Networks and Communications MS216 - Course Outline -

Size: px
Start display at page:

Download "Networks and Communications MS216 - Course Outline -"

Transcription

1 Networks and Communications MS216 - Course Outline - Objective Lecturer Times Overall Learning Outcomes Format Programme(s) The objective of this course is to develop in students an understanding of the fundamentals of modern network and Internet technologies and to combine them with applications and practices related to a business environment. Dr. Anatoli Nachev ext: anatoli.nachev@nuigalway.ie Lectures: Labs: Thursday, 10-12, BS242, Cairnes Building Tuesday, 11-1, BS242, Cairnes Building Upon completion of this course you will be able to: To describe the fundamentals of modern data communications, organisational interconnectivity, Internet technologies, and to relate them to a business environment. Recognise common Internet communication protocols and describe the services associated with them. Demonstrate understanding of manager role in developing a communication infrastructure. Present (in oral form) the relative advantages and limitations of network and communication technologies and configurations. Recognise security threats an organisation is exposed to and develop an understanding of security protection techniques and practices. The course comprises one weekly 2-hrs lecture across 12 weeks plus one weekly 2-hrs lab across 3 weeks. 3BF1 (3 rd year BIS) Course Material A course web is available at Page 1 of 8

2 Assessment Workload 1. End of Year Examination 65% 2. Continuous Assessment 15%* 3. Mid-term group assignment 20% * Continuous assessment involves five MCQ tests. Credit weighting: 5 ECT Lecture hours: 24 Computer laboratory hours: 6 Independent assignment work: 25 Independent study: 55 Associated hours: 13 Examination: 2 Total Student Effort: 125 hours Core Text: (Students need their own copy) [1] MS216 Networks & Communications Course Pack. [2] Forouzan, B., 2003, Business Data Communications, McGraw-Hill, 1 ed., ISBN: Supplementary Text(s): [3] Forouzan, B., Data Communications and Networking, 4 ed., McGraw-Hill, [4] Stallings, W., Business Data Communications, 6 ed., Prentice Hall, [5] Fitzgerald, J & Dennis, A. Business Data Communications and Networking, 10 ed., John Wiley & Sons, [6] Forouzan, B. TCP/IP Protocol Suite, McGraw-Hill, 3 rd ed., [7] Panko, R. Business Data Networks and Telecommunications, 7 ed. Prentice Hall, [8] Stallings, W., Cryptography and Network Security: Principles and Practice, 4 ed., Prentice Hall, [9] [10] Conklin et al. Principles of Computer Security. Security+ and Beyond, McGraw-Hill, Page 2 of 8

3 Agenda Topic Week 1: Internet - Overview Computer networks - overview. The Internet history. Internet administration. Conceptual view of Internet. o ISPs. OSI overview. [1] Ch 1 [2] Ch 1, 13 [3] Ch 1,2, App. C [5] Ch 1 [6] Ch 1, 2 [7] Ch 6 Readings Week 1 Outcomes: You will be able to Distinguish between different types of networks. Describe the Internet evolution. Describe Internet authorities and their functions. Explain the Internet structure. Distinguish between network layers. Week 2: Internet Connectivity Internet infrastructure. Internet connectivity o Conventional modems. o ISDN. o DSL. o Cable modems. o Leased lines, packet switched WANs. o Fixed wireless Internet. o Satellite Internet. [1] Ch 2 [2] Ch 8, 9, 12 [3] Ch 9, 18, 20, 21 [5] Ch 7, 8, 9 [6] Ch 3 Week 2 Outcomes: You will be able to Distinguish between different technologies used for connection to the Internet. Identify the role of the manager in selecting correct connections. List advantages and limitations of those connections. Explain what equipment is required for each type of connection. To identify some new and emerging technologies for Internet connection. Weeks 3, 4: Internet Communication Model: Application Layer Services Communication models and protocol suites: TCP/IP, IPS/SPX, AppleTalk, SNA. TCP/IP protocols stack. components and functioning. o User agents and mail transfer agents. [1] Ch 3, 4 [2] Ch 2, 13 [3] Ch 26, 27 [4] Ch 4 [5] Ch 2 [6] Ch 18, 19, 20, 22, 23 Page 3 of 8

4 o delivery stages. o Push protocol - SMTP, MIME. o Access protocols POP3 and IMAP, proprietary protocols. o Mailing lists. o Spam and anti-spam techniques. FTP. Telnet. World Wide Web. o WWW components. o URL, URN, URI. o Search engines and Google - components and operation. o Browser architecture. o Hyper-Text Transfer Protocol (HTTP). o HTTP request and response messages. o Web documents. Weeks 3, 4 Outcomes: You will be able to Describe fundamentals of the Internet application layer services. Recognise communication protocols HTTP, SMTP, POP, IMAP, MIME, FTP, and Telnet and comment on their correct usage. Identify messages that clients and servers exchange. Take decision on building up an Internet server infrastructure. List anti-spam techniques and policies. Weeks 5, 6: Internet Communication Model: Web Servers Web server location, outsourcing, collocation. o Server OS Web server hardware requirements, fault tolerance. Web server software. Apache. IIS: setup and configuration, security settings. IIS administration tools. o Management Console. o User manager. o Server security. IIS: Fault tolerance and backup, backup policy. o IIS: Web server logging. [1] Ch 5 [9] Page 4 of 8

