Differences between revisions 34 and 62 (spanning 28 versions)
Revision 34 as of 2011-01-09 16:36:27
Size: 1881
Editor: 71-88-174-166
Comment:
Revision 62 as of 2013-09-11 13:31:28
Size: 1793
Editor: scot
Comment:
Deletions are marked like this. Additions are marked like this.
Line 6: Line 6:
This page contains resources for Network Security CPTR 427. For assignments see the [[https://www.southern.edu/moodle2|Eclass website]]. {{http://imgs.xkcd.com/comics/cryptography.png}}

This page contains resources for Network Security CPTR 427. For assignments etc. see the [[https://eclass.e.southern.edu|Eclass website]].
Line 9: Line 11:
== Topics and resources == == Topics, Resources and Ideas for the future ==
Line 11: Line 13:
   * [[NetworkSecurity/Lab]]
   * [[NetworkSecurity/Tools]]
   * [[NetworkSecurity/Hacking]]
   * [[NetworkSecurity/Encryption]]
   * [[NetworkSecurity/FireWall]]
   * [[http://facultyfp.salisbury.edu/despickler/personal/CryptTools.asp|Cryptotools]]
   * /NetworkSecurityEssentials4 notes from the book used in 2013.
   * [[
/Lab]]
   * [[/Tools]]
   * [[/Programs]]
   * [[
/Hacking]]
   * [[/Encryption]]
   * [[/Spam]]
   * [[
/FireWall]]
   * [[/Topics]]
   * [[/SageIdeas
]]
   * [[http://facultyfp.salisbury.edu/despickler/personal/CryptTools.asp|Cryptotools]] from AMS/MAA conference 2011 by Dr. Don Spickler.
Line 18: Line 25:
   * In the past we have used [[NetworkSecurity/WebScarab|Web scarab]]    * Two proxy tools that allow editing and observing http(s) are [[NetworkSecurity/WebScarab|Web scarab]] and [[http://www.parosproxy.org/|Paros Proxy]] - there is also some nice proxies specifically for firefox.
Line 21: Line 28:
   * [[http://web.nvd.nist.gov/view/vuln/search?execution=e2s1|National Vulnerability Database]]
   * Back in the stone age (relatively speaking of course) Dr. A took a course called [[Csce877]].
Line 25: Line 34:
'''Required Books''' '''Recommended Additional Books'''
Line 28: Line 37:
   * The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography ISBN: 0385495323
      * Each student must read this New York Times Best Seller.
      * Cryptography will be studied in conjunction with the assigned chapters.
   * Network Security Essentials 4th Ed. ISBN: 0-13-610805-9
      * The theory of cryptography (Symmetric, Public-key, Key-management, Hash and MAC) are covered from this book
      * Applications of theory are partially covered from this book (Kerberos, X.509, IPSec)
      * Dr. A will do all the lecturing on these topics.
   * Labs will be given from handouts. Topics will be take from [[NetworkSecurity/Lab]]

'''Recommended Book(s)'''

   * Snort IDS and IPS Toolkit ISBN-10: 1-59749-099-7
   * [[http://ofps.oreilly.com/titles/9781449320317/ch_Security.html|MVC 4 Security, Authentication and Authorization]]
Line 43: Line 41:
   * Cptr427Winter2010       * /Cptr427Winter2010

CPTR 427 Network Security Class Wiki

http://imgs.xkcd.com/comics/cryptography.png

This page contains resources for Network Security CPTR 427. For assignments etc. see the Eclass website. For information on what you should already know, take a look at NetworkSecurity/Prerequisites.

Topics, Resources and Ideas for the future

Books Used in this Class

Recommended Additional Books

Past Year Class Pages

NetworkSecurity (last edited 2024-01-07 18:12:17 by scot)