422 031: Introduction to Cybersecurity (Spring 2025)


Course Description:
Introduction to computer security and information and communication technology, encryption techniques, introduction to number theory, public key algorithm, key management, hash function, digital signature and authentication protocol, electronic mail security, Internet Protocol (IP) security (IPsec), Lan security, web security, virus, worm, firewall, intrustion detection and prevention, hacker, software and hardware security, information technology security management, risk analysis and management, digital forensics, ethic, computer security law.

Prerequisite: Basic Knowledge of Computer Network; Operating System; Computer Architecture; Database

Instructor:
  • Chakchai So-In, Ph.D., chakso AT kku.ac.th
  • Satit Kravenkit, Ph.D., satikr AT kku.ac.th

  • Office: @9523 (Applied Network Technology)
    Office Hours: Friday 08.30 to 10.30 (or email me for appointment)
    Class homepage: https://csperson.kku.ac.th/chakchai/422031_Spring25
    Cisco Networking Academy - Cybersecurity Essential: Cisco Netacad
    Huawei Talent Online: Huawei Talent
    Teaching Assistant:
  • Chatchai Punriboon chatchai AT kkumail.com, Office hour Monday (Email -> Tentative)
  • Nakarin Praipaisan Nakarin.pra AT kkumail.com, Office hour Tuesday (Email -> Tentative)
  • Pontita Roobjan Pontita.r AT kkumail.com, Office hour Wednesday (Email -> Tentative)

  • Location:
    Section I+II: - Lecture: on Wednesday at room @SC9127 from 13.00 to 15.00 (Sec I+II)
    - Lab: on Wednesday at room @SC9603 from 15.00 to 17.00 (Sec I)
    - Lab: on Wednesday at room @SC9603 from 17.00 to 19.00 (Sec II)
    - Lab: on Wednesday at room @SC9603 from 10.30 to 12.30 (Sec II)
    Facebook Group: Facebook Group
    Textbook
    The main textbooks for the course are
    1.Computer and Network Security (Thai Edition) by Chakchai So-In, 2011-2018.
    2.¤ÙèÁ×ÍàÃÕ¹áÅÐãªé§Ò¹ Network Security Lab ©ºÑºãªé§Ò¹¨ÃÔ§ by Chakchai So-In et al., 2018.

    Supplementary (Cisco Cybersecurity Essenteial)
    1.Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide by Shane Sexton and Raymond Lacoste, 2024.

    Supplementary
    1. Principles of Information Security (7th edition) by Michael E. Whitman and Herbert J. Mattord, 2021.
    2. Network Security: Private Communication in a Public World (3rd edition) by Charlie Kaufman, Radia Perlman, and Mike Specimner, 2022
    3. Effective Cybersecurity: A Guide to Using Best Practices and Standards by William Stallings, 2018
    4. Cryptography and Network Security: Principles and Practice (8th edition) by William Stallings, 2019
    5. Computer and Information Security Handbook (3rd edition) by John Vacca, 2017
    6. CCNA Security Course Booklet (version 1.1) by Cisco Systems, 2012.
    7. CompTIA Security+ Guide to Network Security Fundamentals (MindTap Course List) (7th edition) by Mark Ciampa, 2020.
    8. Law (ICT) Thailand

