Security Lab detailed syllabus scheme for Information Technology (IT), 2018 regulation has been taken from the University of Mumbai official website and presented for the Bachelor of Engineering students. For Course Code, Course Title, Test 1, Test 2, Avg, End Sem Exam, Team Work, Practical, Oral, Total, and other information, do visit full semester subjects post given below.
For all other Mumbai University Information Technology 5th Sem Syllabus 2018 Pattern, do visit IT 5th Sem 2018 Pattern Scheme. The detailed syllabus scheme for security lab is as follows.
Security Lab Syllabus for Information Technology TE 5th Sem 2018 Pattern Mumbai University
Lab Objectives:
For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdf platform to make students’s lives easier..
Lab Outcome:
Students will learn to:
- Apply the knowledge of symmetric cryptography to implement simple ciphers
- Analyze and implement public key algorithms like RSA and El Gamal
- Analyze and evaluate performance of hashing algorithms
- Explore the different network reconnaissance tools to gather information about networks
- Use tools like sniffers, port scanners and other related tools for analyzing packets in a network.
- Apply and set up firewalls and intrusion detection systems using open source technologies and to explore email security.
Hardware and Software requirements:
PC With following Configuration
- Windows or Linux Desktop OS
- wireshark
- Intel Core i3/i5/i7 Processor
- ARPWATCH
- 4 GB RAM
- Kismet, NetStumbler
- 500 GB Harddisk
- NESSUS
Prerequisites:
Computer Networks, Operating System, Basics of Java and Python Programming
Module I
For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdf platform to make students’s lives easier..
Module II
- Implementation of Diffie Hellman Key exchange algorithm
- For varying message sizes, test integrity of message using MD-5, SHA-1, and analyse the performance of the two protocols. Use crypt APIs
- Exploring wireless security tools like Kismet, NetStumbler etc. 4 LO2 LO3
Module III
- Study the use of network reconnaissance tools like WHOIS, dig,traceroute, nslookup to gather information about networks and domain registrars.
- Study of packet sniffer tools wireshark, :-
- Observer performance in promiscuous as well as non-promiscuous mode.
- Show the packets can be traced based on different filters. 4 LO4 LO5
Module IV
Download and install nmap. Use it with different options to scan open ports, perform OS fingerprinting, do a ping scan, tcp port scan, udp port scan, etc. 4 LO5
Module V
For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdf platform to make students’s lives easier..
Module VI
- Set up IPSEC under LINUX.
- Set up Snort and study the logs.
- Explore the GPG tool of linux to implement email security 4 LO6
Text Books:
- Build your own Security Lab, Michael Gregg, Wiley India
- CCNA Security, Study Guide, TIm Boyles, Sybex
Reference Books:
- Network Security Bible, Eric Cole, Wiley India
Term Work:
For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdf platform to make students’s lives easier..
For detail syllabus of all other subjects of Information Technology (IT) 5th Sem 2018 regulation, visit IT 5th Sem Subjects syllabus for 2018 regulation.