ECE Course Outline

ECE4112

Internetwork Security (2-3-3)

Prerequisites
ECE3076/3600 or ECE 4110 or CS3251
Corequisites
None
Catalog Description
Hands on experimentation and evaluation of Internet Security theory, principles, and practices. Laboratory component involves implementing both defensive and offensive security techniques.
Textbook(s)
McClure, Scambray, and Kurtz, Hacking Exposed (6th edition), McGraw-Hill, 2009. ISBN 9780071613743 (required)

Topical Outline
Legal and Moral Responsibilities
Hacking and the Law

Network Reconnaissance Techniques
Network Mapping
Vulnerability Assessment
Network Mapping tools
Vulnerability Scanners
Sniffing
Defenses

IP Address Spoofing
Denial of Service Techniques using address spoofing
Man-in-the-middle
Defenses

Gaining Access
Stack-Based Buffer Overflow Attacks and
Password Attacks and Cracker tools
Web Attacks
Defenses

Maintaining Access
RootKits
Trojans and Backdoors
Defenses

Intrusion Detection
Intrusion Detection tools
Writing new intrusion detection signatures
HoneyNets
Forensics

Firewalls
Cisco PIX Firewall Case Study
Linux Firewall Case Study
Firewall Rules

Wireless Network Security
IEEE 802.11 standards
Wireless attack tools
Defenses

Worms and Viruses
Characterization of Worm Spreading Techniques
Worm and Virus infection and detection

Virtual Private Networks
Cisco VPN case study
Linux VPN experimentation

Web Server Security
Web Server Vulnerabilities
Defenses