Network Security Course Specifications

Size: px
Start display at page:

Download "Network Security Course Specifications2011-2012"

Transcription

1 Assiut University Faculty of Computers & Information Department of Information Technology Quality Assurance Unit Network Security Course Specifications Relevant program B.Sc. in Computers and Information (Information Technology) Department offers the program Information Technology Department offers the course Information Technology Academic year 4 th Year Date of specification approval 24/9/2012 A. Basic Information 1. Course Title: Network Security 2. Course Code: IT Course hours per week: Lecture Tutorial / Practical Total B. Professional Information 1. Overall aims of the course Upon completing this course the student will have learned, through appropriate classroom and laboratory experiences, the following. The basic issues, concepts, principles, and mechanisms in information security. Providing a comprehensive understanding of network security techniques. Common attack techniques, application of cryptography in security, authentication and authorization, network security, enterprise network defense, web security, and economics of security. Gaining an experience in applying the theory to practice. IT Program 4 th Year (2 nd Semester) Page 8-1

2 2. Intended Learning Outcomes (ILOs) of the course a. Knowledge and Understanding Skills On successful completion of the course, graduates should be able to: a1. Provide a deeper understanding of legal, professional and moral aspects of the exploitation of IT. a2. Show a critical understanding of the challenges inherent in the maintenance and evolution of IT-based systems, and the techniques and best practices currently available for dealing with them. a3. Understand the importance of security systems. a4. Understand types of security threats, system vulnerabilities and security goals and services. a5. Understand the basic concepts and techniques of data security. a6. Understand the basic key distribution techniques. a7. Understand the basic authentication and web security methods. a8. Knowledge of the methods used in defining and assessing criteria for measuring the extent to which a computer system is appropriate for its current deployment and future evolution. b. Intellectual Skills On successful completion of this course, graduates should be able to: b1. Define traditional and nontraditional information technology systems problems, set goals towards solving them, observe results, reason and apply judgment. b2. Identify a range of solutions and critically evaluate and justify proposed design solutions. b3. Solve information technology problems with pressing commercial or industrial constraints. b4. Appreciate the subtleties related to different attacks on data security. b5. Evaluate different types of security algorithms in order to use the appropriate one. b6. Express, present and defend the developed security program. b7. Analyze the security of some security packages. b8. Define and assess criteria to measure the appropriateness of a computer system for its current deployment and future evolution, and to interpret the results thereof. b9. Reach computing judgments considering balanced costs, benefits, safety, quality, reliability, and environmental impact. c. Professional and Practical Skills On successful completion of this course, graduates should be able to: c1. Specify, investigate, analyze, design and develop computer-based systems using appropriate tools and techniques. c2. Recognize risks or safety aspects involved in the operation of computer-based systems. c3. Evaluate systems in terms of their quality and possible trade-offs, evaluate appropriate hardware and software solutions for given scenarios. c4. Implement some of classical ciphering techniques. c5. Use DES and 3-DES algorithm. c6. Use RSA algorithm. c7. Professionally present security package. IT Program 4 th Year (2 nd Semester) Page 8-2

3 d. General and Transferable Skills On successful completion of this course, graduates should be able to: d1. Effectively employ information-retrieval skills, (including the use of browsers, search engines, and on-line library catalogues), communicate effectively using a variety of communication methods, and communicate effectively with team members, managers and customers. d2. Lead and motivate individuals. d3. Work as part of a development team and to recognize the different roles of its members. d4. Prepare their work in the form of reports, oral presentations or an internet web site. d5. Ability to work independently and as part of a team with minimum guidance. d6. Communicate effectively. 3. Contents No Topic taught 1 Discussion of the need for network security, describe various threats, attack types and hackers. 2 Explain authentication, encryption & encryption standard. Secret Key, public key algorithm authentication protocols, digital certificate. 3 Virtual private network, (VPN), secure sockets layer (SSL). Firewalls, and firewalls topology, packet filters and proxy servers. No. of hours Lecture Tut/Prac ILOs 12 8 a1-a4, a8, b1-b4, b8, c2, d1-d a1, a4-a8, b1-b9, c4-c6, d1-d a1, a4, a5-a8, b1-b9, c1, c3, c7, d1-d6 4. Teaching and Learning Methods 4a. Lectures 4b. Tutorial Exercises 5. Student Assessment 5a. Tools Final Exam Mid-Term Exam Practical Exam Class Work Projects To measure knowledge, understanding, intellectual and professional skills. To measure following up and understanding the studied topics To measure professional and general skills To measure the participation of the student during the tutorial, professional and general skills. To measure professional and general skills IT Program 4 th Year (2 nd Semester) Page 8-3

