{"id":55257,"date":"2023-08-28T07:12:42","date_gmt":"2023-08-28T07:12:42","guid":{"rendered":"https:\/\/www.inspirenignite.com\/anna-university\/cb3602-network-security-syllabus-for-cyber-security-2021-regulation\/"},"modified":"2023-08-28T07:12:42","modified_gmt":"2023-08-28T07:12:42","slug":"cb3602-network-security-syllabus-for-cyber-security-2021-regulation","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/anna-university\/cb3602-network-security-syllabus-for-cyber-security-2021-regulation\/","title":{"rendered":"CB3602: Network Security syllabus for Cyber Security 2021 regulation"},"content":{"rendered":"<p align=\"justify\">Network Security detailed syllabus for Cyber Security (Cyber Security) for 2021 regulation curriculum has been taken from the <a class=\"rank-math-link\" href=\"https:\/\/cac.annauniv.edu\/\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Anna University<\/a> official website and presented for the Cyber Security students. For course code, course name, number of credits for a course and other scheme related information,  do visit full semester subjects post given below. <\/p>\n<p align=\"justify\">For Cyber Security 6th Sem scheme and its subjects, do visit <a class=\"rank-math-link\" href=\"..\/cyber-security-6th-sem-syllabus-2021-regulation\">Cyber Security 6th Sem 2021 regulation scheme<\/a>. The detailed syllabus of network security is as follows. <\/p>\n<p><h4>Course Objectives:<\/h4>\n<h4 id=\"istudy\" style=\"text-align:center\"><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Download the iStudy App for all syllabus and other updates.<\/a><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px;text-align:center\"><\/a><\/h4>\n<p><h4>Unit I<\/h4>\n<p>FUNDAMENDALS OF NETWORKING SECURITY<br \/>\nOverview of networking security- Security Services -Confidentiality, Authentication, Integrity, Nonrepudiation, access Control &#8211; Availability and Mechanisms- Security Attacks -Interruption, Interception ,Modification and Fabrication.\n<\/p>\n<p><h4>Unit II<\/h4>\n<p>AUTHENTICATION AND SECURITY<br \/>\nAuthentication overview &#8211; Authentication protocols &#8211; Authentication and key establishment &#8211; key exchange &#8211; mediated key exchange &#8211; User Authentication -password based authentication -password security &#8211; Certificate Authority and key management &#8211; digital signatures &#8211; digital Certificates.\n<\/p>\n<p><h4>Unit III<\/h4>\n<h4 id=\"istudy\" style=\"text-align:center\"><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Download the iStudy App for all syllabus and other updates.<\/a><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px;text-align:center\"><\/a><\/h4>\n<p><h4>Unit IV<\/h4>\n<p>SECURITY ATTACKS<br \/>\nBuffer overflow attacks &amp; format string vulnerabilities &#8211; Denial-of-Service Attacks -Hijacking attacks : exploits and defenses &#8211; Internet worms &#8211; viruses &#8211; spyware -phishing &#8211; botnets &#8211; TCP session hijacking &#8211; ARP attacks &#8211; route table modification &#8211; UDP hijacking &#8211; man-in-the-middle attacks.\n<\/p>\n<p><h4>Unit V<\/h4>\n<p>IP SECURITY AND WEB SECURITY<br \/>\nNetwork defense tools: Firewalls,VPNs, Intrusion Detection, and filters &#8211; Email privacy: Pretty Good Privacy (PGP) and S\/MIME &#8211; Network security protocols in practice- Introduction to Wireshark &#8211; SSL &#8211; IPsec, and IKE -DNS security- Secure Socket Layer (SSL) and Transport Layer Security (TLS) &#8211; Secure Electronic Transaction (SET)\n<\/p>\n<p><h4>Practical Exercises<\/h4>\n<ol>\n<li>Using Wireshark explore the different layer protocol headers.<\/li>\n<li>Demonstrate two different Certificates producing the same MD5 hash<\/li>\n<li>Computing MACs, HASH and HMAC for messages<\/li>\n<li>Implement and demonstrate Buffer overflow attack<\/li>\n<li>Implement and demonstrate Denial of service attacks (DoS ) and DDoS<\/li>\n<li>Implement the ARP attack and MITM<\/li>\n<li>Implement the Botnet attack detection using publically available dataset<\/li>\n<li>Explore and install Snort intrusion detection tool<\/li>\n<li>Implement Firewall rules using snort<\/li>\n<li>Generate the network attack and Detect the attack using Snort<\/li>\n<\/ol>\n<p><h4>Course Outcomes:<\/h4>\n<h4 id=\"istudy\" style=\"text-align:center\"><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Download the iStudy App for all syllabus and other updates.<\/a><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px;text-align:center\"><\/a><\/h4>\n<p><h4>Text Books:<\/h4>\n<ol>\n<li>Network Security Essentials (Applications and Standards) by William Stallings Pearson Education.<\/li>\n<\/ol>\n<p><h4>Reference Books:<\/h4>\n<ol>\n<li>Hack Proofing your network by Ryan Russell, Dan Kaminsky, Rain Forest Puppy, Joe Grand, David Ahmad, Hal Flynn Ido Dubrawsky, Steve W.Manzuik and Ryan Permeh, Wiley Dreamtech<\/li>\n<li>Cryptography and network Security, Third edition, Stallings, PHI\/Pearson<\/li>\n<li>A look back at Security Problems in the TCP\/IP Protocol Suite, S. Bellovin, ACSAC 2004.<\/li>\n<\/li>\n<\/ol>\n<p align=\"justify\">For detailed syllabus of all other subjects of Cyber Security, 2021 regulation curriculum do visit <a class=\"rank-math-link\" href=\"..\/category\/cyber-security+6th-sem\">Cyber Security 6th Sem subject syllabuses for 2021 regulation<\/a>. <\/p>\n<p align=\"justify\">For all Cyber Security results, visit <a class=\"rank-math-link\" href=\"https:\/\/www.inspirenignite.com\/anna-university\/anna-university-results\/\">Anna University Cyber Security all semester results<\/a> direct link. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Network Security detailed syllabus for Cyber Security (Cyber Security) for 2021 regulation curriculum has been taken from the Anna University official website and presented for the Cyber Security students. For [&hellip;]<\/p>\n","protected":false},"author":2297,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[49,158],"tags":[],"class_list":["post-55257","post","type-post","status-publish","format-standard","hentry","category-6th-sem","category-cyber-security"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts\/55257","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/users\/2297"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/comments?post=55257"}],"version-history":[{"count":0,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts\/55257\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/media?parent=55257"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/categories?post=55257"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/tags?post=55257"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}