{"id":3098,"date":"2021-06-20T03:38:05","date_gmt":"2021-06-20T03:38:05","guid":{"rendered":"https:\/\/www.inspirenignite.com\/kl\/6262-information-network-security-kl-diploma-syllabus-for-it-6th-sem-2015-revision-sitttr\/"},"modified":"2021-06-20T03:38:05","modified_gmt":"2021-06-20T03:38:05","slug":"6262-information-network-security-kl-diploma-syllabus-for-it-6th-sem-2015-revision-sitttr","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/kl\/6262-information-network-security-kl-diploma-syllabus-for-it-6th-sem-2015-revision-sitttr\/","title":{"rendered":"6262: Information &amp; Network Security KL Diploma Syllabus for IT 6th Sem 2015 Revision SITTTR"},"content":{"rendered":"<p align=\"justify\">Information &amp; Network Security detailed syllabus for Information Technology (IT) for 2015 revision curriculum has been taken from the <a class=\"rank-math-link\" href=\"http:\/\/www.sitttrkerala.ac.in\/\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">SITTTRs<\/a> official website and presented for the IT students. For course code, course name, number of credits for a course and other scheme related information,  do visit full semester subjects post given below. <\/p>\n<p align=\"justify\">For Information Technology 6th Sem scheme and its subjects, do visit <a class=\"rank-math-link\" href=\"..\/information-technology-it-kl-diploma-syllabus-for-6th-sem-2015-revision-sitttr\">IT 6th Sem 2015 revision scheme<\/a>. The detailed syllabus of information &amp; network security is as follows. <\/p>\n<p>  <title>Information &amp; Network Security<\/title><\/p>\n<h4>COURSE OUTCOMES:<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete syllabus, results, class timetable, and many other features kindly download the <a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.   <\/p>\n<h4>Specific Outcomes:<\/h4>\n<p align=\"justify\">\n  MODULE &#8211; I: Introduction to Cryptography<\/p>\n<ol>\n<li>Understand Computer and Data Security concepts\n<ol type=\"i\">\n<li>Define Confidentiality, Integrity and availability.<\/li>\n<li>Distinguish between active and passive security attacks<\/li>\n<li>Explain the different categories of Passive attacks.<\/li>\n<li>Explain the different types of Active attacks.<\/li>\n<li>Explain the Network Security Model<\/li>\n<li>Demonstrate the Model for Network Security<\/li>\n<li>Explain the Symmetric Cipher Model<\/li>\n<li>Explain the various substitution technique Caesar Cipher with example<\/li>\n<li>Explain the various substitution technique Mono-alphabetic Ciphers with example<\/li>\n<li>Explain the various substitution technique Poly-alphabetic Ciphers with example<\/li>\n<li>Explain the various substitution technique One-Time Pad<\/li>\n<li>Compare the Substitution techniques &#8211; Caesar Cipher, Mono-alphabetic Ciphers, Poly-alphabetic Ciphers and One-Time Pad<\/li>\n<li>Simulate the various substitution techniques learned.<\/li>\n<li>Describe Transposition Techniques<\/li>\n<li>Define Stegnography<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p>  MODULE &#8211; II: Symmetric and Asymmetric Ciphers<\/p>\n<ol>\n<li>Comprehend Symmetric Ciphers\n<ol type=\"i\">\n<li>Define Symmetric Cipher<\/li>\n<li>Describe the DES method, its encryption and decryption procedures<\/li>\n<li>Analyze the strength of DES<\/li>\n<li>Describe the AES method of cryptography &#8211; structure and Encryption Decryption methods<\/li>\n<li>Compare and Judge the performance of DES and AES algorithms<\/li>\n<\/ol>\n<\/li>\n<li>Comprehend Asymmetric Ciphers\n<ol type=\"i\">\n<li>Define Asymmetric Cipher<\/li>\n<li>State Fermat&#8217;s theorem<\/li>\n<li>State Euler&#8217;s theorem.<\/li>\n<li>Explain the Public Key cryptosystems<\/li>\n<li>List the essential steps in Public Key encryption<\/li>\n<li>Describe the elements of public encryption system<\/li>\n<li>Compare the symmetric key and public key encryption system.<\/li>\n<li>Describe the RSA algorithm<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p>  MODULE &#8211; III: Cryptographic Data Integrity Algorithms<\/p>\n<ol>\n<li>Understand the Data Integrity algorithms\n<ol type=\"i\">\n<li>Describe the applications of Cryptographic Hash functions<\/li>\n<li>Describe message authentication<\/li>\n<li>Explain the logic of SHA 1 algorithm<\/li>\n<li>Describe the different types of attacks in the context of communications across a network<\/li>\n<li>Summarize the Message Authentication Requirements<\/li>\n<li>Summarize Message Authentication Functions<\/li>\n<li>Describe the basic idea of Message Authentication Code<\/li>\n<\/ol>\n<\/li>\n<li>Understand the concept of Digital Signatures\n<ol type=\"i\">\n<li>Define Digital Signature<\/li>\n<li>Explain the properties of Digital Signature<\/li>\n<li>Identify the Digital Signature Requirements<\/li>\n<li>Explain the Digital Signature Algorithm<\/li>\n<li>Describe techniques for the distribution of public keys\n<ol type=\"a\">\n<li>Public announcement<\/li>\n<li>Publicly available directory<\/li>\n<li>Public-key authority<\/li>\n<li>Public-key certificates<\/li>\n<\/ol>\n<\/li>\n<li>Recognize the importance of X.509 Certificates<\/li>\n<li>Illustrate the Public-Key Certificate Use with figure<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p>  MODULE &#8211; IV: Network Security<\/p>\n<ol>\n<li>Understand the various Network Security concepts\n<ol type=\"i\">\n<li>List the web security considerations<\/li>\n<li>Explain the SSL architecture<\/li>\n<li>Define the SSL concepts Connection and Session.