Class | Day | Date | Topic | |
1 | Tuesday | 11/08/2015 | Course Overview | |
2 | Tuesday | 18/08/2015 | Need for Security | |
3 | Tuesday | 25/08/2015 | Risk Analysis | |
4 | Tuesday | 01/09/2015 | Basic Encryption Techniques | |
5 | Tuesday | 08/09/2015 | Project Topic Selection Proposal + Encoragement1 + Encoragement2 + Encoragement3 | |
6 | Tuesday | 15/09/2015 | Application Security | |
7 | Tuesday | 22/09/2015 | Malicious Software + IDS/IPS | |
8 | Tuesday | 29/09/2015 | Review for Midterm + Security Tool Topic Selection + Dhamma #1 + Dhamma #2 + Dhamma #3 | |
9 | Tuesday | 06/10/2015 | Mid-Term Exam (week 06/10-13/10) | |
10 | Tuesday | 13/10/2015 | VPN + IPSec | |
11 | Tuesday | 20/10/2015 | Security Tool Presentation + Firewall | |
12 | Tuesday | 27/10/2015 | Authentication/Authorization/Accounting + Software/Hardware Security | |
13 | Tuesday | 03/11/2015 | Block/Stream Ciphers | |
14 | Tuesday | 10/11/2015 | Public Key Infrastructure | |
15 | Tuesday | 17/11/2015 | Hashing Techniques + Ethic + Computer Crime + IT Law | |
16 | Tuesday | 24/11/2015 | Review for Finalterm + Final Project Presentation PPT + Demo + Poster + Video (youtube) + Code/Configuration | |
17 | Tuesday | 01/12/2015 | Final Exam (week 01/12-08/12) | | |
Lab Homework | Description | Out Date | Due Date | |
#1 | Install Virtual Machine + Windows OS (Chapter 2 + extra) | 11/08/2015 | 18/08/2015 | |
#2 | Reset Pass Single Boot + Cracking password + Remote Assistance | 18/08/2015 | 25/08/2015 | |
#3 | Install telnet/ssh http/https ftp/secure ftp services + Install Wireshark (Chapter 4) | 25/08/2015 | 01/09/2015 | |
#4 | Basic Encryption/Decryption | 01/09/2015 | 08/09/2015 | |
#5 | Set up Script + Stenography | 08/09/2015 | 15/09/2015 | |
#6 | Shared Files + Windows Security Tools + Netcut | 15/09/2015 | 22/09/2015 | |
#7 | Basic networking tools + Port/IP scannning + Personal Firewall (Chapter 5 + extra) | 22/09/2015 | 29/09/2015 | |
#8 | Set up Simple IDS | 29/09/2015 | 06/10/2015 | |
#9 | Example: Malware and Attacks | 13/10/2015 | 20/10/2015 | |
#10 | Set up Windows firewall (2 interfaces) + Web Proxy + Windows NAT | 20/10/2015 | 27/10/2015 | |
#11 | IPSec + VPN + Email Security | 27/10/2015 | 03/11/2015 | |
#12 | Set up Winredius + Hardware Authen + Syslog Server + Backup | 03/11/2015 | 10/11/2015 | |
#13 | Advanced Encryption/Decryption and Hashing | 10/11/2015 | 17/11/2015 | |
#14 | ALL lab submissions: Checking + Review Final Lab exam | 17/11/2015 | 24/11/2015 | |
#15 | Final Lab Exam | 24/11/2015 | 01/12/2015 | |
Note:For homework and lab assignment; you MUST include the cover letter with students' signature OTHERWISE they WILL NOT be graded.
Academic Integrity
Students at Khon Khan University are engaged in the first step for their professional career with the highest standards. Please follow the academic integrity guideline at Cheating and Plagiarism [@CMU]. All these rules are enforced for the entire course.
Project - Group of up to 4-6 students (The member is from two lab-groups)
Security Tool
ONLY hands-on security tools on topic of your choice
The final outcome MUST be something VISUAL= Computer/Network/Information/Internet/ Security Tools
There is about 20 mins demo + Document (setting + demo)
Tool Ideas:
http://sectools.org/?page=1
Main Project (Project I)
Project Ideas:
Ideas at Stanford.edu
Ideas at Berkeley.edu
Ideas at MIT.edu
Ideas at DotCrime
Ideas at Sunysb.edu
Ideas at Berkeley.edu
Ideas at Udel.edu
Ideas at Fsu.edu
Ideas at Upenn.edu
In this semester, we focus on Mobile and Wireless Network Security including sensor network security; however, we do not limit on these.