5 Weeks 5, 6 Outcomes: You will be able to Take decision on selection of o Server location o Hardware o Fault tolerance components o Software Recognise which server components are to be installed. Demonstrate techniques for remote administration. Demonstrate basic server administration activities. Set up intranet / extranet sites. Week 7: IP Addresses and Routing. Transport layer protocols: TCP and UDP. Network layer and IP. IP addresses o IP address classification o Subnetting and supernetting o Masks o Dynamic address configuration, DHCP o IP address registration Routing techniques. Static vs. dynamic routing, routing algorithms. [1] Ch 6 [2] Ch 4 [3] Ch 20, 21, 22, 25 [6] Ch 4, 5, 6 Week 7 Outcomes: You will be able to Describe the IP address distribution mechanism and recognise distribution organisations. Distinguish between different classes of IP addresses and their suitability to different sizes of organisations. Explain the DHCP service. Demonstrate work with IP utilities such as PING, TRACERT, IPCONFIG. Distinguish between different routing techniques. Week 8: Domain Name System (DNS) Domain name space. Distribution of name space, DNS servers, zones. DNS and Internet. DSN resolution, caching. Domain name registration. DNS utilities. [1] Ch 7 [3] Ch 25 [6] Ch 16 Page 5 of 8

6 Week 8 Outcomes: You will be able to Explain the role of the domain name system in a communication infrastructure and a necessity of a DNS server. Use FQDN and PQDN. Distinguish between different types of DNS resolution. Improve efficiency of services by caching. Work with DNS utilities. Week 9: Need for Security: Attacks and Malware Business needs for information security Denial-of-service attacks o SYN flooding o Ping of death o Distributed DoS Backdoors & trapdoors Sniffing IP spoofing Smurf attacks Man-in-the-middle attack Reply attack Password guessing and cracking Malware o Viruses o Trojans o Worms o Logic bombs [10] Ch 15, also available from /SampleChapter.pdf Week 9 Outcomes: You will be able to Recognise that organisations have business needs for information security Identify threats posed to information security Describe the most common attacks, including denial-of-service, spoofing, sniffing, password attacks, etc. Describe the different types of malicious software that exist, including viruses, worms, trojans, and logic bombs Weeks 10, 11: Network Security Techniques Security requirements. Secret key encryption o Block ciphers: DES, TDES, AES. Key management, session keys. o Diffie-Hellman protocol. o Key Distribution Center (KDC). o Kerberos. Public key encryption, RSA algorithm. Digital signature. [1] Ch 9 [2] Ch 14 [3] Ch 29, 30, 31 [4] Ch 20 [5] Ch 10 [7] Ch 9, module F [8] Ch 9, 10, 11 Page 6 of 8

7 Digital certificates. Security protocols: o IPsec. o TLS / SSL. o Application layer security. Networks & Communications MS216 Weeks 10, 11 Outcomes: You will be able to List security requirements for a secure system over the Internet. Distinguish between secret and private key encryption. Describe the role of digital signature and digital certificates in secure communications. Compare different classes of digital certificates and explain the application process. Describe the strengths and weaknesses of different encryption and key distribution techniques. Explain how a secure connection between browsers and servers is established. Weeks 12: Attack Prevention systems Firewalls o Packet filters. o Circuit-level gateways. o Application gateways. o Stateful multilayer inspection firewall. o Network address translation (NAT). Firewall architecture. Security holes. Virtual Private Networks (VPNs). [1] Ch 10 [2] Ch 10, 14 [3] Ch 30, 31 [7] Ch 9, module F [8] Ch 16, 18 Week 12 Outcomes: You will be able to Distinguish between different types of firewalls and their correct deployment. Discuss how NAT servers enhance security of an organisation. Describe how hacker attacks are usually launched. Explain how VPNs provide cheap solutions for secure connections between branches of a corporate network or between individuals and a network. Page 7 of 8

8 Lectures & Labs Schedule: Networks & Communications MS216 Semester 1 Week Lecture Lab 1 y 2 y 3 y 4 y 5 y 6 y 7 y y 8 y y 9 y y 10 y 11 y 12 y Other Information: Lab sessions will begin in week 7 and persist to week 9 inclusive, providing 3 sessions. Each session is of 2 hours duration. Labs use a LAN of servers based on MS Windows 2003 and IIS v.6.0. General: This course is available on the Blackboard in ppt format. Should you have a visual disability and require the document in another format, please contact me and I will oblige. Page 8 of 8

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS) Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install

More information

The University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus

The University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus The University of Jordan Accreditation & Quality Assurance Center COURSE Syllabus 1 Course title Computer Security 2 Course number 1901463 Credit hours (theory, practical) 3 3 Contact hours (theory, practical)