4 5b. Time Schedule Assessment Week No Final Exam 16 Mid-Term Exam 8 5c. Grading System Assessment Grade % Final Exam 70% Mid-Term Exam 15% 5d. Formative Assessment Regular quizzes distributed along the whole semester. 6. List of References 6a. Course Notes o Short course notes available at doctor s office. 6b. Required Books (Textbooks) o. 6c. Recommended Books o. 7. Facilities Required for Teaching and Learning A lecture hall is equipped with a projector and a computer. Labs are equipped with computers and Internet facilities. Tutorial rooms are equipped with projectors and computers. A library. Course Coordinator: Prof. Dr. Yousef B. Mahdy Signature: Date: 24/9/2012 Department Head: Prof. Hosny M. Ibrahim Signature: Date: 24/9/2012 IT Program 4 th Year (2 nd Semester) Page 8-4

5 Criteria Oral Exam Class Work Practical Exam Mid-Term Exam Final Exam Data Collections Case Study Projects Workshops Practical Exercises Tutorial Exercises Lectures Student evaluation, course file, exam results Course Name Network Security Course Matrix Course Code IT422 ILOs Teaching and Learning Methods Assessment Tools Course Aims Course Content Teaching Weeks a s b s c s d s The basic issues, concepts, principles, and mechanisms in information security. Providing a comprehensive understanding of network security techniques. Common attack techniques, application of cryptography in security, authentication and authorization, network security, enterprise network defense, web security, and economics of security. Gaining an experience in applying the theory to practice. Discussion of the need for network security, describe various threats, attack types and hackers. Explain authentication, encryption & encryption standard. Secret Key, public key algorithm authentication protocols, digital certificate. Virtual private network, (VPN), secure sockets layer (SSL). Firewalls, and firewalls topology, packet filters and proxy servers ,8 1-4, , , 4, , 3, Course Coordinator Prof. Dr. Yousef B. Mahdy Signature Department Head Prof. Hosny M. Ibrahim Signature IT Program 4 th Year (2 nd Semester) Page 8-5

6 IT Program 4 th Year (2 nd Semester) Page 8-6

Information Security Course Specifications2011-2012

Information Security Course Specifications2011-2012 Assiut University Faculty of Computers & Information Information Systems Department Quality Assurance Unit Information Security Course Specifications2011-2012 Relevant program Department offers the program

More information

Information Systems for Business Management INF612

Information Systems for Business Management INF612 Information Systems for Business Management INF612 Assiut University Faculty of Computers & Information Quality Assurance Unit Information Systems for Business Management Course Specifications2011-2012

More information

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013 City University of Hong Kong Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 01/013 Part I Course Title: Course Code: Course Duration: Cryptography

More information

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification 1. Module Title Information Security 2. Module Code: CS403INS 3. Module Level - Forth Stage 4. Module Leader Safwan M. 5. Teaching Semester 7 and 8 Soran University Faculty of Science and Engineering Computer

More information

University of Wisconsin-Whitewater Curriculum Proposal Form #3 New Course

University of Wisconsin-Whitewater Curriculum Proposal Form #3 New Course Effective Term: 2147 (Fall 2014) University of Wisconsin-Whitewater Curriculum Proposal Form #3 New Course Subject Area - Course Number: COMPSCI 462 (See Note #1 below) Cross-listing: N/A Course Title:(Limited

More information

Data Encryption and Network Security

Data Encryption and Network Security Data Encryption and Network Security College: Department: Engineering Electrical Engineering Department First: Course Definition 1 Course Code: EE627 2 Units 3 3 Semester 4 Prerequisite 5 Corequisite 6

More information

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2.

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2. CSET 4850 Computer Network Security (4 semester credit hours) CSET Elective IT Elective Current Catalog Description: Theory and practice of network security. Topics include firewalls, Windows, UNIX and

More information

(IŞIK - IT201) 1 / 6 COURSE PROFILE. Theory+PS+Lab (hour/week) Local Credits. Course Name Code Semester Term ECTS

(IŞIK - IT201) 1 / 6 COURSE PROFILE. Theory+PS+Lab (hour/week) Local Credits. Course Name Code Semester Term ECTS COURSE PROFILE Course Name Code Semester Term Theory+PS+Lab (hour/week) Local Credits ECTS Network Security IT527 Fall 3 + 0 + 0 3 8 Prerequisites None Course Language Course Type Course Lecturer Course

More information

How To Pass A Credit Course At Florida State College At Jacksonville

How To Pass A Credit Course At Florida State College At Jacksonville Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CTS 2658 COURSE TITLE: PREREQUISITE(S): COREQUISITE(S): Managing Network Security CNT 2210 with grade

