Network Security Standards and Applications Evaluation Detailed Syllabus for Computer Networks and Information Security M.Tech first year second sem is covered here. This gives the details about credits, number of hours and other details along with reference books for the course.
The detailed syllabus for Network Security Standards and Applications Evaluation M.Tech 2017-2018 (R17) first year second sem is as follows.
M.Tech. I Year II Sem.
Course Objectives:
- Compile, analyze, and assess the applicability of best practices in addressing information security issues relevant to the cyber security community
- Evaluate the impact of business constraints and processes on the implementation of network security programs
- Integrate principles and techniques of risk analysis, project planning and change management in the development of network security strategies
- Demonstrate secondary research skills in the investigation and selection of best practice solutions to address network security challenges
- Demonstrate mastery of theory, concepts and skills in addressing specialized aspects of network security Applications
UNIT I : Introduction to Information Security: Introduction, Critical Characteristics, threats to information Security, Attacks on Information Security, Security Professionals and the Organization, Information Security Policies, Standards and Practices, Frameworks for Industry Standards in Information Security.
UNIT II : Auditing, Monitoring, and Logging: Monitoring Network Systems, Configuration and Change Management, Introduction to security audits, need for security audits, organizational roles, Auditor’s roles, Types of security audits, Audit approaches, Technology based audits ,Auditing (Formal Reviews), Systems Certification, Accreditation and Authorization,
UNIT III : Contingency Planning and Networking Incident Response: Introduction, What is Contingency Planning?, Incedent Response Plan, Network Authentication and Remote Access Using VPN: Introduction, Access Control, Virtual Private Networks.
UNIT IV : Network Monitoring and Intrusion Detection and Prevention Systems: Introduction, Network monitoring Software : Packet Sniffing, Intrusion Detection and Prevention Systems, Honeypots and Honeynets.
UNIT V : Wireless Network Security: Introduction, Wireless Technologies and Standards, Wireless Architectures and Topologies, Wireless Security Protocols, WLAN Security Concerns, Bluetooth
TEXT BOOKS:
- Guide to Network Security by Michael Whitman, Herb Mattord,David Mackey, Andrew Green Cengage Learinng
- Information Systems Security, Nina Godbole, Wiley India, 2009
- Principles and Practices of Information Security. Michael E. Whitman, Herbert J. Mattord, Cengage Learning,
REFERENCES:
- Microsoft Security Risk Management Guide
- Risk Management Guide for Information Technology Systems
http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf - OCTAVE approach http://www.cert.org/octave/
- COBIT http://www.isaca.org/
- Guide to Firewalls and Policies (Unit 3) http://csrc.nist.gov/publications/nistpubs/800- 41/sp800-41.pdf
- Firewalls and Network Security, Micheal E.Whitman, et al. Cengage Learning, 2008
- Audit Trails (Unit 7) http://csrc.nist.gov/publications/nistpubs/800-12/800-12- html/chapter18.html
- Information Security Management Handook, Harold F. Tipton, CRC Press, 2012
- Information Security Policies and Procedures, 2nd Edition, Thomas R. Peltier, Auerbach, 2004
For all other M.Tech 1st Year 2nd Sem syllabus go to JNTUH M.Tech Computer Networks and Information Security 1st Year 2nd Sem Course Structure for (R17) Batch.
All details and yearly new syllabus will be updated here time to time. Subscribe, like us on facebook and follow us on google plus for all updates.
Do share with friends and in case of questions please feel free drop a comment.