SE 443: Network Cyber Security Project פרויקט סייבר רשתות

Course, Kinneret College on the Sea of Galilee, Software Engineering, 2026

Semester 2, 5786

Course Details:

  • Lecture: Sunday 08:00-10:00 in Room 6201
  • Targil: Sunday 10:00-12:00 in Room 6201
  • Instructor: Michael J. May
  • Email: mjmay (at) mx; kinneret, ac, il

The full detailed syllabus of the course is available here.

Topics:

The course is project-based on the topics of network protocol and web cyber attack and defense. The course is divided into three parts:

  1. Network cybersecurity research
  2. Network protocol cybersecurity and attacks.
  3. Web cybersecurity and attacks

Each part of the course has an accompanying assignment and presentation associated with it.

Goals:

At the end of the course the student will be able to:

  1. Research and present research findings from recent academic publications on network cybersecurity.
  2. Perform network protocol exploit tasks and present findings to others.
  3. Perform web exploit tasks and present findings to others.

Reading

The following books contain useful course material. Since the course is a project-based course, there will not be regular assigned readings.

  • Wenliang Du. Computer & Internet Security: A Hands-on Approach. Wenliang Du, 3rd ed. edition, May 2022.
  • Arthur Salmon, Warun Levesque, and Michael McLafferty. Applied Network Security : Master the Art of Detecting and Averting Advanced Network Security Attacks and Techniques. Packt Publishing, 2017.

Assignments

There are three project assignments for the course, one for each part of the class.

Assignments are on Moodle. More details of assignments will be given during the course of the semester.

Grading Criteria

Final grades will be calculated by combining grades from student participation, the midterm exam, and projects. The grades are weighted as follows:

  • 20% Cyber security research presentation
  • 35% Network protocol cyber security project and presentation
  • 35% Web cyber security project and presentation
  • 10% Project presentation quiz grades

Lecture Slides and Notes

#DateTopicSlides
18 MarchCourse Introduction: Network Cyber Security Basics 
  Cyber Security Research Work 
215 MarchCyber Security Research Work 
322 MarchCyber Security Research Work 
412 AprilCyber security research presentations 
519 AprilCyber security research presentations 
626 AprilNetwork protocol cyber security lab work 
73 MayNetwork protocol cyber security lab work 
810 MayNetwork protocol cyber security lab presentations 
917 MayNetwork protocol cyber security lab presentations 
1024 MayWeb cyber security lab work 
1131 MayWeb cyber security lab work 
127 JuneWeb cyber security lab presentations 
1314 JuneWeb cyber security lab presentations 

Academic Integrity

This course will abide by Kinneret College’s code of academic integrity. In particular, for individual projects and group projects, the following guidelines should be followed.

Cheating of any sort will not be tolerated. Student collaboration is encouraged, but within limits as set forth in the college’s rules on academic integrity. Any students caught cheating will be immediately referred to the department head and the Dean and may receive a failing grade for the course.

Cheating includes:

  • Copying information, content, or verbatim text from other students, internet sites, books (other than the ones listed in the bibliography), other unaffiliated individuals to answer questions, solve problems, or aid in programming projects.
  • Copying or submitting source code, documentation, or other programming aids without attribution from other students, web sites, online repositories, text books, open source programs, or other unaffiliated individuals.
  • Project teams which submit work which is identical or substantially identical to work submitted by other project teams, whether current or from previous years.
  • Other forms of academic misconduct as described here or as reasonably assessed by the instructor, program head, or dean.

If you have any questions about what constitutes cheating in the above rules, contact the instructor as early as possible.