Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
13 views2 pages

Network and Web Security Course Content

The document outlines a course on Network and Web Security for CSE and CSIT students, detailing course objectives, outcomes, and syllabus. Key topics include security problems in network protocols, network defense tools, malware and attacks, basics of web security, and insecure web logic. It also lists textbooks, reference books, and web resources for further study.

Uploaded by

charan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views2 pages

Network and Web Security Course Content

The document outlines a course on Network and Web Security for CSE and CSIT students, detailing course objectives, outcomes, and syllabus. Key topics include security problems in network protocols, network defense tools, malware and attacks, basics of web security, and insecure web logic. It also lists textbooks, reference books, and web resources for further study.

Uploaded by

charan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

NETWORK AND WEB SECURITY

VI SEMESTER: CSE & CSIT


Course Code Category Hours / Week Credits Maximum Marks
L T P C CIA SEE Total
ACIC03 CORE
3 1 0 4 30 70 100
Contact Classes: 45 Tutorial Classes: Nil Practical Classes: Nil Total Classes: 45
Prerequisites: Computer Networks
I. COURSE OVERVIEW:
The course introduces application security in recommending proper mitigations for web security issues, and
infrastructure security. The security problems, protocols who have an interest in enhancing the defense of web
applications.

II. COURSE OBJECTIVES:


The students will try to learn:
I. The basics of Cryptography and Network Security.
II. The process of securing a message over insecure channel by various means
III. The mechanisms for maintaining confidentiality, integrity and availability of a data
IV. The various protocols for network security to protect against the threats in the networks.

III. COURSE OUTCOMES:


After successful completion of the course, students should be able to:
CO 1 Interpret various protocols(TCP,DNS,SMTP) for solving the security problems in Understand
the network
CO 2 Solve unautorized access from the internet by using firewalls, DNSSEC with Apply
NSEC3
CO 3 Find computer and network security issues and classify the issues to prevent, Remember
detect and recover from the attacks
CO 4 Summarize HTML elements and attributes for structuring and presenting the content Understand
of webpage based on the user requirement
CO 5 Identify HTTP pollution and HTTP parameter tammpering attacks by various Apply
techniques
CO 6 Explain the mechanisms for maintaining confidentiality,integrity and availability Understand
of a data

IV. COURSE SYLLABUS:


MODULE–I: SECURITY PROBLEMS IN NETWORK PROTOCOLS (10)
TCP, DNS, SMTP, ROUTING, Problems in TCP/IP protocol suite, survey of BGP security, DNS cache
poisoning.

MODULE –II: NETWORK DEFENSE TOOLS (10)


Security evaluation of DNSSEC with NSEC3, distributed firewalls, detecting network intruders in real time,
network security testing, art of port scanning.

MODULE –III: MALWARE AND ATTACKS (09)


Computer viruses, spyware and key, loggers, bot, nets, attacks and defenses, denial of service attacks

Control hijacking attacks, exploits and defenses, exploitation techniques and fuzzing

MODULE –IV: BASICS OF WEB SECURITY (08)


Web Basics: HTML, CSS, JS, URLs, DOM, Frames, HTTP, Navigation, X-Domain communication, Network
Attacks and HTTPS, Limitations of HTTPS, Same Origin Policy and Web Attacker Model, Injection Flaws (I):
Cross, site Scripting (XSS), Injection Flaws (II) : XSS (contd.), SQL Injection, OS Command Injection, HTTP
Header Injection

MODULE –V: INSECURE WEB LOGIC (09)


Logic Flaws, HTTP Pollution, HTTP Parameter Tampering, Cookie Flaws and Server Misconfiguration, Attacks
on User Interfaces, Browser Design and Flaws, User Privacy: Browser and Device Fingerprinting, User Tracking,
Browser Caching Flaws

V. TEXT BOOKS:
1. William Stallings, “Network Security Essentials: Applications and Standards”, Pearson Education Limited, 6 th
Edition, 2016.
2. Uttam K Roy, “Web Technologies”, Oxford University Press, Illustrated Edition, 2010.
3. Amanda Berlin and Lee Brotherston, “Defensive Security Handbook”, O’Reilly, 1 st Edition, 2017.
4. John E. Canavan, " The Fundamentals of Network Security," Artech House Publishers, In-Print-Forever
hardbound Edition, 2001.
5. Chris Bates, “Web Programming: Building Internet Applications”, Wiley, 3 rd Edition, 2006.

VI. REFERENCE BOOKS:


1. Jon Duckett, “Beginning Web Programming with HTML, XHTML, and CSS”, WROX, 2nd Edition, 2008.
2. R. W. Sebesta, “Programming World Wide Web”, Pearson, 4 th Edition, 2007.
3. Paul Dietel, “Internet and World Wide Web – How To Program”, Pearson, 4th Edition, 2007.
4. Juanita Ellis, Tim Speed, William P. Crowell, " The Internet Security Guidebook: From Planning to
Deployment," Academic Press, 1st Edition, 2001.
5. Stephen Northcutt, Donald McLachlan, Judy Novak, " Network Intrusion Detection: An Analyst's Handbook”,
New Riders Publishing, 2nd Edition, 2000.

VII. WEB REFERENCES:


1. http://nptel.ac.in/
2. https://ocw.mit.edu

You might also like