Introduction to network security. Basic concepts: confidentiality, integrity, availability, security policies, security mechanisms, assurance.Basic Cryptography; Secret Key Cryptography, Message Digests, Public Key Cryptography; Authentication; Trusted Intermediaries; Real-time Communication Security; Electronic Mail Security; Firewalls and Web Security.
Course Catalogue
Lab works based CSE 4419.
Introduction to wireless communications: history and evolution, current wireless communication system s, requirements of wireless services, and technical challenges of wireless communications. Radio wave propagation in the mobile environment: Free-space propagation, propagation mechanisms, large scale and small scale fading, path loss models, statistical channel models: narrowband and wideband models, System Planning: mobile radio link design, and introduction to radio network planning. Overview of wireless access networks: base and subscriber stations, multiple access technologies, noise and interference in wireless communication systems, diversity reception, MIMO communication: MIMO narrowband channel model, transmit diversity and spatial multiplexing Evolution of cellular systems, principles and operation of cellular systems, narrowband systems: FDMA and TDMA systems, frequency planing, and capacity considerations, CDMA wideband systems: resource allocation, soft handover, power control, interference and capacity, OFDMA wideband systems, and Standardized cellular communications systems. Wireless Network Standards: Wireless LANs, wireless MANs, short range wireless networks, standards, capabilities and applications, broadband wireless networks, and integration of different types of wireless networks Wireless Sensor Networks: Introduction to sensor networks and applications, issues in sensor networks in comparison to conventional wireless networks, special design considerations in energy conservation, routing etc.
Discrete time signals and systems: Fourier and Z transforms, DFT, 2-dimensional versions; Linear time invariant discrete time systems; Digital signal processing topics: flow graphs, realizations, FFT, quantization effects, linear prediction; Digital filter design methods: windowing, frequency sampling, S-to-Z methods, frequency-transformation methods, optimization methods, 2-dimensional filter design; Quantization of signals and filter coefficients; Oversampling techniques for ADC and DAC.
Network management: Layers of network management; infrastructure for network management; the key areas of network management (accounting, security, configuration, performance, and fault tolerance); the Internet management framework and protocols (SNMP, MlBs, and so on); practical limitations and case studies; and so on. Network security: Principles of cryptography; principles of information security; authentication; access control; integrity; attacks and countermeasures; secure network protocols (551., IPscc, and so on); practical limitations and case studies; and so on. Mobile and wireless data communications: Satellite communications; cellular wireless networks; mobile IP; wireless LAN technologies (802.11, Bluetooth, and so on); the Wireless Application Protocol (WAP); the Wireless Markup Language; and so on. Multimedia networking: Multimedia networking applications; multimedia information representation; streaming stored audio and video; video and audio conferencing; voice over IP; real-time communication protocols; RSVP; differentiated services; and so on.
As necessary.
Introduction to software security, Software vulnerabilities: memory (un-)safety, Introduction to reverse engineering, Dynamic defense mechanisms, Static protection through bug finding, Finding and exploiting vulnerabilities, Operating system security and forensics, Protecting data, Defense in practice, Web security, Browser security, Android/mobile security, Malware analysis.
Lab works based CSE 4429.
This course of the Blockchain specialization provides a broad overview of the essential concepts of blockchain technology – by initially exploring the Bitcoin protocol followed by the Ethereum protocol – to lay the foundation necessary for developing applications and programming. You will be equipped with the knowledge needed to create nodes on your personal Ethereum blockchain, create accounts, unlock accounts, mine, transact, transfer Ethers, and check balances.
Cryptography is an indispensable tool for protecting information in computer systems. This course contains the inner workings of cryptographic systems and how to correctly use them in real-world applications. The course begins with a detailed discussion of how two parties who have a shared secret key can communicate securely when a powerful adversary eavesdrops and tampers with traffic. Examine many deployed protocols and analyze mistakes in existing systems. Discussion on public-key techniques that let two parties generate a shared secret key.