《计算机网络安全》实验教学大纲
课程代码 | 045102881 |
课程名称 | 计算机网络安全 |
英文名称 | Computerand Network Security |
课程类别 | 专业基础课 |
课程性质 | 必修 |
学时 | 总学时48:实验学时:16实习学时:0其他学时:0 |
学分 | 2.5 |
开课学期 | 5 |
开课单位 | 计算机科学与工程学院 |
适用专业 | 信息安全 |
授课语言 | 中文 |
先修课程 | 计算机网络、高级语言程序设计、操作系统、数据库 |
毕业要求(专业培养能力) | 本课程对学生达到如下毕业要求的贡献:
|
课程培养学生的能力(教学目标) | 完成课程后,学生将具备以下能力:
|
课程简介 | 本课程属于信息安全专业基础课程,结合理论讲解、实例学习和实验,全面介绍计算机网络安全的基本概念、技术和原理。主要内容包括:网络协议缺陷、网络安全威胁以及网络安全防护,网络侦察技术,网络扫描技术,拒绝服务攻击,计算机病毒,特洛伊木马,网络监听技术,Web网站攻击技术,防火墙技术,虚拟专用网技术,入侵检测技术,蜜罐技术。 |
主要仪器设备与软件 | PC机、网络安全设备 |
实验报告 | 每次实验需提交实验报告,实验报告的内容应包括实验目的及要求、实验环境、实验过程和实验小结等。 |
考核方式 | 本实验课程成绩将结合出勤、实验操作以及实验报告等进行综合评估,其中出勤占实验课程总评成绩的10%,实验操作占实验课程总评成绩的60%,实验报告占实验课程总评成绩的30%。 |
教材、实验指导书及教学参考书目 | 实验指导书与参考书:
|
制定人及发布时间 | 何军辉,2019年4月30日 |
《计算机网络安全》实验教学内容与学时分配
实验项目编号 | 实验项目名称 | 实验学时 | 实验内容提要 | 实验类型 | 实验要求 | 每组人数 | 主要仪器设备与软件 |
网络侦察 网络扫描 | 4 |
| 验证性 | 必做 | 4 | PC机、网络设备 | |
ARP欺骗 口令嗅探 木马程序 | 4 |
| 验证性 | 必做 | 4 | PC机、网络设备 | |
Windows防火墙/Linux防火墙 PPTPVPN | 4 |
| 设计性 | 必做 | 4 | PC机、网络设备 | |
入侵检测系统Snort/虚拟蜜罐Honeyd | 4 |
| 设计性 | 必做 | 4 | PC机、网络设备 |
“Computerand Network Security”Syllabus
CourseCode | 045102881 |
CourseTitle | Computerand Network Security |
CourseCategory | SpecialtyBasic Courses |
CourseNature | CompulsoryCourse |
ClassHours | Totalhours: 48 Lab hours: 16 Practice hours: 0 Other hours:0 |
Credits | 2.5 |
Semester | 5 |
Institute | Schoolof Computer Science & Engineering |
ProgramOriented | InformationSecurity |
TeachingLanguage | Chinese |
Prerequisites | ComputerNetworks, Advanced Language Programming, Operating Systems,Database |
StudentOutcomes (Special Training Ability) | Thiscourse contributes to the following graduation requirements forstudents:
|
TeachingObjectives | Uponcompletion of the course, students will have the followingabilities:
|
CourseDescription | Thiscourse belongs to the basic courses of information security. Thebasic concepts, techniques and principles of computer networksecurity may be introduced by combining theoretical explanation,case study and experiment. The main contents include: networkprotocol defects, network security threats and network securityprotection, network reconnaissance technology, network scanningtechnology, denial of service attacks, computer viruses, Trojanhorses, network monitoring technology, Web site attack technology,firewall technology, virtual private network technology, intrusiondetection technology, and honeypot technology. |
Instrumentsand Equipments | PCand network security equipment |
ExperimentReport | Eachexperiment must submit an experimental report, the experimentalreport should include the contents of the experimentalrequirements, experimental environment, experimental process andexperimental summary. |
Assessment | Theexperimental result will be evaluated with a comprehensiveassessment, including attendance, experimental operation andexperimental reports. Attendance accounts for 10% of the totalscore of the experimental course, experimental operations accountfor 60% of the total score of the experimental course, theexperimental reports account for 30% of the total score. |
TeachingMaterials and Reference Books | ExperimentalGuidance and Reference:
ChuckEasttom,NetworkDefense and Countermeasures: Principles and Practices,PrenticeHall,2005 |
Preparedby Whom and When | JunhuiHe, April 30, 2019 |
“Computerand Network Security”ExperimentalTeaching Arrangements
No. | ExperimentItem | ClassHours | ContentSummary | Category | Requirements | Numberof StudentsEach Group | Instruments,Equipments and Software |
Networkreconnaissance Networkscanning | 4 |
| Verification | Compulsory | 4 | PCand network security equipment | |
2 | ARPspoofing Passwordintercept Trojanhorse attack | 4 |
| Verification | Compulsory | 4 | PCand network security equipment |
3 | Firewall(Windows/Linux) PPTPVirtual Private Network | 4 |
| Design | Compulsory | 4 | PCand network security equipment |
4 | IntrusionDetection System Snort / Virtual Honeypot Honeyd | 4 |
| Design | Compulsory | 4 | PCand network security equipment |