Skip Navigation

Syllabus - IST 665 - Secure Networking

Basic Information

Instructor Information

Dr. Mike Murphy

Please see the About Me page for contact information, and check my Schedule for office hours information.

Catalog Description

This course is designed to equip students with applications and practice of cryptography in securing wired/wireless networks and Internet. Following techniques are studied: classical systems, symmetric block ciphers, linear and differential cryptanalysis, public-key cryptography, cryptographic protocols, hash functions, authentication, key management, key exchange, signature schemes and how it can be applied to secure network infrastructure, firewalls, digital right management, and related topics.

Course Objectives and Tentative List of Major Topics

  1. Review the OSI Model for understanding the layers at which network security techniques may be applied.
  2. Discuss security and functionality trade-offs in network design.
  3. Describe network access control schemes, including isolation, access filters, and authenticated access.
  4. Explain methods for data encryption and key management, including PSK and PKI.
  5. Discuss hashing and signature detection.
  6. Identify network security and monitoring tools that can be used to detect and mitigate threats.

Course Student Learning Outcomes

Upon successful completion of this course, students should be able to:

  1. Analyze and apply the methods of conventional encryption for network security.
  2. Apply the concepts of public key encryption/infrastructure, key management, digital signature techniques for secure networking.
  3. Apply cryptographic data integrity algorithms for networks and Internet security.
  4. Design authentication, confidentiality, integrity, availability and non-repudiation functionalities to secure networks.
  5. Investigate and implement network and Internet security using a layered approach.
  6. Evaluate, design and apply network security tools and applications.

Texts and Materials

Grade Categories

Graded activities in this course primarily consist of assignments and quizzes. Each graded item is weighted equally.

Additional Policies and Information

The following policies and documents are incorporated into this syllabus by reference:

Disclaimer

Portions of this course may deal with issues related to cost analysis, laws, and ethics. The instructor of this course is not a lawyer, accountant, or financial advisor, and no portion of this class constitutes legal or financial advice. This syllabus and schedule are tentative and subject to change with notice to the student during the semester. If a portion of this syllabus is found to be non-compliant with University policies or applicable laws, the remainder of this syllabus will remain effective.