    Interesting Computer and Network Security Material
    1. Master in Security 3rd edition (Thai) by Jatuchai Pangjun, 2018
    2. ºÃÔËÒèѴ¡Òà Networking ´éÇ Windows 7 by ¾ÔÈÒÅ ¾Ô·ÂÒ¸ØÃÇÔÇѲ¹ì, 2012
    3. ¤ÑÁÀÕÃì Ubuntu Linux Server àÅèÁ 1 by ºÑ³±Ôµ ¨ÒÁÃÀÙµÔ, 2012
    4. ¤ÑÁÀÕÃì Ubuntu Linux Server àÅèÁ 2 by ºÑ³±Ôµ ¨ÒÁÃÀÙµÔ, 2012
    5. ¤ÑÁÀÕÃì Ubuntu Linux Server àÅèÁ 3 by ºÑ³±Ôµ ¨ÒÁÃÀÙµÔ, 2012
    6. µÔ´µÑé§Ãкºà¤Ã×Í¢èÒ Linux Server ÀÒ¤»¯ÔºÑµÔ by ¾ÔÈÒÅ ¾Ô·ÂÒ¸ØÃÇÔÇѲ¹ì, 2012
    7. Network and Computer Security Specialist #1, #2, #3 (Thai) by Minister of ICT, Thailand
    8.
    Hands-on Ethical Hacking and Network Defense by Michael T. Simpson, Kent Backman, and James E. Corley, 2018
    9. CEH Certified Ethical Hacker All-in-One Exam Guide by Matt Walker, 2011
    10. CEH Certified Ethical Hacker Study Guide by Kimberly Graves, 2010
    11. Applied Cryptography: Protocols, Algorithms, and Source Code in C by Bruce Scheier, 2096
    12. Network Security Essentials: Applications and Standards by William Stalling, 2010
    13. Hacking Exposed: Network Security Secrets and Solutions by Stuart McClure, Joel Scambray, and George Kurtz, 2009
    14. Network Security Architectures by Sean Convery, 2010
    15. CISSP Certified Information Systems Security Professional STUDY GUIDE by SYBEX, 2010

    Other good books are
    Slides from Prof. Raj Jain, Network Security Slides
    Most importantly, please READ all Computer and Network Security Wiki related topics.
    Network Programming (Bee)
    UNIX Tutorial for Beginners Tutorial@virginia.edu
    Example Toos/Testbed (Networking/Security/Mobile and Wireless Technology)
    Click Here to see a list of testbed/tools
    Youtube Project: Project (Testbed) (Class in 2024)
    Project (Testbed) (Class in 2023)
    Project (Testbed) (Class in 2022) More Examples Click Here
    News
    Lecture Schedule: (Tentative Subject to Change)
    ClassDayDateTopic
    1Wednesday20/11/2024Chapter 1: Course Overview
    2Wednesday27/11/2024Chapter 2: Need for Security
    3Wednesday04/12/2024Chapter 3: Risk Analysis
    4Wednesday11/12/2024Chapter 4: Classicial Encryption Techniques
    5Wednesday18/12/2024 (Graduation Ceremony => Zoom/Onsite Saturday 28/12/2024 09.00-10.45)Chapter 5_1 (Part I): Application Security
    6Wednesday25/12/2024 Chapter 5_1 (Part II) + Chapter 5_2: (Cont.) + LAN (Layer 2) Security
    7Wednesday01/01/2025 (Holiday=> Zoom/Onsite Saturday 28/12/2024 10.45-12.00)Chapter 6_1: Malicious Software
    8Wednesday08/01/2025Security Topic Selection Proposal (PPT) + Review for Midterm + Dhamma #1 + Dhamma #2 + Dhamma #3 + Encoragement
    9Wednesday15/01/2025Mid-Term Exam (week 13/01-20/01) = Saturday 11/01 (09.00 - 12.00)
    10Wednesday22/01/2025Chapter 6_2 (Part I + II): Hacker and IDS/IPS
    11Wednesday29/01/2025Chapter 7 + Chapter 8: VPN and IPSec Security + Firewall
    12Wednesday05/02/2025Chapter 9 + Chapter 10 + Chapter 11: Authentication/Authorization/Accounting (AAA) + Physical (Hardware) Security + Block Cipher and Encryption Standard
    13Wednesday12/02/2025 (Makha Bucha => Zoom/Onsite Saturday 15/02/2024 09.00-10.45)Chapter 12: Public Key Cryptography and Key Management
    14Wednesday19/02/2025Chapter 13: Hashing and Digital Signature
    15Wednesday26/02/2025Chapter 14 (Part I + II + III): Ethic + Computer Crime Law + Cyber Security Law
    16Wednesday05/03/2025Review for Finalterm + Final Security Tool/App Presentation PPT + Demo + Poster + Video (youtube) + Code/Configuration/Testbed
    17Wednesday12/03/2025Final-Term Exam (week 17/03-24/03) = 23/03 (09.00 - 12.00)