More information

Course Syllabus. Course code: 371410. Academic Staff Specifics. Office Number and Location

Course Syllabus. Course code: 371410. Academic Staff Specifics. Office Number and Location Philadelphia University Faculty of Administrative & Financial Sciences Department of Business Networking and Systems Management First semester, 2009/2010 Course Syllabus Course Title: Systems & Networks

More information

NETWORK SECURITY (W/LAB) Course Syllabus

NETWORK SECURITY (W/LAB) Course Syllabus 6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information

More information

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1 Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3

More information

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 210 COURSE NUMBER: CIS 210 COURSE NAME: MEETING PLACE: Random On-Line DIVISION: Business, Computing & Applied Technology

More information

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 276 Windows Security Management

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 276 Windows Security Management RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 276 Windows Security Management I. Basic Course Information A. Course Number & Title: CISY-276 Windows Security Management B. Date of Revision: Spring

More information

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 275 UNIX and Linux Security Management

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 275 UNIX and Linux Security Management RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 275 UNIX and Linux Security Management I. Basic Course Information A. Course Number & Title: CISY-275 - UNIX and Linux Security Management B. Date of

More information

Computer and Network Security PG 6697. Unit Outline 2007. School of Information Sciences and Engineering

Computer and Network Security PG 6697. Unit Outline 2007. School of Information Sciences and Engineering Computer and Network Security PG 6697 Unit Outline 2007 School of Information Sciences and Engineering Division of Business, Law and Information Sciences University of Canberra Australian Government Higher

More information

Curran, K. Tutorials. Independent study (including assessment) N/A

Curran, K. Tutorials. Independent study (including assessment) N/A MODULE TITLE: MODULE CODE: Systems Security COM535 YEAR OF REVISION: 2013/14 MODULE LEVEL: 6 CREDIT POINTS: 20 MODULE STATUS: SEMESTER: 1 LOCATION: E-LEARNING: PREREQUISITE(S): CO-REQUISITE(S): MODULE

More information

COURSE PROFILE. This course aims to give IT people the awareness for security needs of information in organizations, tools to enhance security.

COURSE PROFILE. This course aims to give IT people the awareness for security needs of information in organizations, tools to enhance security. COURSE PROFILE Course Name Code Semester Term Theory+PS+Lab (hour/week) Local Credits ECTS Information Security IT07 Fall + 0 + 0 7 Prerequisites None Course Language Course Type Course Lecturer Course

More information

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming. Elective course in Computer Science University of Macau Faculty of Science and Technology Department of Computer and Information Science SFTW498 Information Security Syllabus 2nd Semester 2011/2012 Part

More information

Cornerstones of Security

Cornerstones of Security Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to

More information

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 229 Information Security Fundamentals I. Basic Course Information A. Course Number & Title: CISY-229 Information Security Fundamentals B. New or Modified

More information

Information and Network Security Certificate Program

Information and Network Security Certificate Program Information and Network Security Certificate Program University of California, Irvine, P.O. Box 6050, Irvine, CA 92612-6050 www.extension.uci.edu PROGRAM DESCRIPTION Data security is critical and increasingly

More information

CIS 156. Firewalls and Intrusion Detection

CIS 156. Firewalls and Intrusion Detection CIS 156 Firewalls and Intrusion Detection Approved: May 6, 2011 EFFECTIVE DATE: Fall 2011 COURSE PACKAGE FORM Team Leader and Members Andra Goldberg, Matt Butcher, Dave White, Steve Sorden Date of proposal

More information

LOUGHBOROUGH UNIVERSITY

LOUGHBOROUGH UNIVERSITY LOUGHBOROUGH UNIVERSITY Programme Specification Computer Science Please note: This specification provides a concise summary of the main features of the programme and the learning outcomes that a typical

More information

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus CSCI - 440 Network Security and Perimeter Protection 3-0-3 CATALOG DESCRIPTION This

More information

Steelcape Product Overview and Functional Description

Steelcape Product Overview and Functional Description Steelcape Product Overview and Functional Description TABLE OF CONTENTS 1. General Overview 2. Applications/Uses 3. Key Features 4. Steelcape Components 5. Operations Overview: Typical Communications Session

More information

90% of data breaches are caused by software vulnerabilities.

