SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
Networking and Security Projects for Students



100 + Project ideas on Networking and Security
The EBook contains 100 + project ideas with titles and abstracts on networking
and security for students. The abstract contains details on the project title. The
project titles are developed based on areas in networking like network security,
network testing, network design and configuration, networking tool development,
protocol analysis and CCNA concepts.
Title: Study on Rip v1 and Rip v2 protocol

Abstract:

The project does a study on Rip v1 and Rip v2 protocol. The configuration methods of
the protocols on Cisco routers are analyzed. The insecurity of Rip v1 and how it is
improved by Rip v2 is documented. The configuration required on Cisco routers to block
RIP updates on specific interfaces is documented.

Title: Study on access control lists

Abstract:

The project does a study on different types of access control lists like standard and
extended access control lists and understands the configuration required on Cisco routers.
The differences and similarities in the configuration and design is understood. The
project also performs a detailed analysis of the differences in inbound and outbound
access control lists and how packets are handled when they are configured.

Title: Layer 2 loop prevention with Spanning Tree protocol

Abstract:

The project understands the anatomy of a layer 2 loops and why ethernet frame design is
vulnerable to looping. The internal design of the spanning tree protocol is researched and
how it is used for preventing layer 2 loops is understood.

Title: Access restriction between vlans

Abstract:

The project understands how access control lists can be used to restrict access between
computers connected to different vlans. Intervlan communication is setup on a router
using router on a stick configuration. The computers are configured with IP addresses
belonging to different network addresses and mapped with the corresponding vlans.
Title: VLAN design for organization

Abstract:

The project understands how vlans can be used to create different departments. Every
department is mapped with a unique vlan. The computers belonging to the vlans
(departments) are configured with IP addresses belong to different network addresses.
Intervlan routing configuration is identified for access between departments.

Title: Protecting Web servers from spoofed static source IP.

Abstract:

An organization has setup a Web server behind a Cisco router. It is been observed that
the web server is being attacked from a private ip address of 192.168.2.3 from the
internet. The appropriate configuration on the router with ACL which would block access
from the specific IP address to the web server is identified.

Title: Access restriction to FTP server

Abstract:

In an organization, there are two networks, 192.168.1.0/24 and 192.168.2.0/24.
Appropriate configuration on the router is setup for communication between the
networks. A FTP server is setup on the 192.168.1.0/24 network. It is required that
computers on the 192.168.2.0/24 network should be able to access only the FTP service
on the FTP server and all other traffic should be blocked. The project aims to identify the
necessary ACL configuration required to be setup on the router is identified.

Title: Internet access restriction for a network

Abstract:

A perimeter router of an organization has three interfaces. One of the interfaces is
connected to the internet. The other two interfaces are connected to the networks
192.168.1.0/24 and 192.168.2.0/24. It is required that computers on the 192.168.1.0/24
network should not have access to the internet, but have access to the 192.168.2.0/24
network. The project understands the necessary ACL configuration which needs to be
configured on the router for achieving the solution.
Title: Controlling broadcasts with VLAN

Abstract:

The project aims to understands how broadcasting causes traffic congestion in a switched
network. The fundamental concepts of VLAN are understood and how VLANS can be
used on a switch to create different broadcast domains to control broadcast traffic is
understood.

Title: RFC 1918 compliance for perimeter routers

Abstract:

RFC 1918 states the IP addresses which are allowed for use on private networks. These
IP addresses are not allowed to be used on the internet. Perimeter routers should not
allow incoming packets from the internet with the IP addresses mentioned in the RFC.
The project understands the appropriate ACL rules which need to be configured for
achieving the solution. (http://www.rfc-editor.org/rfc/rfc1918.txt )

Title: STP Vulnerabilities, attacks and mitigation

Abstract:

The projects understand the internal architecture of STP packets and the fields inside it.
The mechanism which attackers use to exploit the vulnerabilities in the STP packets is
understood. The project understand the different features available on Cisco switches like
BPDU-Root guard, Root guard , Loop guard along with appropriate configurations.

Title: Internet sharing for LAN computers

Abstract:

An organization is using a Cisco router as the internet router. The WAN interface of the
router is connected to the internet and the LAN interface is connected to a switch to
which the LAN computers are connected. There are 30 computers on the LAN which
belong to the network address of 192.168.1.0/24. The project is to design the strategy and
configuration which is required on the router to share the internet with the 30 users
Features like default route, port address translation is explored for the purpose.
Buy the Ebook , which has 100 + project titles and abstracts .