More information

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28 Int ernet w orking Internet Security Literature: Forouzan: TCP/IP Protocol Suite : Ch 28 Internet Security Internet security is difficult Internet protocols were not originally designed for security The

More information

CompTIA Network+ Course

CompTIA Network+ Course CompTIA Network+ Course Duration: 5 Days Course Delivery: Classroom Language: English Target Audience Comprehensive approach to both preparing a student for CompTIA's Network+ exam and developing proficiency

More information

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N CompTIA Network+ (Exam N10-007) Course Description: CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT

More information

University of San Francisco Course Syllabus and Outline

University of San Francisco Course Syllabus and Outline College of Professional Studies BSIS 340 Business Data Networks and Telecommunications University of San Francisco Fall Semester 2008 Robert C. Hughes, M.S. Email: rchughes3@usfca.edu Enrolled Student

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e Chapter 8 Networking Essentials Objectives Learn about the protocols and standards Windows uses for networking Learn how to connect

More information

Unit 28 Website Production ASSIGNMENT 1

Unit 28 Website Production ASSIGNMENT 1 Unit 28 Website Production ASSIGNMENT 1 Last week Learning outcomes History HTML skeleton Annotated diagram of a WAN Servers, routers, client PC, browser, Server OS Switch, packet Architecture ISP Web

More information

CUNY John Jay College of Criminal Justice MATH AND COMPUTER SCIENCE

CUNY John Jay College of Criminal Justice MATH AND COMPUTER SCIENCE Instructor: Prof Aftab Ahmad Office: NB 612 Telephone No. (212)393-6314 Email Address: aahmad@jjay.cuny.edu Office Hours: By appointment TEXT & REFERENCE MATERIAL Text Notes from instructor posted on Blackboard

More information

AccessEnforcer Version 4.0 Features List

AccessEnforcer Version 4.0 Features List AccessEnforcer Version 4.0 Features List AccessEnforcer UTM Firewall is the simple way to secure and manage your small business network. You can choose from six hardware models, each designed to protect

More information

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified TestOut Network Pro - English 5.0.x COURSE OUTLINE Modified 2018-03-06 TestOut Network Pro Outline - English 5.0.x Videos: 130 (17:10:31) Demonstrations: 78 (8:46:15) Simulations: 88 Fact Sheets: 136 Exams:

More information

Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE

Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE COURSE TITLE ROUTING AND SWITCHING FUNDAMENTALS COURSE DURATION 16 Hour(s) of Self-Paced Interactive Training COURSE OVERVIEW In the

More information

Faculty of Science & Information Technology

Faculty of Science & Information Technology Faculty of Science & Information Technology Department: Computer Science COURSE SYLLABUS Short Description Student s Copy One copy of this course syllabus is provided to each student registered in this

More information

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified TestOut Network Pro - English 4.1.x COURSE OUTLINE Modified 2017-07-06 TestOut Network Pro Outline - English 4.1.x Videos: 141 (18:42:14) Demonstrations: 81 (10:38:59) Simulations: 92 Fact Sheets: 145

More information

Hands-On TCP/IP Networking

Hands-On TCP/IP Networking Hands-On Course Description In this Hands-On TCP/IP course, the student will work on a live TCP/IP network, reinforcing the discussed subject material. TCP/IP is the communications protocol suite on which

More information

Cisco 1: Networking Fundamentals

Cisco 1: Networking Fundamentals Western Technical College 10150110 Cisco 1: Networking Fundamentals Course Outcome Summary Course Information Description Career Cluster Instructional Level Total Credits 3.00 Total Hours 90.00 This course

More information

Introduction to TCP/IP

Introduction to TCP/IP Introduction to TCP/IP Properties and characteristics of TCP/IP IPv4 IPv6 Public vs private vs APIPA/link local Static vs dynamic Client-side DNS settings Client-side DHCP Subnet mask vs CIDR Gateway TCP/IP

More information

INTE-C5O44 - Internet

INTE-C5O44 - Internet Coordinating unit: Teaching unit: Academic year: Degree: ECTS credits: 2018 340 - EPSEVG - Vilanova i la Geltrú School of Engineering 744 - ENTEL - Department of Network Engineering BACHELOR'S DEGREE IN

More information

MiPDF.COM. 1. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below.

MiPDF.COM. 1. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below. CCNA1 v6.0 Pretest Exam Answers 2017 (100%) MiPDF.COM 1. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below. 11110010 11011011 11110110 11100111* 11100101

More information

Network Security. Thierry Sans

Network Security. Thierry Sans Network Security Thierry Sans HTTP SMTP DNS BGP The Protocol Stack Application TCP UDP Transport IPv4 IPv6 ICMP Network ARP Link Ethernet WiFi The attacker is capable of confidentiality integrity availability

More information

ADVANCE DATA COMMUNICATION AND. B.Ed.(Secondary) - COMPUTER SCIENCE

ADVANCE DATA COMMUNICATION AND. B.Ed.(Secondary) - COMPUTER SCIENCE ADVANCED DATA COMMUNICATION AND NETWORKING INSTITUTION: DEPARTMENT: PROGRAMME: COURSE TITLE: THE MICO UNIVERSITY COLLEGE COMPUTER STUDIES B.Ed.(Secondary) - COMPUTER SCIENCE ADVANCE DATA COMMUNICATION