    Homework/LabHW Assignments (Spring 2025 schedule): (Subject to Change)
    Ten or eleven homeworks will be assigned (as Cisco Cybersecurity = Chapters + Exams) throughout the course. Click here https://www.netacad.com.
    Ten or eleven lab-homeworks will be assigned (at the end of lab chapter) throughout the course. Click here https://serazu.com/web/product/view?id=704.
    Note: Some of the questions will be used as QUIZ during the lecture.

    Submission:
    All assignment should be turned via Google Drive = 422031_Spring25. Late lab homework will be assessed a 30% penalty.
    Each group-homework should include title prefix = "GroupID_HWID" such that ID is your Group/HW number.
    Each group-lab-homework should include title prefix = "GroupID_LabHWID" such that ID is your Group/Lab number.
    Note: For homework and lab assignment; you MUST include the cover letter with students' signature OTHERWISE they WILL NOT be graded.
    Lab Schedule: (Tentative Subject to Change)
    LabDescription
    #1Lab1: Install Virtual Machine + Windows OS + Basic Security + AntiVirus + Basic User Configuration (Lab1.pdf)
    #2Lab2: Shared Files (Chapter 4) + Basic Encryption/Decryption (Chapter 12)
    #3Lab3: Network Service Security (telnet/ftp/www) + Wireshark (Chapter 3)
    #4Lab4: Network Managenment Tools (Chapter 5)
    #5Lab5: Web and Database Security (Lab5.pdf)
    #6Lab6: Password Security (Lab6.pdf)
    #7Lab7: Malwares and Attacks (Chapter 9)
    #8Lab8: IDS (Chapter 7)
    #9Midterm Lecture Exam (allow 2*A4)
    #10Lab9: IPSec + VPN + Email Security (Chapter 6)
    #11Lab10: Firewall + Proxy + NAT (Chapter 8)
    #12Lab11: Radius + Syslog Server + Backup (Chapter 10)
    #13Lab12: Set up Script + Stenography (Chapter 11)
    #14Lab13: Encryption/Decryption + Hashing (Chapter 13)
    #15Lab14-15: Layer 2 Security (Lab14.pdf) OR KALI_1 + Router Security (Lab15.pdf) OR KALI_2
    #16Final Lab Exam (allow Textbooks + Lab_PDF)
    #17Final Lecture Exam (allow 2*A4)

    Academic Integrity
    Students at Khon Khan University are engaged in the first step for their professional career with the highest standards. Please follow the academic integrity guideline at Cheating and Plagiarism [@CMU]. All these rules are enforced for the entire course.
    Security Tools/Apps - Group of 6 students
    Security Tool
    ONLY hands-on security tools on topic of your choice
    The final outcome MUST be something VISUAL= Computer/Network/Information/Internet/ Security Tools
    There is about 20 mins demo + Document (PPT/ Poster/ Video mp4 - youtube/ Code-Zip)
    Tool Ideas: http://sectools.org/?page=1

    Main Project (Project I)
    Project Ideas:
  • Ideas at Stanford.edu
  • Ideas at Berkeley.edu
  • Ideas at MIT.edu
  • Ideas at DotCrime
  • Ideas at Sunysb.edu
  • Ideas at Berkeley.edu
  • Ideas at Udel.edu
  • Ideas at Fsu.edu
  • Ideas at Upenn.edu

  • In this semester, we focus on Mobile and Wireless Network Security including sensor network security; however, we do not limit on these.
    Cisco Netrider Contest (Networking Competition)
    Network Security Contest
    Click Here

