TELCOM 2821: Network Security

Spring 2009: Syllabus


The objective of this course is to provide a foundation of network related security issues. It builds upon concepts of security such as confidentiality, integrity and authentication and on cryptography. The course covers common attacks originating from the network, assessment of network security, prevention and detection of attacks, and response to attacks. Common attacks considered include attacks on TCP/IP and DDoS attacks. Prevention mechanisms considered include cryptographic protocols for dial-up security (PAP, CHAP, RADIUS, Diameter), WLAN security, IPSec & SSL based VPNs, e-mail security (PGP, S/MIME); Kerberos; X.509 certificates; AAA and Mobile IP; SNMP security;. Also perimeter defense using firewalls is considered (filters and gateways; policies and implementation of firewall policies; Stateful firewalls; Firewall appliances). Detection and response schemes will review IDS and IPS, monitoring, housekeeping and management schemes.

Prerequisites:

TELCOM 2810 or 2820, TELCOM 2310/2000, C or Java Programming

Contact Information:

Prashant Krishnamurthy
Office: DIST 718
Phone: 412-624-5144
E-mail: prashant AT mail DOT sis DOT pitt DOT edu
Course webpage: http://www2.sis.pitt.edu/~prashant/tel2821
Office hours: TBA
GSA: TBA

Textbooks (Required):

Network Security: Private Communication in a Public World - by C. Kaufmann, R. Perlman and M. Speciner, Prentice Hall PTR, 2002. (ISBN: 0130460192)

Firewalls and Internet Security - by W.R. Cheswick, S.M. Bellovin and A.D. Rubin, Addison-Wesley, 2003. (ISBN: 020163466X)

References:

  • Introduction to Network Security, by D. Jacobson, Chapman and Hall, 2009
  • Penetration Testing and Network Defense, by A. Whitaker and D. Newman, Cisco Press, 2005
  • Network Security Essentials, Second Edition, by W. Stallings, Prentice Hall, 2003.
  • Network Intrusion Detection: An Analyst's Handbook, by S. Northcutt and J. Novak, New Riders, Indianapolis, 2001.
  • Inside Network Perimeter Security, by S. Northcutt and others, New Riders, Indianapolis, 2005.
  • Real 802.11 Security: Wi-Fi Protected Access and 802.11i, by J. Edney and W.A. Arbaugh, Prentice Hall, 2004.
  • Mastering Networks: An Internet Lab Manual, by J. Liebeherr and M. El Zarki, Addison-Wesley, 2003.
  • The Tao of Network Security Monitoring, by Richard Bejtlich, Addison-Wesley, 2004.
  • Computer Networks: Internet Protocols in Action, by Jeanna Matthews, John Wiley and Sons, 2005.
  • Network Security Assessment: Know Your Network, by Chris McNab, O'Reilly Books, 2004.
  • Computer Network Security by J.M. Kizza, Springer 2005.
  • Papers from conferences and journals
  • US-CERT/CERT advisories
  • Grading:

    Homework/Labs 30%
    Bi-Weekly Quiz 20%
    Midterm 20%
    Final 30%

    Policies:

  • All work must be the student's own unless collaboration is explicitly permitted. Any violation will result in an F without discussion.
  • Late assignments will not be accepted unless there are exceptional circumstances.
  • Homework is due ONE week after it is assigned unless otherwise mentioned.
  • Homework will be assigned every week unless otherwise mentioned.
  • Check for homework on the webpage even if it is not explicitly mentioned in class
  • Labs will be due TWO weeks after assignment
  • Students are responsible for doing the labs and submitting the reports to the GSA
  • Check for lab instructions and changes on the webpage regularly
  • Keep checking the webpage for other changes regularly
  • All written work must be legible and clear to receive credit. Vagueness in your work leading to misinterpretation is not a valid reason for credit.
  • Course Outline:

    This schedule is only a guideline and is subject to change depending on the progression of the course. It will get updated with time.

  • Week 1: Introduction
  • Week 2: Networking basics and issues - Protocols and Architectures
  • Week 3: Discussion of some specific security attacks
  • Week 4: Prevention/Protection I: Firewalls - Types, architectures, deployment
  • Week 5: Prevention/Protection - II: Firewalls Continued; Cryptographic Protocols - I
  • Week 6: Cryptographic Protocols - II: Pitfalls
  • Week 7: Midterm Exam
  • Week 8: Link Security; Kerberos; PGP
  • Week 9: Wireless LAN Security
  • Week 10: Wireless Security II: WWANs, WPANs and Wireless Application Security
  • Week 11: VPNs: IPSec and SSL
  • Week 12: Detection - I: IDS and IPS
  • Week 13: Detection - II: Monitoring and Housekeeping
  • Week 14: Assessment of network security
  • Week 15: Final Exam