More information

CODE COURSE NAME DESCRIPTION SEM CS401 Communication Engineering & Coding Theory Knowledge of communication engineering & coding theory IV

CODE COURSE NAME DESCRIPTION SEM CS401 Communication Engineering & Coding Theory Knowledge of communication engineering & coding theory IV Course: CS602 Computer Networks PROGRAMME: COMPUTER SCIENCE & ENGINEERING DEGREE:B. TECH COURSE: Computer Networks SEMESTER: VI CREDITS: 3 COURSECODE: CS602 COURSE TYPE: Theory COURSE AREA/DOMAIN: Communication

More information

ZyWALL 70. Internet Security Appliance. Quick Start Guide Version 3.62 December 2003

ZyWALL 70. Internet Security Appliance. Quick Start Guide Version 3.62 December 2003 ZyWALL 70 Internet Security Appliance Quick Start Guide Version 3.62 December 2003 Introducing the ZyWALL The ZyWALL 70 is the ideal secure gateway for all data passing between the Internet and the LAN.

More information

Chapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued)

Chapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued) Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World

More information

Chapter 4: Networking and the Internet

Chapter 4: Networking and the Internet Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Chapter 4: Networking and the Internet 4.1 Network Fundamentals

More information

Fireware-Essentials. Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.

Fireware-Essentials.  Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7. Fireware-Essentials Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.0 http://www.gratisexam.com/ Fireware Essentials Fireware Essentials Exam Exam A QUESTION 1 Which

More information

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review ACS-3921-001/4921-001 Computer Security And Privacy Fall 2018 Mid-Term Review ACS-3921/4921-001 Slides Used In The Course A note on the use of these slides: These slides has been adopted and/or modified

More information

Ethical Hacking and Prevention

Ethical Hacking and Prevention Ethical Hacking and Prevention This course is mapped to the popular Ethical Hacking and Prevention Certification Exam from US-Council. This course is meant for those professionals who are looking for comprehensive

More information

Objective Applications, Devices, Protocols Applications, Devices, Protocols Classifying Network Components Objective 1.

Objective Applications, Devices, Protocols Applications, Devices, Protocols Classifying Network Components Objective 1. CompTIA Network+ (Exam N10-005) Course Overview This course is intended for entry-level computer support professionals with basic knowledge of computer hardware, software, and operating systems, who wish

More information

Chapter 4 The Internet

Chapter 4 The Internet Chapter 4 The Internet Dr. Farzana Rahman Assistant Professor Department of Computer Science James Madison University Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3

More information

Jianhui Zhang, Ph.D., Associate Prof. College of Computer Science and Technology, Hangzhou Dianzi Univ.

Jianhui Zhang, Ph.D., Associate Prof. College of Computer Science and Technology, Hangzhou Dianzi Univ. Jianhui Zhang, Ph.D., Associate Prof. College of Computer Science and Technology, Hangzhou Dianzi Univ. Email: jh_zhang@hdu.edu.cn Copyright 2015 Pearson Education, Inc. Chapter 4: Networking and the Internet

More information

MLR Institute of Technology

MLR Institute of Technology MLR Institute of Technology Laxma Reddy Avenue, Dundigal, Quthbullapur (M), Hyderabad 500 043 Phone Nos: 08418 204066 / 204088, Fax: 08418 204088 COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION Course

More information

programming exercises.

programming exercises. Dr. John P. Abraham Professor Office: Engineering Building Room 3.276 CSCI 6345 ADVANCED COMPUTER NETWORKS Syllabus for Spring 2014 Professor: Dr. John P. Abraham. Office: Engineering Building Room 3.276

More information

Applied IT Security. System Security. Dr. Stephan Spitz 6 Firewalls & IDS. Applied IT Security, Dr.

Applied IT Security. System Security. Dr. Stephan Spitz 6 Firewalls & IDS. Applied IT Security, Dr. Applied IT Security System Security Dr. Stephan Spitz Stephan.Spitz@de.gi-de.com Overview & Basics System Security Network Protocols and the Internet Operating Systems and Applications Operating System

More information

Total No. of Questions : 09 ] [ Total No.of Pages : 02

Total No. of Questions : 09 ] [ Total No.of Pages : 02 CS / IT 321 (CR) Total No. of Questions : 09 ] [ Total No.of Pages : 02 III/IV B. TECH. DEGREE EXAMINATIONS, OCT / NOV - 2015 Second Semester COMPUTER SCIENCE & ENGINEERING NETWK SECURITY Time : Three

More information

Chapter 2. Switch Concepts and Configuration. Part II

Chapter 2. Switch Concepts and Configuration. Part II Chapter 2 Switch Concepts and Configuration Part II CCNA3-1 Chapter 2-2 Switch Concepts and Configuration Configuring Switch Security MAC Address Flooding Passwords Spoofing Attacks Console Security Tools

More information

CS 356 Internet Security Protocols. Fall 2013

CS 356 Internet Security Protocols. Fall 2013 CS 356 Internet Security Protocols Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5

More information

IT Foundations Networking Specialist Certification with Exam

IT Foundations Networking Specialist Certification with Exam IT Foundations Networking Specialist Certification with Exam MSIT113 / 200 Hours / 12 Months / Self-Paced / Materials Included Course Overview: Gain hands-on expertise in CompTIA A+ certification exam

More information

IT4405 Computer Networks (Compulsory)

IT4405 Computer Networks (Compulsory) IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and

More information

Erasable Programmable Read-Only Memory (EPROM) Electrically Erasable Programmable Read-Only Memory (EEPROM) CMOS 2.2.

