ISA 564: Security Lab


Instructor

Mohamed Sharif, PhD.
E-mail: msherif@gmu.edu
Home: 571.333.8555


Course Description

      This course Provides hands-on experience in configuring and experimenting with security software in a live laboratory environment, with the purpose of understanding real-world security threats. Also, discussed possible mitigation and defending mechanisms, such as monitoring and intrusion detection software.


Course Prerequisites

     ISA 562 or permission of instructor.


Course Material

     Course Text

o       Applied Information Security by Randy Boyle

o       Student Companion Site

     References

o       Counter Hack Reloaded 2ed edition by Ed. Skoudis

o       Corporate Computer and Network Security by R. Panko

o       Network Security, Private Communication in a Public World 2nd Ed by C. Kaufman, R. Perlman and M. Speciner.

o       Network Security Essentials 2nd Edition by W. Stallings.

o       Cryptography and Network Security 4th Edition by W. Stallings

o       Applied Cryptography 2nd Edition by B. Schneier

o       Handbook of Applied Cryptography by A. Menezes, P. van Oorschot and S. Vanstone.

o       Designing Network Security by M. Kaeo Cisco Press

o       Internet & TCP/IP Network Security by U. Pabrai and V. Gurani.

o       Fundamentals of Computer Security Technology by E. Amoroso

o       Building Internet Firewalls by D. Chapman and E. Zwicky

o       Firewalls and Internet Security by W. Cheswick and S. Bellovin

o       The CERT Guide to System and Network Security Practices by J. Allen

o       WWW.Security by R. MacGregor, A. Aresi and A. Siegert

o       Inside Internet Security by J. Crume

o       Secure Commerce on the Internet by V. Ahuja

     Some helpful Links:

o       Bishop Companion Site

o       Stallings Companion site


Grading policy

      Weights

o       10 labs for total of 50%, 4 quizzes for total 10%, Project 10%, midterm Exams 10%, and final exam 20%.

      No exam or quiz make up will be given

      Lab reports are due at the beginning of the class

      Late Submissions

o       Discouraged but allowed under exceptional circumstances with prior approval of the instructor.

      Incomplete Grade

o       No Incompletes will be given except extreme case

      Honor Code Violations

o       All violators will be reported under all circumstances, and results in a course grade of F, in addition to any other penalties imposed by the university and/or the ISE department.

      Two students submitting a common or significantly similar copy of homework is an honor code violation.


Course Administration

      Class Meetings

o       Wednesday 07:20 10:00 PM in Innovation Hall RM326

      Instructor Office Hours: by appointment or after/Before class

      Examinations: All Examinations are in class, individual (no collaborations), closed book, neighbor and notes.


Additional Handout

      Protocol Model

      DNS Overview

      Socket

      ASCII

      Transport Protocol Ports


Course Schedule and Lectures

      Approximate Course Schedule