<\/li>\n<li>Write the parameters that defines a session state.<\/li>\n<li>Write the parameters that defines a Connection state.<\/li>\n<li>Define HTTPS<\/li>\n<li>Describe HTTPS<\/li>\n<li>Describe the importance of HTTPS in web<\/li>\n<li>Describe SSH Protocol Stack<\/li>\n<\/ol>\n<\/li>\n<li>Recognize the Wireless LAN security issues\n<ol type=\"i\">\n<li>Write a short description on Wireless LAN Security<\/li>\n<li>List down the various 802.11i services<\/li>\n<li>Assess the different IEEE 802.11i Phases of Operation<\/li>\n<li>Define Wireless Markup Language<\/li>\n<li>Explain WAP Architecture<\/li>\n<li>Explain IPsec applications<\/li>\n<li>Discuss the benefits of IPSec<\/li>\n<li>List down the IPSec Services<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<h4>MODULE &#8211; I:<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete syllabus, results, class timetable, and many other features kindly download the <a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.   <\/p>\n<h4>MODULE &#8211; II:<\/h4>\n<p align=\"justify\">\n  Symmetric and Assymteric Ciphers Symmetric Ciphers: Data Encryption Standard (DES)- DES Encryption, DES Decryption, Strength of DES. AES &#8211; General Structure, Detailed Structure, AES Encryption and Decryption. Asymmetric Cyphers: Fermat&#8217;s Theorem and Eulers&#8217;s Theorem, Public-Key Cryptosystems, RSA Algorithm -Description of the Algorithm.\n<\/p>\n<h4>MODULE &#8211; III:<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete syllabus, results, class timetable, and many other features kindly download the <a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.   <\/p>\n<h4>MODULE &#8211; IV:<\/h4>\n<p align=\"justify\">\n  Network Security Web Security Considerations, SSL Architecture, HTTPS, SSH Protocol Stack, Wireless LAN Security &#8211; IEEE 802.11i Services, IEEE 802.11i Phases of Operation, Wireless Application ProtocolOverview, IP Security overview.\n<\/p>\n<h4>Text Books:<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete syllabus, results, class timetable, and many other features kindly download the <a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.   <\/p>\n<h4>Reference Books:<\/h4>\n<p align=\"justify\">\n<ol>\n<li>Network Security: Private Communication in a Public World &#8211; Charlie Kaufman, Radia Perlman, Mike Speciner, Prentice Hall Publication, Second Edition.<\/li>\n<li>Network Security and Cryptography- Bernard L. Menezes, Cengage Learning 2011<\/li>\n<li>Behrouz A. Frouzan, Cryptography and Network Security, TMH Publication, third edition, 2004<\/li>\n<\/ol>\n<p align=\"justify\">For detailed syllabus of all other subjects of Information Technology, 2015 revision curriculum do visit <a class=\"rank-math-link\" href=\"..\/category\/it+6th-sem\">IT 6th Sem subject syllabuses for 2015 revision<\/a>. <\/p>\n<p align=\"justify\">To see the syllabus of all other branches of diploma 2015 revision curriculum do visit <a class=\"rank-math-link\" href=\"https:\/\/www.inspirenignite.com\/kl\/kerala-diploma-syllabus\/\">all branches of SITTTR diploma 2015 revision<\/a>. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Information &amp; Network Security detailed syllabus for Information Technology (IT) for 2015 revision curriculum has been taken from the SITTTRs official website and presented for the IT students. For course [&hellip;]<\/p>\n","protected":false},"author":2462,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[37,52],"tags":[],"class_list":["post-3098","post","type-post","status-publish","format-standard","hentry","category-6th-sem","category-it"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/posts\/3098","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/users\/2462"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/comments?post=3098"}],"version-history":[{"count":0,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/posts\/3098\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/media?parent=3098"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/categories?post=3098"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/tags?post=3098"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}