Erasable Programmable Read-Only Memory (EPROM) Electrically Erasable Programmable Read-Only Memory (EEPROM) CMOS 2.2. Day - 1 1. INTRODUCTION 1.1 What is Security? 1.2 What is Cyber Security? 1.3 What is Information Security? 1.4 What are the Layers of Security? 1.5 What are the Classification of Security? 1.6 What are

More information

EEL DATA NETWORKS, SYSTEMS, AND SECURITY Fall 2016

EEL DATA NETWORKS, SYSTEMS, AND SECURITY Fall 2016 EEL 6935 - DATA NETWORKS, SYSTEMS, AND SECURITY Fall 2016 Objectives The objective of this course is to provide a technical and operational introduction to data/computer communication networks. Students

More information

CyberP3i Course Module Series

CyberP3i Course Module Series CyberP3i Course Module Series Spring 2017 Designer: Dr. Lixin Wang, Associate Professor Firewall Configuration Firewall Configuration Learning Objectives 1. Be familiar with firewalls and types of firewalls

More information

Fundamentals of Information Systems Security Lesson 8 Mitigation of Risk and Threats to Networks from Attacks and Malicious Code

Fundamentals of Information Systems Security Lesson 8 Mitigation of Risk and Threats to Networks from Attacks and Malicious Code Fundamentals of Information Systems Security Lesson 8 Mitigation of Risk and Threats to Networks from Attacks and Malicious Code Learning Objective Explain the importance of network principles and architecture

More information

FIT5044 Network security. Unit Guide. Semester 1, 2010

FIT5044 Network security. Unit Guide. Semester 1, 2010 FIT5044 Network security Unit Guide Semester 1, 2010 The information contained in this unit guide is correct at time of publication. The University has the right to change any of the elements contained

More information

Security+ SY0-501 Study Guide Table of Contents

Security+ SY0-501 Study Guide Table of Contents Security+ SY0-501 Study Guide Table of Contents Course Introduction Table of Contents About This Course About CompTIA Certifications Module 1 / Threats, Attacks, and Vulnerabilities Module 1 / Unit 1 Indicators

More information

Entry Level Assessment Blueprint Computer Networking Fundamentals

Entry Level Assessment Blueprint Computer Networking Fundamentals Blueprint Computer Networking Fundamentals Test Code: 4514 / Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment safety and maintenance

More information

Security+ Practice Questions Exam Cram 2 (Exam SYO-101) Copyright 2004 by Que Publishing. International Standard Book Number:

Security+ Practice Questions Exam Cram 2 (Exam SYO-101) Copyright 2004 by Que Publishing. International Standard Book Number: Security+ Practice Questions Exam Cram 2 (Exam SYO-101) Copyright 2004 by Que Publishing International Standard Book Number: 0789731517 Warning and Disclaimer Every effort has been made to make this book

More information

Computer Networking Fundamentals

Computer Networking Fundamentals Job Ready Assessment Blueprint Computer Networking Fundamentals Test Code: 4514 / Version: 01 Copyright 2016. All Rights Reserved. General Assessment Information Computer Networking Fundamentals Blueprint

More information

Computer Networking Fundamentals

Computer Networking Fundamentals Job Ready Assessment Blueprint Computer Networking Fundamentals Test Code: 4414 / Version: 01 Measuring What Matters Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical

More information

n Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network

n Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network Always Remember Chapter #1: Network Device Configuration There is no 100 percent secure system, and there is nothing that is foolproof! 2 Outline Learn about the Security+ exam Learn basic terminology

More information

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006 Core Syllabus C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS Version 2.6 June 2006 EUCIP CORE Version 2.6 Syllabus. The following is the Syllabus for EUCIP CORE Version 2.6, which

More information

Application of Cryptographic Systems. Securing Networks. Chapter 3 Part 4 of 4 CA M S Mehta, FCA

Application of Cryptographic Systems. Securing Networks. Chapter 3 Part 4 of 4 CA M S Mehta, FCA Application of Cryptographic Systems Securing Networks Chapter 3 Part 4 of 4 CA M S Mehta, FCA 1 Application of Cryptographic Systems Learning Objectives Task Statements 1.3 Recognise function of Telecommunications

More information

MTA_98-366_Vindicator930

MTA_98-366_Vindicator930 MTA_98-366_Vindicator930 Number: 98-366 Passing Score: 700 Time Limit: 45 min File Version: 1.0 http://www.gratisexam.com/ Microsoft Technology Associate Networking Fundamentals MTA 98-366 Exam A QUESTION