90% of data breaches are caused by software vulnerabilities. 90% of data breaches are caused by software vulnerabilities. Get the skills you need to build secure software applications Secure Software Development (SSD) www.ce.ucf.edu/ssd Offered in partnership with

More information

Cryptography and network security CNET4523

Cryptography and network security CNET4523 1. Name of Course 2. Course Code 3. Name(s) of academic staff 4. Rationale for the inclusion of the course/module in the programme Cryptography and network security CNET4523 Major The Great use of local

More information

Joseph Migga Kizza. A Guide to Computer Network Security. 4) Springer

Joseph Migga Kizza. A Guide to Computer Network Security. 4) Springer Joseph Migga Kizza A Guide to Computer Network Security 4) Springer Contents Part I Understanding Computer Network Security 1 Computer Network Fundamentals 1.1 Introduction 1.2 Computer Network Models

More information

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required Current Catalog Description: Computer network architectures and their application to industry needs.

More information

CIS 253. Network Security

CIS 253. Network Security CIS 253 Network Security Approved: May 6, 2011 EFFECTIVE DATE: Fall 2011 COURSE PACKAGE FORM Team Leader and Members Andra Goldberg, Matt Butcher, Steve Sorden, Dave White Date of proposal to Curriculum

More information

Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits)

Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits) Page 1 of 5 Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description:

More information

CS 450/650 Fundamentals of Integrated Computer Security

CS 450/650 Fundamentals of Integrated Computer Security CS 450/650 Fundamentals of Integrated Computer Security Course Information Department of Computer Science & Engineering UNR, Fall 2014 Class hours Tuesday & Thursday, 1:00 2:15am @ PE 101 Instructor E

More information

NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS. Division: Applied Science (AS) Liberal Arts (LA) Workforce Development (WD)

NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS. Division: Applied Science (AS) Liberal Arts (LA) Workforce Development (WD) NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS COURSE IDENTIFICATION Course Code/Number: ETEC 275 Course Title: Computer and Network Security Division: Applied Science (AS) Liberal Arts (LA) Workforce

More information

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus Department of Computer & Information Sciences CSCI-445: Computer and Network Security Syllabus Course Description This course provides detailed, in depth overview of pressing network security problems

More information

Applied Network Security Course Syllabus Spring 2015

Applied Network Security Course Syllabus Spring 2015 Course Syllabus Spring 2015 Course Information Instructor: Dr. Mike Jochen Phone: 570.422.3036 Email: mjochen@esu.edu Office: 337 SCITECH Building Office Hours: Mon 5:15 7:00 p.m. Weds 5:45 7:00 p.m. Tues/Thurs

More information

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering Sixth Semester Subject: Network Security & Management Contact Hrs / week: 4 Total hrs: 64 Table of Contents

More information

CSCI 4541/6541: NETWORK SECURITY

CSCI 4541/6541: NETWORK SECURITY 1 CSCI 4541/6541: NETWORK SECURITY COURSE INFO CSci 4541/6541 Tuesdays 6:10pm 8:40pm Bell Hall 108 Office Hours: Tuesdays 2:30pm 4:30pm Dr. Nan Zhang Office: SEH 4590 Phone: (202) 994-5919 Email: nzhang10

More information

CENTRAL TEXAS COLLEGE ITSY 2401 FIREWALLS AND NETWORK SECURITY. Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS:

CENTRAL TEXAS COLLEGE ITSY 2401 FIREWALLS AND NETWORK SECURITY. Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS: CENTRAL TEXAS COLLEGE ITSY 2401 FIREWALLS AND NETWORK SECURITY Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS: I. INTRODUCTION A. Identify elements of firewall design, types of security threats and

More information

Chapter 7 Transport-Level Security

Chapter 7 Transport-Level Security Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell

More information

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011 Internet Security Voice over IP ETSF10 Internet Protocols 2011 Kaan Bür & Jens Andersson Department of Electrical and Information Technology Internet Security IPSec 32.1 SSL/TLS 32.2 Firewalls 32.4 + Voice

More information

Tele3119 Trusted Networks Course Outline 2013

Tele3119 Trusted Networks Course Outline 2013 Tele3119 Trusted Networks Course Outline 2013 Staff Contact: A/Prof Robert Malaney, Email: r.malaney@unsw.edu.au Course Aim The main aim of this course is to develop a solid understanding of the key concepts

More information

Networking: EC Council Network Security Administrator NSA

Networking: EC Council Network Security Administrator NSA coursemonster.com/uk Networking: EC Council Network Security Administrator NSA View training dates» Overview The EC-Council's NSA certification looks at network security from a defensive view. The NSA

More information

Chapter 8. Network Security

Chapter 8. Network Security Chapter 8 Network Security Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security Some people who

More information

White Paper. Enhancing Website Security with Algorithm Agility

White Paper. Enhancing Website Security with Algorithm Agility ENHANCING WEBSITE SECURITY WITH ALGORITHM AGILITY White Paper Enhancing Website Security with Algorithm Agility Enhancing Website Security with Algorithm Agility Contents Introduction 3 Encryption Today

