Primary course 
ISA 656 (Network Security) 

Primary textbooks 
[Kaufman] Network Security: Private Communication in a Public World (2nd Edition) Kaufman et al., Publication Date: April 22, 2002 | ISBN-10: 0130460192
[Bishop]  Computer Security: Art and Science (1st Edition) Matt Bishop Publication Date: December 2, 2002 | ISBN-10: 0201440997 | ISBN-13: 978-020144099

Additional readings
[A1] Chapter 3 of "Who Goes There? Authentication Through the Lens of Privacy". National Academies Press, 2003. [Html Link]
[A2] Tor: The Second-Generation Onion Router, Roger Dingledine, Nick Mathewson, and Paul Syverson, Proceedings of the 13th USENIX Security Symposium, August 2004. [PDF Link]
[A3] Universal Re-encryption for Mixnets, Philippe Golle, Markus Jakobsson, Ari Juels, Paul Syverson, The Cryptographers' Track at the RSA Conference, 2004. [ Local PDF Copy]
 
Topic 
Description 
Readings [Kaufman]
Readings [Bishop]
Access control and models; Security Policies and their Application 
The Access Control Matrix; Discretionary and Mandatory Access Control (DAC and MAC), RBAC, MAC; Access control policies and models Chapters 9, 10 Chapters: 2, 4-7, 15
Basic Cryptography
Block Ciphers, Stream Ciphers, Digital Certificates and Public-Key Infrastructure; Hash Functions, MACs Chapters 1-7, 11, 15 Chapters: 9, 11 
Cryptographic Protocols
Cryptographic protocols: Needham-Schroeder, Kerberos, EKE and IKE Chapters 12, 13, 14, 17  
Authentication and Identity Management; Key management
User Authentication Protocols, Trust Negotiation, IPSEC and IKE, Web Security; SSL, TLS and other secure protocols Chapters 9-12, Chapters 18, 19 Chapters 10,12,14
Firewalls, VPNs & Application Security
Email, Firewalls, Packet Filtering, VPNs, Denial of Service Chapters 20-23, 24.5, 24.8, 25, 26 Chapter 22, 23, 25-27, 33
Transport Security
Transport-level, Internet Protocol Security Chapters 16, 17, 19  
Anonymity & Privacy
Privacy Challenges, MixNets, Onion Routing
Additional Readings [A1], [A2], [A3]