More information

CompTIA Network+ N10-005

CompTIA Network+ N10-005 CompTIA Network+ N10-005 Course Number: Network+ N10-005 Length: 7 Day(s) Certification Exam This course is preparation for the CompTIA Network+ N10-005 Certification exam Course Overview The CompTIA Network+

More information

Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science History of computer network protocol development in 20 th century. Development of hierarchical

More information

VoIP / RoIP for Technicians

VoIP / RoIP for Technicians Phase 4 Design, Inc VoIP / RoIP for Technicians Presented by Dave Grant Phase 4 Design, Inc dave@phase4.org 2017 Phase 4 Design, Inc Notes 2 2017, Phase 4 Design, Inc. Table of Contents What are we going

More information

NEW YORK CITY COLLEGE OF TECHNOLOGY/CUNY Computer Systems Technology Department

NEW YORK CITY COLLEGE OF TECHNOLOGY/CUNY Computer Systems Technology Department NEW YORK CITY COLLEGE OF TECHNOLOGY/CUNY Computer Systems Technology Department COURSE: CST2307 Networking Fundamentals (2 class hours, 2 lab hours, 3 credits) Course Description: This course introduces

More information

Strategic Infrastructure Security

Strategic Infrastructure Security Strategic Infrastructure Security Course Number: SCPSIS Length: Certification Exam There are no exams currently associated with this course. Course Overview This course picks up right where Tactical Perimeter

More information

Computer Networks SYLLABUS CHAPTER - 2 : NETWORK LAYER CHAPTER - 3 : INTERNETWORKING

Computer Networks SYLLABUS CHAPTER - 2 : NETWORK LAYER CHAPTER - 3 : INTERNETWORKING i SYLLABUS UNIT - 1 CHAPTER - 1 : INTRODUCTION Uses of Computer Networks, Network Hardware, Network Software, Reference Models (ISO-OSI, TCP/IP). CHAPTER - 2 : NETWORK LAYER Network Layer Design Issues,

More information

The Administration Tab - Diagnostics

The Administration Tab - Diagnostics The Administration Tab - Diagnostics The diagnostic tests (Ping and Traceroute) allow you to check the connections of your network components. Ping Test. The Ping test will check the status of a connection.

More information

Textbook Charles Petzold, Programming Windows, 5th edition, Microsoft Press. References - other textbooks or materials none

Textbook Charles Petzold, Programming Windows, 5th edition, Microsoft Press. References - other textbooks or materials none CS351 Systems Programming Last Updated - 03/01/02 Course Manager Dr. Phil Dickens, Assistant Professor 3 credit hours; required for CS & CPE; 100 min. lecture & 100 min. lab each week Current Catalog Description

More information

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks. Chapter 4: Networking and the 4.1 Network Fundamentals 4.2 The 4.3 The World Wide Web 4.4 Protocols 4.5 Security Network Classifications Scope Local area network (LAN) Metropolitan area (MAN) Wide area

More information

CompTIA Network+ Outcomes. Lab Outline. Course Code N Released March Skill Level Intermediate. Duration 26 hrs

CompTIA Network+ Outcomes. Lab Outline. Course Code N Released March Skill Level Intermediate. Duration 26 hrs CompTIA Network+ CompTIA Network+ Course Code N10-007 Released March 2018 Skill Level Intermediate Duration 26 hrs Outcomes After completing this Practice Lab, you will be able to: Lab Outline The CompTIA

More information

COPYRIGHTED MATERIAL. Con t e n t s. Chapter 1 Introduction to Networking 1. Chapter 2 Overview of Networking Components 21.

COPYRIGHTED MATERIAL. Con t e n t s. Chapter 1 Introduction to Networking 1. Chapter 2 Overview of Networking Components 21. Con t e n t s Introduction xix Chapter 1 Introduction to Networking 1 Comparing Logical and Physical Networks.... 1 Networking Home Computers........................................... 2 Networking Small

More information

Scanning. Course Learning Outcomes for Unit III. Reading Assignment. Unit Lesson UNIT III STUDY GUIDE

Scanning. Course Learning Outcomes for Unit III. Reading Assignment. Unit Lesson UNIT III STUDY GUIDE UNIT III STUDY GUIDE Course Learning Outcomes for Unit III Upon completion of this unit, students should be able to: 1. Recall the terms port scanning, network scanning, and vulnerability scanning. 2.

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 11 MIDTERM EXAMINATION #1 OCT. 16, 2013 COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2013-75 minutes This examination

More information

Computer and Network Security

Computer and Network Security Computer and Network Security c Copyright 2000 R. E. Newman Computer & Information Sciences & Engineering University Of Florida Gainesville, Florida 32611-6120 nemo@cise.ufl.edu Network Security (Pfleeger

More information

Overview. Computer Network Lab, SS Security. Type of attacks. Firewalls. Protocols. Packet filter

Overview. Computer Network Lab, SS Security. Type of attacks. Firewalls. Protocols. Packet filter Computer Network Lab 2017 Fachgebiet Technische Informatik, Joachim Zumbrägel Overview Security Type of attacks Firewalls Protocols Packet filter 1 Security Security means, protect information (during

More information

QUESTION BANK UNIT-I

QUESTION BANK UNIT-I DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK Subject Code: CS1302 Subject Name: Computer Networks Year/ Sem: III / V UNIT-I 1. What is multicast? What is the difference between unicast and multicast?

