Northeastern University

CS 4740/6740 - Network Security

News & Announcements

To access the full course material, please request a client-side certificate. The full course material is available on:


Welcome to the Network Security course webpage (CS 4740/6740). Networks security is a topic that requires as much attention to its real-world implications as its theoretical underpinnings. The CS 4740/6740 Network Security course allows the students to explore the practical elements of networks security and related design, and deployment decisions in a supervised laboratory, while simultaneously acquiring a strong conceptual knowledge of the underlying theory in the more traditional classroom environment. The combination of these elements provides students with a vivid picture of why and how networked systems and applications must be designed, implemented, deployed, and maintained in a secure fashion. The course goals are multi-fold:

Instructors interested in using the course material (including laboratory setup, configs, and solutions) are welcome to contact me.



Guevara Noubir (noubir ATA ccs DOTA neu DOTA edu)
Office: 238 West Village H

Lab TA

Amirali Sanatinia (amirali ATA ccs DOTA neu DOTA edu)
Office: 208 West Village H

Class Information

Wednesday at 6:00 pm - 9:00 pm, 221 Hayden Hall
Office Hours
Monday / Thursday at 2:00 pm - 3:00 pm, 238 WVH.
Required Textbook
Network Security: Private Communication in a Public World Charles Kaufman, Radia Perlman, Mike Speciner, Pearson Education, April 2002
Course Home Page
Announcements, discussions, forums
All announcements and discussions will be through piazza :
Knowlege of Internet networking protocols (e.g, a Networking course).
Course schedule
Current Schedule.

Laboratory assignments will be on the course sandboxed network of virual machines and infrastructure (See Laboratory 1).

Additional Resources

List of books.
List of useful links.

Class Materials

Test Your Knowledge

Video Demos

Sample Quizzes and Exams


Problem Sets
Lab Assignments
  1. Introduction

  2. Buffer Overflow

  3. Port Scanning

  4. Network Intrusion Detection

  5. Host-based Intrusion Detection

  6. Password Cracking

  7. Firewall

  8. Host Hardening

  9. Man-in-the-Middle Attacks

  10. Local Exploits

  11. Application Exploits


The exam will take place on November 6th and 8th. Please mark your calendars and make sure that you will be able to attend.

Finals Project

Teams Final Designs and Implementations:



The course grade will be based on: