News
Class schedule: Thursday 6:00 - 9:05 pm, Room: FMH 412
Instructor:Reza Curtmola;
Email:
Office: GITC 4301
Office hours (GITC 4301): Monday 1-2pm, Wednesday 6-7pm, and by appointment.
Important dates
(note that dates for the projects are tentative and may change)
Date | Event |
02/20/14 | Project 1 out |
03/06/14 | Project 1 due |
03/13/14 | Midterm exam |
03/27/14 | Project 2 out |
04/10/14 | Project 2 due |
04/17/14 | Project 3 out |
05/01/14 | Project 3 due |
05/08/14 | Final exam |
Prerequisites
In addition, course material will include research articles from electronic databases such as:
A tentative list of topics includes:
Who should take this course?
Grading policy
Academic integrity
Modifications to syllabus
CS 656: "Internet and Higher Layer Protocols".
Textbook
Also, students should be able to program in Java and C/C++ for the programming component of the mini-projects.
Due to the dynamic and evolving nature of the network security field,
the course will feature a mixture of material based on the recommended textbook,
on instructor notes, and on scientific articles in order to reflect recent
developments in this area.
Overview
Recommended textbook: "Network Security: Private Communication in a Public World (2nd edition)",
by C. Kaufman, R. Perlman, M. Speciner,
Prentice Hall 2002 (ISBN 0130460192).
ACM Digital Library,
IEEE Xplore,
Science Direct
The course focuses on the security of network protocols. The goal of the
course is to familiarize students with common threats and attacks, and to
study the fundamental techniques used to secure network communication over
insecure channels. The course will have an applied component, which will
help students gain practical experience in attacking and defending networked
systems. Topics include authentication systems, secure communication at data
link, network, transport and application layers, vulnerabilities of Internet
protocols, DNS and routing security, firewalls, intrusion detection,
honeypots, wireless networks security, malware propagation and detection,
and web security.
Graduate students interested in studying the fundamental techniques used to secure network protocols.
The course is also an excellent starting point for finding research topics for M.S. and Ph.D. theses.
Extra credit will be given for active participation in discussions during the class.
Mini-Projects (3) 45%
Midterm exam 25%
Final exam 30%
Class participation up to 10%
The exams are closed book and closed notes.
The NJIT Honor Code will be upheld, and any violations will be brought to the immediate attention of the Dean of Students.
Note in particular that copying lab assignments or exam papers, in full or in part is forbidden.
The syllabus may be modified at the discretion of the instructor or in the event of extenuating circumstances.
Students will be notified in class of any changes to the syllabus.