Close

Network Security

Network Security

Course Information

CourseNetwork SecurityCodeNSEC14MBK
Direction60610300 – Information SafetyForm of StudyDaytime
Year3Semester6
Total Hours / Credit120 / 4Science TypeMandatory
Lectures30Practical Lessons18
LaboratoryIndependent Work72
Evaluation ShapeExam (written, test)Science LanguageUzbek / English
Subject TeacherMavlonova ShodmonoyTaught LanguageEnglish

Lectures – Semester VI

CodeTopicMaterial
L1The Concept of Network Security and its EssenceDownload
L2Modern Threats to Network SecurityDownload
L3Security Policy in Computer Systems and NetworksDownload
L4Network Security Standards (Oz DSt ISO/IEC 27033)Download
L5OSI and TCP/IP ModelsDownload
L6Information Protection Infrastructure at the Application and Presentation LevelsDownload
L7Protocols for Forming Secure Channels at the Channel and Session LevelsDownload
L8Data Protection at the Transport LayerDownload
L9Data Protection at the Network LevelDownload
L10Protecting a Computer Network at the Physical LevelDownload
L11Remote Attacks on Computer NetworksDownload
L12Fundamentals of Protected Virtual Network TechnologiesDownload
L13Network Display TechnologiesDownload
L14Detecting and Eliminating AttacksDownload
L15Information Security in Cloud Computing SystemsDownload

Practical Lessons – Semester VI

CodeTopicMaterial
P1Setting up Initial Security Settings on Network Devices — Telnet, SSHDownload
P2Port Security on Switches SetupDownload
P3Reservation Protocols — STP, PVSTP and Aggregation Protocols — LACP, PAgP SetupDownload
P4VTP Protocol SetupDownload
P5OSPF, RIP, EIGRP and BGP Protocols Based on Dynamic Routing SetupDownload
P6ACL List Settings (Standard, Extended)Download
P7NAT/PAT Technology in Routers SetupDownload
P8Network DMZ on Your Router InstallationDownload
P9Enterprise and Organization Information Communication VPN Network in Systems BuildDownload

Main Literature

#Reference
1Ganiev Salim Karimovich. Bezopasnost setey (Bezopasnost mobilnyx setey). 2019. 139 p.
2S. K. Ganiev, D. Yes. Irgasheva, K. A. Tashev. Bezopasnost bazy dannyx. Communicator, 2017. 224 p.
3V. G. Olifer, N. A. Olifer. Bezopasnost kompyuternyx setey. Goryachaya line – Telekom, 2017. 644 p.

Additional Literature

#Reference
122 years of the President of the Republic of Uzbekistan 28 Decree No. PF-60 of January 2022 "On the Development Strategy of the New Uzbekistan for 2022–2026".
2Mirziyoyev Sh.M. The rule of law and ensuring human interests are the key to the development of the country and the well-being of the people. 2017.
3Tim Boyles. CCNA Security Study Guide. Copyright © 2010 by Wiley Publishing, Inc., Indianapolis, Indiana. ISBN: 978-0-470-52767-2.
4Mark Ciampa. Security+ Guide to Network Security Fundamentals. Fifth Edition.
5Emad S. Hassan. Security and Data Reliability in Cooperative Wireless Networks. © 2018 by Taylor & Francis Group, LLC.
6William Stallings. Cryptography and Network Security Principles and Practice. Fifth Edition. © 2011, 2006 Pearson Education, Inc., Prentice Hall.
7Joseph Migga Kizza. Computer Network Security and Cyber Ethics. Fourth Edition. McFarland & Company, Inc., Publishers Jefferson, North Carolina © 2014.