUTION &amp; TRANSPOSITION TECHNIQUES concepts:<br \/>\na) Caesar Cipher<br \/>\nb) Playfair Cipher<br \/>\nc) Hill Cipher<br \/>\nd) Vigenere Cipher<br \/>\ne) Rail fence \u2013 row &amp; Column Transformation<\/li>\n<li>Implement the following algorithms<br \/>\na) DES<br \/>\nb) RSA Algorithm<br \/>\nc) Diffiee-Hellman<br \/>\nd) MD5<br \/>\ne) SHA-1<\/li>\n<li>Implement the SIGNATURE SCHEME &#8211; Digital Signature Standard<\/li>\n<li>Demonstrate how to provide secure data storage, secure data transmission and for creating digital signatures (GnuPG).<\/li>\n<li>Setup a honey pot and monitor the honeypot on network (KF Sensor)<\/li>\n<li>Installation of rootkits and study about the variety of options<\/li>\n<li>Perform wireless audit on an access point or a router and decrypt WEP and WPA.( Net Stumbler)<\/li>\n<li>Demonstrate intrusion detection system (ids) using any tool (snort or any other s\/w)<\/li>\n<\/ol>\n<p style=\"text-align: center\"><strong><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">Download iStudy<\/a> <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">Android<\/a><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\"> App for complete Anna University syllabus, results, timetables and all other updates. There are no ads and no pdfs and will make your life way easier.<\/a><\/strong><\/p>\n<p><strong>TOTAL: 45 PERIODS <\/strong><\/p>\n<p><strong>OUTCOMES<\/strong>: At the end of the course, the student should be able to<\/p>\n<ul>\n<li>Implement the cipher techniques<\/li>\n<li>Develop the various security algorithms<\/li>\n<li>Use different open source tools for network security and analysis<\/li>\n<\/ul>\n<p><strong>LAB EQUIPMENTS FOR A BATCH OF 30 STUDENTS: <\/strong><\/p>\n<ul>\n<li><strong>SOFTWARE:<\/strong> C \/ C++ \/ Java or equivalent compiler GnuPG, KF Sensor or Equivalent, Snort, Net Stumbler or Equivalent<\/li>\n<li><strong>HARDWARE<\/strong>: Standalone desktops -30 Nos. (or) Server supporting 30 terminals or more.<\/li>\n<\/ul>\n<p>For all other B.Tech IT 7th sem syllabus go to <a href=\"http:\/\/www.inspirenignite.com\/anna-university\/anna-university-b-tech-information-technology-7th-sem-course-structure-for-r13-batch\/\">Anna University B.Tech Information Technology (IT) 7th Sem Course Structure for (R13) Batch.<\/a>\u00a0All details and yearly new syllabus will be updated here time to time.<\/p>\n<p>Do share with friends and in case of questions please feel free drop a comment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security Laboratory Syllabus for B.Tech 7th sem is covered here. This gives the details about credits, number of hours and other details along with reference books for the course. The [&hellip;]<\/p>\n","protected":false},"author":2259,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-300","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts\/300","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/users\/2259"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/comments?post=300"}],"version-history":[{"count":2,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts\/300\/revisions"}],"predecessor-version":[{"id":10606,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts\/300\/revisions\/10606"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/media?parent=300"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/categories?post=300"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/tags?post=300"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}