Project NSC2011 Examples
Central; Isan; North; South; East; West
Project NSC2012 Examples
Central; Isan; North; South; East; West
Project NSC2013 Examples
Central; Isan; North; South; East; West
Project NSC2015 Examples
Central; Isan; North; South; East; West
Cisco Netrider Contest (Networking Competition)
Netrider 2010; Netrider 2011; Netrider 2012; Netrider 2015
Network Security Contest
Network Security Contest 2010; Network Security Contest 2011; Network Security Contest 2012; Network Security Contest 2013
Project Milestone | Description | Completion Date |
#1 | Project Topic Selection Proposal + 15 mins Presentation (what is it) | 08/09/2015 |
#2 | Security Tool Topic Selection + 5 mins (what is it) | 29/09/2015 |
#3 | Security Tool Presentation + 15 mins Presentation Demo + Document | 20/10/2015 |
#4 | Final Project Submission 20 mins Presentation = Poster + PPT + Video (youtube) + Code + Demo | 24/11/2015 |
Note: These are group projects BUT grading individually *write who do what in what%?*
Grading: (tentative)
Mid-Term Exam | 25% |
Final Exam | 25% | |
Homework + Lab + Quiz + Class participation | 20% |
Final Lab Exam | 10% |
Term Project + Security Tool | 20% (grading individually) |
Note that students are allowed to bring only "ONE" piece of A4 paper in each exam with additional non-memorized calculator
The final exam material will be after the mid-term; however, all related contents will be also covered.
The exam includes 1. True/False (+1, -1, and 0), 2. Numerical and Analysis, and 3. Fill in the blank.
The final grade will be curved based on the overall performance of the whole class (probablistic clear cut-off point).
Note: Extra Credits +2.5 to 5% 1st round competition; +5 to 10% Final round competition; Published Paper/NSC/Network Security Contest/CISSP Certification/CCNA or CCIE Security Certification/Imagine Cup/Samart etc. **>1% for taking a network security contest exam
Other related computer and network security research links
- CCSS Center for Computer Systems Security, University of Southern California, http://ccss.usc.edu/
- UW CSE Systems, Networking, and Security Research, University of Washington, http://www.cs.washington.edu/research/systems.intro.html
- Cyber Security, Virginia Tech, http://www.cyber.vt.edu/research
- The Computer Security Group, UCSB, http://seclab.cs.ucsb.edu/
- Security Research Lab, UC Berkeley, http://security.cs.berkeley.edu/
- IBM Security and Privacy, IBM, http://researcher.ibm.com/view_project.php?id=151
- CyLab, CMU, http://www.cylab.cmu.edu/
- Computer Security Division, NIST, http://csrc.nist.gov/
- Networking and Security Research Center, PSU, http://nsrc.cse.psu.edu/
- Security Group @CA, University of Cambridge, http://www.cl.cam.ac.uk/research/security/
- Stanford Security Laboratory, Stanford University, http://seclab.stanford.edu/
- Network Operations and Internet Security Lab, GATECH (Prof. Nick Feamster), http://www.gtnoise.net/
- Illinois Security Lab, UIUC (Dr. Carl A. Gunter), http://seclab.illinois.edu/
- Systems and Internet Infrastructure Security (SIIS), PSU, http://siis.cse.psu.edu/
- Network Security Lab, Columbia University, http://nsl.cs.columbia.edu/
- CENTER FOR INFORMATION AND COMPUTATION SECURITY (CICS), UCLA, http://www.cs.ucla.edu/security/
- Center for Wireless Information Network Studies, WPI (Prof. Kaveh Pahlavan), http://www.cwins.wpi.edu/
- Maryland Cybersecurity Center, UMD, http://www.cyber.umd.edu/faculty/index.html
- Center for Research on Computation and Society (CRCS), Harvard, http://crcs.seas.harvard.edu/
- Systems and networking group, UCSD, http://sysnet.sysnet.ucsd.edu/sysnet/
- Information Security Research Group, UCL, http://sec.cs.ucl.ac.uk/
- Center for Information Assurance and Security, UTexas, http://www.cias.utexas.edu/index.htm
- Johns Hopkins University Information Security Institute (JHUISI), JHU, http://web.jhu.edu/jhuisi/
- University of Oregon Network Security Research Lab, University of Oregon, http://netsec.cs.uoregon.edu/
Back to Chakchai So-In's Home Page