5th Sem, IT

ITL502: Security Lab Syllabus for IT 5th Sem 2018 Pattern Mumbai University

Security Lab detailed syllabus scheme for Information Technology (IT), 2018 regulation has been taken from the University of Mumbai official website and presented for the Bachelor of Engineering students. For Course Code, Course Title, Test 1, Test 2, Avg, End Sem Exam, Team Work, Practical, Oral, Total, and other information, do visit full semester subjects post given below.

For all other Mumbai University Information Technology 5th Sem Syllabus 2018 Pattern, do visit IT 5th Sem 2018 Pattern Scheme. The detailed syllabus scheme for security lab is as follows.

Security Lab Syllabus for Information Technology TE 5th Sem 2018 Pattern Mumbai University

Security Lab

Lab Objectives:

For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdf platform to make students’s lives easier.
Get it on Google Play.

Lab Outcome:

Students will learn to:

  1. Apply the knowledge of symmetric cryptography to implement simple ciphers
  2. Analyze and implement public key algorithms like RSA and El Gamal
  3. Analyze and evaluate performance of hashing algorithms
  4. Explore the different network reconnaissance tools to gather information about networks
  5. Use tools like sniffers, port scanners and other related tools for analyzing packets in a network.
  6. Apply and set up firewalls and intrusion detection systems using open source technologies and to explore email security.

Hardware and Software requirements:

PC With following Configuration

  1. Windows or Linux Desktop OS
  2. wireshark
  3. Intel Core i3/i5/i7 Processor
  4. ARPWATCH
  5. 4 GB RAM
  6. Kismet, NetStumbler
  7. 500 GB Harddisk
  8. NESSUS

Prerequisites:

Computer Networks, Operating System, Basics of Java and Python Programming

Module I

For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdf platform to make students’s lives easier.
Get it on Google Play.

Module II

  1. Implementation of Diffie Hellman Key exchange algorithm
  2. For varying message sizes, test integrity of message using MD-5, SHA-1, and analyse the performance of the two protocols. Use crypt APIs
  3. Exploring wireless security tools like Kismet, NetStumbler etc. 4 LO2 LO3

Module III

  1. Study the use of network reconnaissance tools like WHOIS, dig,traceroute, nslookup to gather information about networks and domain registrars.
  2. Study of packet sniffer tools wireshark, :-
  1. Observer performance in promiscuous as well as non-promiscuous mode.
  2. Show the packets can be traced based on different filters. 4 LO4 LO5

Module IV

Download and install nmap. Use it with different options to scan open ports, perform OS fingerprinting, do a ping scan, tcp port scan, udp port scan, etc. 4 LO5

Module V

For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdf platform to make students’s lives easier.
Get it on Google Play.

Module VI

  1. Set up IPSEC under LINUX.
  2. Set up Snort and study the logs.
  3. Explore the GPG tool of linux to implement email security 4 LO6

Text Books:

  1. Build your own Security Lab, Michael Gregg, Wiley India
  2. CCNA Security, Study Guide, TIm Boyles, Sybex

Reference Books:

  1. Network Security Bible, Eric Cole, Wiley India

Term Work:

For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdf platform to make students’s lives easier.
Get it on Google Play.

For detail syllabus of all other subjects of Information Technology (IT) 5th Sem 2018 regulation, visit IT 5th Sem Subjects syllabus for 2018 regulation.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.