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies C 2001-2004 Kerio Technologies. All Rights Reserved. Printing Date: April 25, 2004 This guide provides detailed description on configuration of the local network

More information

Computer Networks. Dr. Abdel Ilah ALshbatat Dept. of Communication and Computer Engineering Faculty of Engineering Tafila Technical University

Computer Networks. Dr. Abdel Ilah ALshbatat Dept. of Communication and Computer Engineering Faculty of Engineering Tafila Technical University Computer Networks Dr. Abdel Ilah ALshbatat Dept. of Communication and Computer Engineering Faculty of Engineering Tafila Technical University 1 Lecture 0 Course Information Title: Computer Networks 2 Course

More information

Connecting the DI-804V Broadband Router to your network

Connecting the DI-804V Broadband Router to your network Before you begin Make sure that any existing Firewall Software/Devices are disabled and/or shutdown before beginning installation of your new D-Link DI-804V Broadband Router. Contents of Package DI-804V

More information

Hands-On Ethical Hacking and Network Defense

Hands-On Ethical Hacking and Network Defense Hands-On Ethical Hacking and Network Defense Chapter 2 TCP/IP Concepts Review Last modified 1-11-17 Objectives Describe the TCP/IP protocol stack Explain the basic concepts of IP addressing Explain the

More information

Fundamentals of Network Security v1.1 Scope and Sequence

Fundamentals of Network Security v1.1 Scope and Sequence Fundamentals of Network Security v1.1 Scope and Sequence Last Updated: September 9, 2003 This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document

More information

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107) Overview This course is intended for those wishing to qualify with CompTIA Security+. CompTIA's Security+ Certification is a foundation-level certificate designed for IT administrators with 2 years' experience

More information

Enterprise Network Design ITP 499 (3 Units)

Enterprise Network Design ITP 499 (3 Units) Enterprise Network Design ITP 499 (3 Units) Objectives Concepts Prerequisites/ Recommended Preparation Instructor Contacting the Instructor Office Hours Lecture Lab Required Textbooks Web Site Grading

More information

Chapter 4: Networking and the Internet

Chapter 4: Networking and the Internet Chapter 4: Networking and the Internet 2015 Pearson Education Limited 2015 Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World Wide Web 4.4 Internet Protocols

More information

Assignment - 1 Chap. 1 Wired LAN s

Assignment - 1 Chap. 1 Wired LAN s Assignment - 1 Chap. 1 Wired LAN s 1. (1 Mark) 1. Draw the frame format of Ethernet. 2. What is unicast, multicast and broadcast address? 3. State the purpose of CRC field. 2. (5 Marks) 1. Explain how

More information

Numerics I N D E X. 3DES (Triple Data Encryption Standard), 48

Numerics I N D E X. 3DES (Triple Data Encryption Standard), 48 I N D E X Numerics A 3DES (Triple Data Encryption Standard), 48 Access Rights screen (VPN 3000 Series Concentrator), administration, 316 322 Action options, applying to filter rules, 273 adding filter

More information

Gigabit SSL VPN Security Router

Gigabit SSL VPN Security Router As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is the ideal to help the SMBs increase the

More information

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010 Cryptography Chapter 8 Network Security Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security An Introduction

More information

SYLLABUS. DIVISION: Business and Engineering Technology REVISED: FALL 2015 CREDIT HOURS: 4 HOURS/WK LEC: 4 HOURS/WK LAB: 0 LEC/LAB COMB: 4

SYLLABUS. DIVISION: Business and Engineering Technology REVISED: FALL 2015 CREDIT HOURS: 4 HOURS/WK LEC: 4 HOURS/WK LAB: 0 LEC/LAB COMB: 4 SYLLABUS DIVISION: Business and Engineering Technology REVISED: FALL 2015 CURRICULA IN WHICH COURSE IS TAUGHT: IST, Information Systems Technology COURSE NUMBER AND TITLE: ITN 262 Cisco CCNA Security CREDIT

More information

QCF Level 3: BTEC Specialist Credit value: 10 Guided learning hours: 60. Aim and purpose. Unit introduction

QCF Level 3: BTEC Specialist Credit value: 10 Guided learning hours: 60. Aim and purpose. Unit introduction Unit 42: Computer Networks Unit code: R/601/7320 QCF Level 3: BTEC Specialist Credit value: 10 Guided learning hours: 60 Aim and purpose The aim of this unit is to ensure learners understand the key components

More information

GOPALAN COLLEGE OF ENGINEERING AND MANAGEMENT Department of Computer Science and Engineering COURSE PLAN

GOPALAN COLLEGE OF ENGINEERING AND MANAGEMENT Department of Computer Science and Engineering COURSE PLAN Appendix - C GOPALAN COLLEGE OF ENGINEERING AND MANAGEMENT Department of Computer Science and Engineering Academic Year: 2016-17 Semester: EVEN COURSE PLAN Semester: VI Subject Code& Name: 10CS64 & Computer

More information

Introduction and Overview. Why CSCI 454/554?