    Project Milestone

    Description

    Completion Date

    #1Security Topic Selection Proposal 10 mins PPT Presentation (what is it) = Topic + (2)Related Work + What is it? + What makes different from those 2? + Examples = 6-8 pages)08/01/2025
    #2Security Topic Tool/App Submission 20 mins Presentation (Demo) = Poster + PPT + Video Youtube .mp4 (Presentation + Demo) + Code .zip + Demo 05/03/2025

    Note: These are group projects BUT grading individually *write who do what in what%?*
    Grading: (tentative)
    Mid-Term Exam (Lecture) + Industrial Exam25% +/- 25%
    Final Exam (Lecture/Lab)30% +/- 20%
    Homework + Lab + LabHW + Quiz + Class participation25% +/- 10%
    Security Tools/App20 +/- 10% (grading individually)

    Note that students are allowed to bring only "TWO" piece of A4 paper in midterm/final exams with additional non-memorized calculator
    The final exam material will be after the mid-term; however, all related contents will be also covered.
    The exam includes 1. True/False (+1, -1, and 0), 2. Numerical and Analysis, and 3. Fill in the blank.
    The final grade will be curved based on the overall performance of the whole class (probablistic clear cut-off point).
    Note: Extra Credits:
  • +2.5 to 5% 1st round competition
  • +5 to 10% Final round competition; Published Paper/NSC/Imagine Cup/Samart etc.
  • +1% for taking a security contest exam
  • +2.5% for taking/passing the security online course, e.g., udemy and coursera
  • +5 to 10% passing Security Certifications

  • Other related computer and network security research links
    1. CCSS Center for Computer Systems Security, University of Southern California, http://ccss.usc.edu/
    2. UW CSE Systems, Networking, and Security Research, University of Washington, http://www.cs.washington.edu/research/systems.intro.html
    3. Cyber Security, Virginia Tech, http://www.cyber.vt.edu/research
    4. The Computer Security Group, UCSB, http://seclab.cs.ucsb.edu/
    5. Security Research Lab, UC Berkeley, http://security.cs.berkeley.edu/
    6. IBM Security and Privacy, IBM, http://researcher.ibm.com/view_project.php?id=151
    7. CyLab, CMU, http://www.cylab.cmu.edu/
    8. Computer Security Division, NIST, http://csrc.nist.gov/
    9. Networking and Security Research Center, PSU, http://nsrc.cse.psu.edu/
    10. Security Group @CA, University of Cambridge, http://www.cl.cam.ac.uk/research/security/
    11. Stanford Security Laboratory, Stanford University, http://seclab.stanford.edu/
    12. Network Operations and Internet Security Lab, GATECH (Prof. Nick Feamster), http://www.gtnoise.net/
    13. Illinois Security Lab, UIUC (Dr. Carl A. Gunter), http://seclab.illinois.edu/
    14. Systems and Internet Infrastructure Security (SIIS), PSU, http://siis.cse.psu.edu/
    15. Network Security Lab, Columbia University, http://nsl.cs.columbia.edu/
    16. CENTER FOR INFORMATION AND COMPUTATION SECURITY (CICS), UCLA, http://www.cs.ucla.edu/security/
    17. Center for Wireless Information Network Studies, WPI (Prof. Kaveh Pahlavan), http://www.cwins.wpi.edu/
    18. Maryland Cybersecurity Center, UMD, http://www.cyber.umd.edu/faculty/index.html
    19. Center for Research on Computation and Society (CRCS), Harvard, http://crcs.seas.harvard.edu/
    20. Systems and networking group, UCSD, http://sysnet.sysnet.ucsd.edu/sysnet/
    21. Information Security Research Group, UCL, http://sec.cs.ucl.ac.uk/
    22. Center for Information Assurance and Security, UTexas, http://www.cias.utexas.edu/index.htm
    23. Johns Hopkins University Information Security Institute (JHUISI), JHU, http://web.jhu.edu/jhuisi/
    24. University of Oregon Network Security Research Lab, University of Oregon, http://netsec.cs.uoregon.edu/

    Back to Chakchai So-In's Home Page