ISA 564: Security Lab


Instructor

Mohamed Sharif, PhD.
E-mail: msherif@gmu.edu
Home: 571.333.8555

 


Course Description

Ø      This course Provides hands-on experience in configuring and experimenting with security software in a live laboratory environment, with the purpose of understanding real-world security threats.  Also, discussed possible mitigation and defending mechanisms, such as monitoring and intrusion detection software.


Course Prerequisites

Ø     ISA 562 or permission of instructor.


Course Material

Ø     Course Text

o       Applied Information Security by Randy Boyle

o       Student Companion Site

Ø     References

o        Counter Hack Reloaded 2ed edition by Ed. Skoudis

o       Corporate Computer and Network Security by R. Panko

o       Network Security, Private Communication in a Public World 2nd Ed by C. Kaufman, R. Perlman and M. Speciner.

o       Network Security Essentials 2nd Edition by W. Stallings.

o       Cryptography and Network Security 4th Edition by W. Stallings

o       Applied Cryptography 2nd Edition by B. Schneier

o       Handbook of Applied Cryptography by A. Menezes, P. van Oorschot and S. Vanstone.

o       Designing Network Security by M. Kaeo – Cisco Press

o       Internet & TCP/IP Network Security by U. Pabrai and V. Gurani.

o       Fundamentals of Computer Security Technology by E. Amoroso

o       Building Internet Firewalls by D. Chapman and E. Zwicky

o       Firewalls and Internet Security by W. Cheswick and S. Bellovin

o       The CERT Guide to System and Network Security Practices by J. Allen

o       WWW.Security by R. MacGregor, A. Aresi and A. Siegert

o       Inside Internet Security by J. Crume

o       Secure Commerce on the Internet by V. Ahuja

Ø     Some helpful Links:

o       Bishop Companion Site

o       Stallings Companion site


Grading policy

Ø      Weights

o       10 labs for total of 50%, 4 quizzes for total 10%, Project 10%, midterm Exams 10%, and final exam 20%.

Ø      No exam or quiz make up will be given

Ø      Lab reports are due at the beginning of the class

Ø      Late Submissions

o       Discouraged but allowed under exceptional circumstances with prior approval of the instructor.

Ø      Incomplete Grade

o       No Incompletes will be given except extreme case

Ø      Honor Code Violations

o       All violators will be reported under all circumstances, and results in a course grade of F, in addition to any other penalties imposed by the university and/or the ISE department.

Ø      Two students submitting a common or significantly similar copy of homework is an honor code violation.


Course Administration

Ø      Class Meetings

o        Wednesday 07:20 – 10:00 PM in Innovation Hall RM326

Ø      Instructor Office Hours: by appointment or after/Before class

Ø      Examinations: All Examinations are in class, individual (no collaborations), closed book, neighbor and notes.


Additional Handout

Ø      Protocol Model

Ø      DNS Overview

Ø      Socket

Ø      ASCII

Ø      Transport Protocol Ports


Course Schedule and Lectures

Ø      Approximate Course Schedule