Introduction and Overview. Why CSCI 454/554? Introduction and Overview CSCI 454/554 Why CSCI 454/554? Get Credits and Graduate Security is important More job opportunities More research funds 1 Workload Five homework assignments Two exams (open book

More information

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322 1 Local & Metropolitan Area Networks ACOE322 Lecture 5 TCP/IP Protocol suite and IP addressing 1 0. INTRODUCTION We shall cover in this topic: 1. The relation of TCP/IP with internet and OSI model 2. Internet

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way!   We offer free update service for one year PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year Exam : 642-504 Title : Securing Networks with Cisco Routers and Switches Vendors

More information

CompTIA Security+ Certification

CompTIA Security+ Certification CompTIA Security+ Certification Course Number: SY0-301 Length: 5 Days Certification Exam This course is preparation for the CompTIA Security+ Certification exam. Course Overview This course will prepare

More information

Faculty of Science and IT Course title. Pre-requisite/corequisite

Faculty of Science and IT Course title. Pre-requisite/corequisite Faculty Course number Faculty of Science and IT 022242 Department Course title Computer Science Network Protocols Number of credit hours 3 Pre-requisite/corequisite Computer network Brief course description.

More information

City University of Hong Kong Course Syllabus. offered by Department of Computer Science with effect from Semester B 2017/18

City University of Hong Kong Course Syllabus. offered by Department of Computer Science with effect from Semester B 2017/18 City University of Hong Kong offered by Department of Computer Science with effect from Semester B 2017/18 Part I Course Overview Course Title: Internet Security and E-Commerce Protocols Course Code: CS4286

More information

On successful completion of this course students should:

On successful completion of this course students should: CIT306 Computer Networks Course Name Computer Networks Course Code CIT 306 Course Type Area Elective Course Level Undergraduate AKTS Credit 5 ECTS Course hours per week 3 (Institutional) Practice hours

More information

Introduction to Computer Science. William Hsu Department of Computer Science and Engineering National Taiwan Ocean University

Introduction to Computer Science. William Hsu Department of Computer Science and Engineering National Taiwan Ocean University Introduction to Computer Science William Hsu Department of Computer Science and Engineering National Taiwan Ocean University Chapter 4: Networking and the Internet No one owns the Internet, and only one

More information

Systems and Network Security (NETW-1002)

Systems and Network Security (NETW-1002) Systems and Network Security (NETW-1002) Dr. Mohamed Abdelwahab Saleh IET-Networks, GUC Spring 2017 Course Outline Basic concepts of security: Attacks, security properties, protection mechanisms. Basic

More information

Network Architecture I

Network Architecture I Network Architecture I Degree in: Communications Electronic Engineering Telecommunication Systems Engineering Telecommunication Technologies Engineering Telematics Engineering Universidad de Alcalá 2016/17

More information

Understanding Networking Fundamentals

Understanding Networking Fundamentals Understanding Networking Fundamentals Training Details Training Time : 5 Days Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training A strong foundation

More information

Syllabus: The syllabus is broadly structured as follows:

Syllabus: The syllabus is broadly structured as follows: Syllabus: The syllabus is broadly structured as follows: SR. NO. TOPICS SUBTOPICS 1 Foundations of Network Security Principles of Network Security Network Security Terminologies Network Security and Data

More information

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12 TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group

More information

SINGLE COURSE. NH9000 Certified Ethical Hacker 104 Total Hours. COURSE TITLE: Certified Ethical Hacker

SINGLE COURSE. NH9000 Certified Ethical Hacker 104 Total Hours. COURSE TITLE: Certified Ethical Hacker NH9000 Certified Ethical Hacker 104 Total Hours COURSE TITLE: Certified Ethical Hacker COURSE OVERVIEW: This class will immerse the student into an interactive environment where they will be shown how

More information

1. What is a network protocol and why are protocols needed when two machines communicate? 2 marks

1. What is a network protocol and why are protocols needed when two machines communicate? 2 marks Topic1: Common Network Protocols 1. What is a network protocol and why are protocols needed when two machines communicate? 2. Describe the function of each of the following protocols: a. SMTP b. HTTP c.

More information

SYLLABUS. osmania university CHAPTER - 3 : MEDIUM ACCESS CONTROL (MAC) SUBLAYER Standards, Bluetooth, Bridges and Routers.

SYLLABUS. osmania university CHAPTER - 3 : MEDIUM ACCESS CONTROL (MAC) SUBLAYER Standards, Bluetooth, Bridges and Routers. Contents i SYLLABUS osmania university UNIT - I CHAPTER - 1 : INTRODUCTION Data Communication, Network Topologies : LAN, WAN, MAN, Types : Bus, Star, Ring, Hybrid, Line Configurations, Reference Models

More information