ARASH HABIBI LASHKARI
PUBLICATIONS
  Qualifications and Certificates
  Technical Committee Member
  Professional Experience
  Research & Developme
  Awards and Honors
  In the News
  Pulications
  Teaching
  Supervising
  Workshops
  Auxiliary Activities
 Cryptography and Network Security
This course provides a broad introduction to a variety of topics in applied cryptography, network security and malwares. It is possible to divide this course into three parts. In the first part which is cryptography, we will cover number theory, symmetric and Asymmetric Cryptography, and other fundamental cryptographic constructs. Second part namely network security covers underlying concepts and foundations of computer network security, from basic knowledge about security to complex secure techniques. Third and last part is focusing on Viruses, malwares, intruders and firewalls.
Organisation
Language: The class is taught in English.
Assistant: select one student to manage, handle and collect the assignments, projects, and Lab activities.
MidTerm Examination: Written examination, (10%)
Final Examination: Written examination, (50%)
Courseworks: First coursework is compulsory + select one from number 2 or 3, (40%)
Coursework 1: 5 Courseworks (individual) (15% = 5 + 3%)
Coursework 2: A project by JAVA or C++ (Group based) + Presentation, (25%=20% + 5%)
Lecture Notes
Session 01: Introduction to Network Security: Definitions, Computer Security Goals, Additional Goals, Attacks and Threats, Type of Attacks, Security services, Security Mechanism, Network Security Model
Coursework 1
Session 02: Symmetric Encryption – Message Confidentiality: Block Cipher, DES, 3DES, AES, Stream Cipher, RC4, Randomness, Symmetric Key Distribution
Session 03: Asymmetric Encryption – Message Authentication: Message Authentication, One-way Hash Functions, SHA, HMAC, Public-Key encryption structure, RSA, Diffie-Hellman, Digital Signature standard (DSS), Elliptic-curve cryptology (ECC)
Coursework 2
Session 04: Network Access Control and Cloud Security: Network Access Control (NAC), NAC Enforcement Methods, Authentication Protocol (AP), Authentication Methods, Cloud Computing, Cloud Computing Reference Architecture, Cloud Provider, Cloud Security Risks, Data Protection in the Cloud, Cloud Security as a Service (SecaaS)
Coursework 3
Session 05: Wireless Network Security
Session 06: Email Security
Coursework 4
Session 07: IP Security
Session 08: Malwar or Malicious software
Coursework 5
Session 09: Intruders
Session 10: Firewalls
Session 11: Virus, Anti-virus
Final Project


Handouts for Lab sessions :
Handout1: Capturing/Monitoring/Analysing Network traffic
Handout2: Capturing/Monitoring/Detecting "Scanning Attack"
Handout3: Capturing/Monitoring/Detecting "Btute Force Attack"
Handout4: Capturing/Monitoring/Detecting "MITM Attack"
Handout5: Capturing/Monitoring/Detecting "DoS Attack"
Handout6: Capturing/Monitoring/Analysing "Botnet Behaviour"
Handout7: Capturing/Monitoring/Analysing "Malware behaviour"
New Brunswick, Canada     A.Habibi.L@gmail.com    A_Habibi_L@hotmail.com