No of Pages - 32

Price : $9.99

Click on the link below to buy and download with PayPal.


http://www.e-junkie.com/211191/product/485057.php

Más contenido relacionado

Más de tcpipguru

Python programming course
Python programming coursePython programming course
Python programming coursetcpipguru
 
Network testing course
Network testing courseNetwork testing course
Network testing coursetcpipguru
 
Ccna topology based projects
Ccna topology based projectsCcna topology based projects
Ccna topology based projectstcpipguru
 
Network security projects
Network security projectsNetwork security projects
Network security projectstcpipguru
 
How to configure Standard ACL for an ip address
How to configure Standard ACL for an ip addressHow to configure Standard ACL for an ip address
How to configure Standard ACL for an ip addresstcpipguru
 
How to configure Standard ACL for a network
How to configure Standard ACL  for a networkHow to configure Standard ACL  for a network
How to configure Standard ACL for a networktcpipguru
 
Cisco Router Terms
Cisco Router TermsCisco Router Terms
Cisco Router Termstcpipguru
 
How to configure Rip version2 on a Cisco router
How to configure Rip version2 on a Cisco routerHow to configure Rip version2 on a Cisco router
How to configure Rip version2 on a Cisco routertcpipguru
 
How to obtain ip address from a different network dhcp
How to obtain ip address from a different network dhcpHow to obtain ip address from a different network dhcp
How to obtain ip address from a different network dhcptcpipguru
 
How to configure Extended acl for an ip address
How to configure Extended acl for an ip addressHow to configure Extended acl for an ip address
How to configure Extended acl for an ip addresstcpipguru
 
How to configure Extended acl for a network
How to configure Extended acl for a networkHow to configure Extended acl for a network
How to configure Extended acl for a networktcpipguru
 
How to configure EIGRP on a Cisco router
How to configure EIGRP on a Cisco routerHow to configure EIGRP on a Cisco router
How to configure EIGRP on a Cisco routertcpipguru
 
How to configure Dynamic nat
How to configure Dynamic natHow to configure Dynamic nat
How to configure Dynamic nattcpipguru
 
How to configure DHCP Server
How to configure DHCP Server How to configure DHCP Server
How to configure DHCP Server tcpipguru
 
How to configure Default Routing
How to configure Default RoutingHow to configure Default Routing
How to configure Default Routingtcpipguru
 
How to configure SSH on Cisco switch
How to configure SSH on Cisco switchHow to configure SSH on Cisco switch
How to configure SSH on Cisco switchtcpipguru
 
Configuring ssh on switch
Configuring ssh on switchConfiguring ssh on switch
Configuring ssh on switchtcpipguru
 
How to Configure password for telnet and console port of a switch
How to Configure password for telnet and console port of a switchHow to Configure password for telnet and console port of a switch
How to Configure password for telnet and console port of a switchtcpipguru
 
How to Configure ip address for router interfaces
How to Configure ip address for router interfacesHow to Configure ip address for router interfaces
How to Configure ip address for router interfacestcpipguru
 
How to create Security on Cisco switch
How to create Security on Cisco switchHow to create Security on Cisco switch
How to create Security on Cisco switchtcpipguru
 

Más de tcpipguru (20)

Python programming course
Python programming coursePython programming course
Python programming course
 
Network testing course
Network testing courseNetwork testing course
Network testing course
 
Ccna topology based projects
Ccna topology based projectsCcna topology based projects
Ccna topology based projects
 
Network security projects
Network security projectsNetwork security projects
Network security projects
 
How to configure Standard ACL for an ip address
How to configure Standard ACL for an ip addressHow to configure Standard ACL for an ip address
How to configure Standard ACL for an ip address
 
How to configure Standard ACL for a network
How to configure Standard ACL  for a networkHow to configure Standard ACL  for a network
How to configure Standard ACL for a network
 
Cisco Router Terms
Cisco Router TermsCisco Router Terms
Cisco Router Terms
 
How to configure Rip version2 on a Cisco router
How to configure Rip version2 on a Cisco routerHow to configure Rip version2 on a Cisco router
How to configure Rip version2 on a Cisco router
 
How to obtain ip address from a different network dhcp
How to obtain ip address from a different network dhcpHow to obtain ip address from a different network dhcp
How to obtain ip address from a different network dhcp
 
How to configure Extended acl for an ip address
How to configure Extended acl for an ip addressHow to configure Extended acl for an ip address
How to configure Extended acl for an ip address
 
How to configure Extended acl for a network
How to configure Extended acl for a networkHow to configure Extended acl for a network
How to configure Extended acl for a network
 
How to configure EIGRP on a Cisco router
How to configure EIGRP on a Cisco routerHow to configure EIGRP on a Cisco router
How to configure EIGRP on a Cisco router
 
How to configure Dynamic nat
How to configure Dynamic natHow to configure Dynamic nat
How to configure Dynamic nat
 
How to configure DHCP Server
How to configure DHCP Server How to configure DHCP Server
How to configure DHCP Server
 
How to configure Default Routing
How to configure Default RoutingHow to configure Default Routing
How to configure Default Routing
 
How to configure SSH on Cisco switch
How to configure SSH on Cisco switchHow to configure SSH on Cisco switch
How to configure SSH on Cisco switch
 
Configuring ssh on switch
Configuring ssh on switchConfiguring ssh on switch
Configuring ssh on switch
 
