Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

SMT.KAMALA & SRI.VENKAPPA M.

AGADI COLLEGE OF ENGINEERING &


TECHNOLOGY, LAXMESHWAR
LESSON PLANNING DOCUMENT FOR THE YEAR 2018
Department of Electronics & Communication Engineering

NAME OF THE STAFF MEMBER : Prof. KRISHNA G.DESHPANDE

BRANCH ELECTRONICS AND COMMUNICATION


ENGGINEERING

SEMESTER VIII

SUBJECT NETWORK SECURITY

SUBJECT CODE 10EC832

TOTAL CONTACT HOURS 52

THEORY 04 / WEEK

PRACTICALS/ FIELD OPTIONAL


TOTAL CONTACT HOURS PER WEEK VISITS

ADDITIONAL 01
INTERACTION HOURS PREFERABLE

DATE OF COMMENCEMENT OF CLASSES 01.02.2018

DATE OF FIRST TEST/SESSIONALS 12th March to 17th March,2018

DATE OF SECOND TEST/SESSIONALS 16th April to 21st April, 2018

DATE OF THIRDTEST/SESSIONALS 14th May to 19th May,2018

LAST WORKING DAY 23rd May, 2018.

STAFF HOD
SMT.KAMALA & SRI.VENKAPPA M AGADI COLLEGE OF ENGINEERING & TECHNOLOGY,
LAXMESHWAR
DETAILED LESSON PLANNING DOCUMENT

PLANNED ACTUAL
SIGNATURE
SL DESCRIPTION OF THE PORTION TO DATE DATE
NO. BE COVERED HOUR WISE
DD MM YY DD MM YY STAFF HOD

Introduction
1 1 02 2018
Introduction
Services
2 05 02 2018
Mechanisms
3 06 02 2018

Attacks
4 07 02 2018

The OSI security architecture.


5 08 02 2018
A model for network security
6 12,14 02 2018
Symmetric ciphers
7 Symmetric Cipher , Substitution 15 02 2018
Techniques
8 Transposition Techniques, Simplified
19 02 2018
DES
Data encryption standard (DES)
9 20 02 2018
Differential and Linear Cryptanalysis
10 21 02 2018
Model Block Cipher Design Principles
11 22 02 2018
and Modes of Operation
Evaluation Criteria for Advanced
12 26,27 02 2018
Encryption Standard
The AES Cipher
13 28 02 2018
Principles of Public-Key
cryptosystems
14 01 03 2018
Principles of Public-Key Cryptosystems
, The RSA algorithm
15 Key Management 05 03 2018

16 Diffie - Hellman Key Exchange 06 03 2018

17 Elliptic Curve Arithmetic 07 03 2018

18 Authentication functions. 08 03 2018

19 Hash Functions 12 03 2018


Intruders
20 Introduction ,Intruders, Intrusion 13 03 2018
techniq
21 Intrusion Detection 14 03 2018
Statistical anomaly detection, rule based
22 detection ,distributed Intrusion 19 03 2018
Detection
23 Honey spot 20 03 2018

24 Password Management 21 03 2018

25 Password selection strategies 22 03 2018


Firewalls Design Principles
26 26 03 2018
Firewalls Design Principles,
27 Firewall characteristics, 27 03 2018

28 Firewall configurations 28 03 2018

29 Trusted Systems 29 03 2018

30 Data access control 02 04 2018


The concepts of Trusted Systems
31 03 04 2018
Trojan Horse defense
32 04 04 2018
Digital signatures
33 Introduction to Digital signatures, 05 04 2018
requirements
34 Direct & attributed Digital signatures 09 04 2018

Authentication Protocols &Mutual


35 10 04 2018
authentication

36 One- way Authentication 11 04 2018

37 Digital Signature Standard. 12 04 2018

38 DSS Approach 23 04 2018

39 Digital Signature Algorithm 24 04 2018


Web Security Consideration
40 25 04 2018
Web Security Consideration
Security socket layer (SSL) & Transport
41 26,30 04 2018
layer
42 SSL Architecture’s ,SSL record protocol 02 05 2018
Alert, Handshake protocol , Transport
43 03 05 2018
layer security
44 Secure Electronic Transaction. 07 05 2018
SET Overview, Dual signature,
45 08,09 05 2018
Transport layer security
Malicious software
46 10 05 2018
Viruses and Related Threats
47 Malicious programs, Nature of viruses 14 05 2018

48 Macro viruses , E-mail viruses, worms 15 05 2018


Virus Countermeasures
49 16 05 2018
Antivirus Approaches
50 21 05 2018
Advanced Antivirus techniques
51 22 05 2018
Behavior Blocking Software
52 23 05 2018

STAFF HOD

You might also like