Course Identity
The Network Security course provides students with the understanding and knowledge to recognize about:
2. Attacking techniques
3. Network security
The course DCH3D3 NETWORK SECURITY is given in semester 5. The credit load is 3 credits which are divided into 5 meeting hours per week, consisting of 2 hours of theory, and 3 hours of practicum.
Learning Outcome
After taking this course, students are expected to be able to make network defense system planning.
Profile and Course History
This course is a compulsory course for D3 Computer Technology study program students in the 2016 curriculum. This course follows certification materials in the field of Network security including:
1. CEH (Certified Ethical Hacker) from EC-Council for Study 1
2. ENSA (EC-Council Network Security Administrator) for Study 2
3. CISSP (Certified Information Systems Security Profesional) for Study 2
4. Information security lecture material from Mr. Budi Rahardjo for cryptography material
5. ID-CERT training material
Relevance (Urgency) of Courses
With the development of the Internet of Things, there are various security threats on the Internet. For this reason, an understanding of network security is needed.
Material Map (Study or Subject)
This course is divided into 3 studies namely:
1.Attack Techniques
2.Defense Technique
3.Building the Defense System
Subject:
2. Attack Technique
3. Password Security
4. Sniffing & Dos
5. Wireless Security
6. Basic Cryptography
7. Advanced Cryptography
8. Authentication & VPN
9. Firewall
10. IDS
11. Design of Security System
12. Malware
13. Digital Forensics
Course Learning Plan based on e-Learning
Network security courses require a lot of practice, the e-learning material prepared is only to provide an introduction to Network security material.
- Introduction to Network Security concept
- Introduction to Basic Elements of Network Security
- Introduction of CIA Aspect
- Hacking Simulation Exercise
Week 2. Attack Technique
- Introduction Attack Technique
- Anatomy of Hacking
- Scanning Theory
- Scanning Exercise -Nmap
- Understand the scan result
- Enumeration Exercise
Week 3. Password Security
- Password Security
- Password Cracking Technique
- Dictionary Attack
- Brute Force Attack
- Wordlist
- Password Cracking Exercise
Week 4. Sniffing & Dos
- Sniffing Technique
- ARP Spoofing
- DDoS
- Sniffing Exercise
- Vulnerability Scanning Practice
Week 5. Wireless Security
- Metasploit
- Wireless Cracking
- Web Security
- Metasploit Practice
- Wireless Cracking Practice
- Web Injection Practice
Week 6 Assessment 1
Week 7 Basic Cryptography
- Basic Cryptography
- Clasic Cryptography
- Symmetric algorithm
- Asymmetric Algorithm
- Symmetric crypto practice
- PGP Practice
- Hash Practice
- Stegano Practice, Digital Watermark
Week 8. Authentication & VPN
- Basic Authentication
- What you know, have, who you are
- VPN
- SSL Practice
- VPN Practice
Week 9. Firewall
- Firewall
- IPTables
- DMZ
- IPTables Practice
Week 10. IDS
- Introduction IDS
- IDS Component
- IPS
- Honeypot
- IDS Practice
- Honeypot Practice
Week 11. Assessment 2
Week 12 Design of Security System
- Design of Security System
- Hardening
Week 13. Malware
- Malware
- Malware Analysis Technique
- Analisa Malware Practice
- Reverse Engineering Practice
Week 14. Digital Forensic
Digital Forensic
- Teknik Forensic Technique
- Digital Forensik Practice
- Network Forensik Practice
- Memory Forensik Practice
Week 15 Hardening
- Hardening Technique
- Hardening Practice
Minggu ke 16 Assessment 3
Course links to other courses
The Network Security course has course prerequisites:
1. Computer System
2. Operating System
3. Computer Network System
Learning Outcome Map
PLO7: Have the ability to build, maintain computer networks, server systems and network security
CLO1: Students understand the concept of network security
CLO2: Students are able to perform attack techniques
CLO3: Students are able to use defense techniques
CLO4: Students are able to build a network security system
Best Practice
This course is practice-based, each meeting will be given practical training material. Prepare a healthy laptop, then configure the laptop using 2 operating systems, Windows and Linux. The Linux Operating System used is free, but it is highly recommended to use Kali Linux.
To pass, always do the exercises given. If there is something you don’t understand, you can discuss it with the practicum system.
Certification
Certifications associated with this course
- EC-Coucil CEH (Certified Ethical Hacking)
- ISC2 SSCP (System Security Certified Practitioner)
- EC-Council CND (Certified Network Defender)
Course References
- Stallings, W. (2010). Network Security Essentials:Applications and Standards 4th Edition. Prentice Hall.
- Singh, S. (1999). Code Book- The Science of Secrecy from Ancient Egypt to Quantum Cryptography. Anchorbooks
- Rash, M. (2007). Linux Firewalls: Attack Detection and Response with IPTables, psad and fwSnort. NoStarch.
- Beale, J. (2007). Snort IDS and IPS Toolkit. Syngress.
- Sikorski, M. (2012) Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software