How to Configure password for telnet and console port of a switch
How to Configure password for telnet and console port of a switchHow to Configure password for telnet and console port of a switch
How to Configure password for telnet and console port of a switch
 
How to Configure ip address for router interfaces
How to Configure ip address for router interfacesHow to Configure ip address for router interfaces
How to Configure ip address for router interfaces
 
How to create Security on Cisco switch
How to create Security on Cisco switchHow to create Security on Cisco switch
How to create Security on Cisco switch
 

Último

Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 

Último (20)

Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 

Networking and security projects for students preview

  • 1. Networking and Security Projects for Students 100 + Project ideas on Networking and Security
  • 2. The EBook contains 100 + project ideas with titles and abstracts on networking and security for students. The abstract contains details on the project title. The project titles are developed based on areas in networking like network security, network testing, network design and configuration, networking tool development, protocol analysis and CCNA concepts.
  • 3. Title: Study on Rip v1 and Rip v2 protocol Abstract: The project does a study on Rip v1 and Rip v2 protocol. The configuration methods of the protocols on Cisco routers are analyzed. The insecurity of Rip v1 and how it is improved by Rip v2 is documented. The configuration required on Cisco routers to block RIP updates on specific interfaces is documented. Title: Study on access control lists Abstract: The project does a study on different types of access control lists like standard and extended access control lists and understands the configuration required on Cisco routers. The differences and similarities in the configuration and design is understood. The project also performs a detailed analysis of the differences in inbound and outbound access control lists and how packets are handled when they are configured. Title: Layer 2 loop prevention with Spanning Tree protocol Abstract: The project understands the anatomy of a layer 2 loops and why ethernet frame design is vulnerable to looping. The internal design of the spanning tree protocol is researched and how it is used for preventing layer 2 loops is understood. Title: Access restriction between vlans Abstract: The project understands how access control lists can be used to restrict access between computers connected to different vlans. Intervlan communication is setup on a router using router on a stick configuration. The computers are configured with IP addresses belonging to different network addresses and mapped with the corresponding vlans.
  • 4. Title: VLAN design for organization Abstract: The project understands how vlans can be used to create different departments. Every department is mapped with a unique vlan. The computers belonging to the vlans (departments) are configured with IP addresses belong to different network addresses. Intervlan routing configuration is identified for access between departments. Title: Protecting Web servers from spoofed static source IP. Abstract: An organization has setup a Web server behind a Cisco router. It is been observed that the web server is being attacked from a private ip address of 192.168.2.3 from the internet. The appropriate configuration on the router with ACL which would block access from the specific IP address to the web server is identified. Title: Access restriction to FTP server Abstract: In an organization, there are two networks, 192.168.1.0/24 and 192.168.2.0/24. Appropriate configuration on the router is setup for communication between the networks. A FTP server is setup on the 192.168.1.0/24 network. It is required that computers on the 192.168.2.0/24 network should be able to access only the FTP service on the FTP server and all other traffic should be blocked. The project aims to identify the necessary ACL configuration required to be setup on the router is identified. Title: Internet access restriction for a network Abstract: A perimeter router of an organization has three interfaces. One of the interfaces is connected to the internet. The other two interfaces are connected to the networks 192.168.1.0/24 and 192.168.2.0/24. It is required that computers on the 192.168.1.0/24 network should not have access to the internet, but have access to the 192.168.2.0/24 network. The project understands the necessary ACL configuration which needs to be configured on the router for achieving the solution.
  • 5. Title: Controlling broadcasts with VLAN Abstract: The project aims to understands how broadcasting causes traffic congestion in a switched network. The fundamental concepts of VLAN are understood and how VLANS can be used on a switch to create different broadcast domains to control broadcast traffic is understood. Title: RFC 1918 compliance for perimeter routers Abstract: RFC 1918 states the IP addresses which are allowed for use on private networks. These IP addresses are not allowed to be used on the internet. Perimeter routers should not allow incoming packets from the internet with the IP addresses mentioned in the RFC. The project understands the appropriate ACL rules which need to be configured for achieving the solution. (http://www.rfc-editor.org/rfc/rfc1918.txt ) Title: STP Vulnerabilities, attacks and mitigation Abstract: The projects understand the internal architecture of STP packets and the fields inside it. The mechanism which attackers use to exploit the vulnerabilities in the STP packets is understood. The project understand the different features available on Cisco switches like BPDU-Root guard, Root guard , Loop guard along with appropriate configurations. Title: Internet sharing for LAN computers Abstract: An organization is using a Cisco router as the internet router. The WAN interface of the router is connected to the internet and the LAN interface is connected to a switch to which the LAN computers are connected. There are 30 computers on the LAN which belong to the network address of 192.168.1.0/24. The project is to design the strategy and configuration which is required on the router to share the internet with the 30 users Features like default route, port address translation is explored for the purpose.
  • 6. Buy the Ebook , which has 100 + project titles and abstracts . No of Pages - 32 Price : $9.99 Click on the link below to buy and download with PayPal. http://www.e-junkie.com/211191/product/485057.php