Monash home | About Monash | Faculties | Campuses | Contact Monash |
Staff directory | A-Z index | Site map |
Postgraduate |
(IT)
|
Leader: A Khan
Offered:
Caulfield Second semester 2005 (Day)
Synopsis: Layered structure of networks, security threats in an open network environment, and basic security. Detailed exposition of major tools and protocols used in VPNs, including firewalls, IPSec, Internet Security Association and Key Management Protocol (ISAKMP), Internet Key Exchange (IKE), Point-to-Point Protocol (PPP) and Point-to-Point Tunnelling Protocol (PPTP), Layer 2 Tunnelling Protocol (L2TP), Terminal Access Control Access Control System (TACACS), Secure Sockets Layer (SSL), and SOCKS. Exposition of principles and methodologies for the design and implementation of Intranets and Extranets using VPNs. Techniques for managing security, naming and address services, and performance of a VPN.
Objectives: Layered structure of networks, security threats in an open network environment, and basic security. Detailed exposition of major tools and protocols used in VPNs, including firewalls, IPSec, Internet Security Association and Key Management Protocol (ISAKMP), Internet Key Exchange (IKE), Point-to-Point Protocol (PPP) and Point-to-Point Tunnelling Protocol (PPTP), Layer 2 Tunnelling Protocol (L2TP), Terminal Access Control Access Control System (TACACS), Secure Sockets Layer (SSL), and SOCKS. Exposition of principles and methodologies for the design and implementation of Intranets and Extranets using VPNs. Techniques for managing security, naming and address services, and performance of a VPN.
Assessment: Assignments: 50% A written report: 50%
Contact Hours: 4 contact hours per week
Prerequisites: Admission to the Master of Network Computing, or equivalent Masters level programs of the Faculty of Information Technology; some programming experience in C, C