Cource Identity
Network Security course provides students with understanding and knowledge to recognize about:
2. Attacking techniques
3. Network security
The course DCH3D3 NETWORK SECURITY is given in semester 5. The credit load is 3 credits which are divided into 5 meeting hours per week, consisting of 2 hours of theory, and 3 hours of practicum.
Learning Outcomes
After taking this course, students are expected to be able to make network defense system planning.
Course Profile and History
This course is a compulsory course for D3 Computer Technology study program students in the 2016 curriculum. This course follows certification materials in the field of Network security including:
1. CEH (Certified Ethical Hacker) from EC-Council for Study 1
2. ENSA (EC-Council Network Security Administrator) for Review 2
3. CISSP (Certified Information Systems Security Professional) for Review 2
4. Information security lecture material from Mr. Budi Rahardjo for cryptography material
5. ID-CERT training material
Course Relevance (Urgency)
With the development of the Internet of Things, there are various security threats on the Internet. For this reason, an understanding of network security is needed.
Material Map (Study or Subject Matter)
The course is divided into 3 studies namely:
1.Attack Techniques
2.Defense Techniques
3.Building a Defense System
Subject matter:
2. Assault Technique
3. Password Security
4. Sniffing & Dos
5. Wireless Security
6. Basic Cryptography
7. Advanced Cryptography
8. Authentication & VPN
9. Firewall
10. IDS
11. Security System Design
12. Malware
13. Digital Forensics
e-Learning based Course Learning Plan
Network security courses require a lot of practice, e-learning materials are prepared only to provide an introduction to Network Security material.
- Introduction to the concept of Network Security
- Introduction to Basic Elements of Network Security
- Introduction to CIA Aspects
- Hacking Simulation Exercise
Week 2. Assault Technique
- Introduction to Assault Techniques
- Anatomy of Hacking
- Scanning Theory
- Scanning Exercise -Nmap
- Understanding the scan result
- Enumeration Exercise
Week 3. Password Security
- Password Security
- Password Cracking Technique
- Dictionary Attack
- Brute Force Attack
- Wordlist
- Password Cracking Exercise
Week 4. Sniffing & Dos
- Sniffing Techniques
- ARP Spoofing
- DDoS
- Sniffing Practice
- Vulnerability Scanning Practice
Week 5. Wireless Security
- Metasploit
- Wireless Cracking
- Web Security
- Metasploit Practice
- Wireless Cracking Practice
- Web Injection Practice
Week 6 Assessment 1
Week 7 Cryptography Basics
- Foundations of Cryptography
- Classical cryptography
- Symmetric algorithms
- Asymmetric Algorithm
- Symmetric crypto practice
- PGP practice
- Hash Practice
- Practice Stegano, Digital Watermark
Week to 8. Authentication & VPN
Basic Authentication
- What you know, have, who you are
- VPN
- SSL Practice
- VPN Practice
Week 9: Firewalls
- Firewall
- IPTables
- DMZ
- IPTables Practice
Week 10. IDS
- Introduction to IDS
- IDS Components
- IPS
- Honeypot
- IDS Practice
- Honeypot Practice
Week 11 Assessment 2
Week 12 Security System Design
- Security system design
- Hardening
Week 13. Malware
- Malware
- Malware Analysis Techniques
- Malware Analysis Practice
- Reverse Engineering Practice
Digital Forensics Week 14.
Digital Forensics
- Forensic Engineering
- Digital Forensics Practice
- Practice Network Forensics
- Memory Forensics Practice
Week 15 Hardening
- Hardening Technique
- Hardening Practice
Week 16 Assessment 3
Course links to other courses
The Network Security course has course prerequisites:
1. Computer System
2. Operating System
3. Computer Network System
Learning Outcome Map
PLO7: Have the ability to build, maintain computer networks, server systems and network security.
CLO1: Students understand the concept of network security
CLO2: Students are able to perform attack techniques
CLO3: Students are able to use defense techniques
CLO4: Students are able to build network security systems
Best Practice
This course is practice-based, each meeting will be given practical training material. Prepare a healthy laptop, then configure the laptop using 2 operating systems, Windows and Linux. The Linux Operating System used is free, but it is highly recommended to use Kali Linux.
To pass, always do the exercises given. If there is something you don’t understand, you can discuss it with the practicum system.
Certifications
Certifications related to this course
- EC-Coucil CEH (Certified Ethical Hacking)
- ISC2 SSCP (System Security Certified Practitioner)
- EC-Council CND (Certified Network Defender)
Course Reference
- Stallings, W. (2010). Network Security Essentials:Applications and Standards 4th Edition. Prentice Hall.
- Singh, S. (1999). Code Book- The Science of Secrecy from Ancient Egypt to Quantum Cryptography. Anchorbooks
- Rash, M. (2007). Linux Firewalls: Attack Detection and Response with IPTables, psad and fwSnort. NoStarch.
- Beale, J. (2007). Snort IDS and IPS Toolkit. Syngress.
- Sikorski, M. (2012) Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software