Networking Security | Welcome to breEDU

Email: admin@breedu.com Call Us: 510.259.9696

Networking Security

Course Description

Network Security studies the concepts and tools used to prevent and monitor unauthorized access, misuse, modification, or denial of  a computer network or network resources. In this course, students will learn the fundamentals of network security – cryptography, popular security applications and packages, as well as real world projects designed to put the students’ skills to the test. At the end of the course, the students should have through understanding of the themes and challenges of network security, the role of cryptography, the techniques for access control and intrusion detection, and skills to implementing security protocols. This course is suitable for students who wish to become network security specialists, as well as those who are interested in cryptography.

Who Should Attend

• College students who are studying computer networking

• Those who are trying to obtain a job as a network security officer

• Network administrators

• IT specialists

• Computer science majors

Total Hours

To Be Announced

Instructor

To Be Announced

Course Content

Module 1: Introduction to Network Security

  • assets, threats, countermeasures;
  • network security models, security functions: confidentiality, authentication, integrity, nonrepudiation, access control, availability, passive and active attacks, end-to-end vs link-to-link encrypion

 

Module 2: Cryptography

  • symmetric and asymmetric key systems, message integrity (hashing functions)
  • digital signature, digital certificate, key management, and familiarity with common standards for these techniques

 

Module 3: Cryptography in real world applications

  • PGP, SSL, IPSec, with SSL as focus, major components of SSL protocol and its role in electronic commerce
  • set up https web server, apply and integrate digital certificate with browsers, web servers, and communication protocols on the Web;

 

Module 4: Intruders and Programmed Threats

  • hose access, passwords systems and attacks, one-time passwords, token cards, biometrics, trapdoors
  • logic bombs trojan horses, viruses, worms, countermeasures, intrusion detection.

 

Module 5: Firewalls

  • internet security plicies, firewall design goals, firewall controls, TCP/IP, Packet filtering routers
  • application-level gateways, circuit-level gateways, firewall architectures, VPNs

 

Module 6: Web Security:

  • WWW, web servers, CGI, active content, Java applets.
  • Java security model: sandbox, class loaders, bytecode verification, security manager, Java attacks, bypassing Java, mobile code cryptography

 

Module 7: Applied Cryptography

  • Software libraries including Open SSL, RSA’s libraries, Microsoft’s security libraries, and Java-based security software.
  • JCE, JCA, JSSE, JAAS, Language-Level Security, Java Virtual Machine-level Security, API-Level Security Features, Using the Security Packages, Browser-level Security, and Signing Java Programs.


© Copyright 2014 breEDU.com. All rights reserved.

Bay Area Web Design by Verecom.com