{"id":2237,"date":"2016-07-11T20:23:44","date_gmt":"2016-07-11T20:23:44","guid":{"rendered":"http:\/\/www.inspirenignite.com\/jntuh\/?p=2237"},"modified":"2021-10-27T20:58:08","modified_gmt":"2021-10-27T20:58:08","slug":"jntuh-b-tech-4th-year-2-sem-electronics-and-communication-engineering-r13-4-2-network-security-elective-iv-r13-syllabus","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/jntuh\/jntuh-b-tech-4th-year-2-sem-electronics-and-communication-engineering-r13-4-2-network-security-elective-iv-r13-syllabus\/","title":{"rendered":"JNTUH B.Tech 4th Year 2 sem Electronics and Communication Engineering R13 (4-2) Network Security (Elective &#8211; IV) R13 syllabus."},"content":{"rendered":"<p style=\"text-align: justify\">JNTUH B.Tech 4th year (4-2) Network Security gives you detail information of Network Security (Elective &#8211; IV) R13 syllabus It will be help full to understand you complete curriculum of the year.<\/p>\n<p style=\"text-align: justify\"><strong>Course Objectives<\/strong><\/p>\n<p style=\"text-align: justify\">The main objectives are<\/p>\n<ul style=\"text-align: justify\">\n<li>To acquire an understanding of network security and its changing character.<\/li>\n<li>To understand how network security is conceptualized and carried out.<\/li>\n<li>To examine conventional encryption and cryptography techniques.<\/li>\n<li>To articulate informed opinion about issues related to network IP security.<\/li>\n<li>To identify and investigate web security requirements.<\/li>\n<li>To appreciate the concepts of SNMP and design principles of firewall.<\/li>\n<\/ul>\n<p style=\"text-align: justify\"><strong>UNIT \u2014I<\/strong><\/p>\n<p style=\"text-align: justify\">Security Attacks: (Interruption, Interception, Modification and Fabrication), Security Services (Confidentiality, Authentication, Integrity, Non-repudiation, access Control and Availability) and Mechanisms, A model for Internetwork security, Internet Standards and RFCs, Buffer overflow &amp; format string vulnerabilities, TCP session hijacking, ARP attacks, route table modification, UDP hijacking, and man-in-the-middle attacks.<\/p>\n<p style=\"text-align: justify\"><strong>UNIT -II<\/strong><\/p>\n<p style=\"text-align: justify\">Conventional Encryption: Principles, Conventional encryption algorithms, cipher block modes of operation, location of encryption devices, key distribution Approaches of Message Authentication, Secure Hash Functions and HMAC.<\/p>\n<p style=\"text-align: justify\"><strong>UNIT-III<\/strong><\/p>\n<p style=\"text-align: justify\">Public Key Cryptography: principles, public key cryptography algorithms, digital signatures, digital Certificates, Certificate Authority and key management Kerberos, X.509 Directory Authentication Service. Email Privacy: Pretty Good Privacy (PGP) and S\/MIME.<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"color: #ff0000\">Download iStudy Android App for complete JNTUH syllabus, results, timetables and all other updates. There are no ads and no pdfs and will make your life way easier<\/span>.<\/strong><\/a><\/p>\n<p style=\"text-align: justify\"><strong>TEXT BOOKS<\/strong><\/p>\n<ul style=\"text-align: justify\">\n<li>Network Security Essentials (Applications and Standards) by William Stallings Pearson Education.<\/li>\n<li>Hack Proofing your network by Ryan Russell, Dan Kaminsky, Rain Forest Puppy, Joe Grand, David Ahmad, Hal Flynn Ido Dubrawsky, Steve W.Manzuik and Ryan Permeh, wiley Dreamtech<\/li>\n<\/ul>\n<p style=\"text-align: justify\"><strong>REFERENCE BOOKS<\/strong><\/p>\n<ul style=\"text-align: justify\">\n<li>Fundamentals of Network Security by Eric Maiwald (Dreamtech press)<\/li>\n<li>Network Security &#8211; Private Communication in a Public World by Charlie Kaufman, Radia Penman and Mike Speciner, Pearson\/PHI.<\/li>\n<li>Cryptography and network Security, Third Edition, Stallings, PHI\/Pearson<\/li>\n<li>Principles of Information Security, Whitman, Thomson.<\/li>\n<li>Network Security: The complete reference, Robert Bragg, Mark Rhodes, TMH<\/li>\n<li>Introduction to Cryptography, Buchmann, Springer.<\/li>\n<li>Network Security and Cryptography: Bernard Menezes, CENGAGE Learning.<\/li>\n<li>Information Systems Security,Godbole,Wiley Student Edition.<\/li>\n<li>Cryptography and network Security, B.A.Forouzan, D.Mukhopadhyay, 2nd Edition,TMH.<\/li>\n<\/ul>\n<p style=\"text-align: justify\"><strong>Course Outcomes<\/strong><\/p>\n<ul style=\"text-align: justify\">\n<li>Upon completion of the course, the student will be able to:<\/li>\n<li>Acquire an understanding of network security and its changing character.<\/li>\n<li>Understand conventional encryption and cryptography techniques.<\/li>\n<li>Analyze issues related to network IP security.<\/li>\n<li>Identify and investigate web security requirements.<\/li>\n<li>Know the concepts of SNMP and design principles of firewall.<\/li>\n<\/ul>\n<p style=\"text-align: justify\">For more information about all JNTU updates please stay connected to us on FB and don\u2019t hesitate to ask any questions in the comment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>JNTUH B.Tech 4th year (4-2) Network Security gives you detail information of Network Security (Elective &#8211; IV) R13 syllabus It will be help full to understand you complete curriculum of [&hellip;]<\/p>\n","protected":false},"author":2259,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[3,153,123,62],"tags":[],"class_list":["post-2237","post","type-post","status-publish","format-standard","hentry","category-ece","category-2nd-sem-2","category-4th-year","category-syllabus"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts\/2237","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/users\/2259"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/comments?post=2237"}],"version-history":[{"count":3,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts\/2237\/revisions"}],"predecessor-version":[{"id":17481,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts\/2237\/revisions\/17481"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/media?parent=2237"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/categories?post=2237"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/tags?post=2237"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}