More information

Security Goals Services

Security Goals Services 1 2 Lecture #8 2008 Freedom from danger, risk, etc.; safety. Something that secures or makes safe; protection; defense. Precautions taken to guard against crime, attack, sabotage, espionage, etc. An assurance;

More information

BSc (Hons) Sofware Engineering. Examinations for 2010-2011 / Semester 2

BSc (Hons) Sofware Engineering. Examinations for 2010-2011 / Semester 2 BSc (Hons) Sofware Engineering Cohort: BSE/09/FT & BSE/07/PT Examinations for 2010-2011 / Semester 2 MODULE: Security Concepts MODULE CODE: SECU2101 Duration: 2 Hours Instructions to Candidates: 1. ALL

More information

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Using etoken for SSL Web Authentication. SSL V3.0 Overview Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents

More information

APWG. (n.d.). Unifying the global response to cybecrime. Retrieved from http://www.antiphishing.org/

APWG. (n.d.). Unifying the global response to cybecrime. Retrieved from http://www.antiphishing.org/ DB1 Phishing attacks, usually implemented through HTML enabled e-mails, are becoming more common and more sophisticated. As a network manager, how would you go about protecting your users from a phishing

More information

Course Title: ITAP 3471: Web Server Management

Course Title: ITAP 3471: Web Server Management Course Title: ITAP 3471: Web Server Management Semester Credit Hours: 4 (3,1) I. Course Overview The primary objective of this course is to give students a comprehensive overview of the tools and techniques

More information

Introduction to Cyber Security / Information Security

Introduction to Cyber Security / Information Security Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be

More information

Network Access Security. Lesson 10

Network Access Security. Lesson 10 Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.

More information

Computer Network Engineering

Computer Network Engineering 208 Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Certificate of Achievement: Skills Competency Award: Cisco Networking Associate Program Description The field of

More information

Lecture 1 - Overview

Lecture 1 - Overview Lecture 1 - Overview CMPSC 443 - Spring 2012 Introduction to Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ From small vulnerabilities come... 2 People are part of

More information

Network Security and Firewall 1

Network Security and Firewall 1 Department/program: Networking Course Code: CPT 224 Contact Hours: 96 Subject/Course WEB Access & Network Security: Theoretical: 2 Hours/week Year Two Semester: Two Prerequisite: NET304 Practical: 4 Hours/week

More information

How To Pass A Network Security Course Online At Sp College

How To Pass A Network Security Course Online At Sp College EMAIL: Please email via D2L (MyCourses) for all inquiries Start Date: August 17, 2015 Course Credits: 3 ACADEMIC DEPARTMENT: Dean: Sharon Setterlind Office Location: St Petersburg/Gibbs Campus Office Number:

More information

Course Design Document. IS403: Advanced Information Security and Trust

Course Design Document. IS403: Advanced Information Security and Trust Course Design Document IS403: Advanced Information Security and Trust Version 1.3 05/10/ 2008 Xuhua Ding Table of Content 1 Review Summary...3 2 Overview of Advanced Information Security and Trust Course...

More information

City University of Hong Kong. Information on a Course offered by Department of Computer Science with effect from Semester A in 2014 / 2015

City University of Hong Kong. Information on a Course offered by Department of Computer Science with effect from Semester A in 2014 / 2015 City University of Hong Kong Information on a Course offered by Department of Computer Science with effect from Semester A in 2014 / 2015 Part I Course Title: Topics on Computer Security Course Code: CS4293

More information

Lectures for the course: Electronic Commerce Technology (IT 60104)

Lectures for the course: Electronic Commerce Technology (IT 60104) Lectures for the course: Electronic Commerce Technology (IT 60104) Week 1 Lecture 1 30/12/2010 Introduction to the course Evaluation guidelines Week 2 Lecture 2 3/01/2011 Overview of E-Commerce E-Commerce

More information

Boston University MET CS 690. Network Security

Boston University MET CS 690. Network Security Boston University MET CS 690 Network Security Course Overview This course will cover advanced network security issues and solutions. The main focus on the first part of the course will be on Security basics,

More information

Virtual Private Networks

Virtual Private Networks Virtual Private Networks ECE 4886 Internetwork Security Dr. Henry Owen Definition Virtual Private Network VPN! Virtual separation in protocol provides a virtual network using no new hardware! Private communication

More information

Network Security Administrator

Network Security Administrator Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze

More information

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs Network Security Ola Lundh ola.lundh@hh.se Schedule/ time-table: landris.hh.se/ (NetwoSec) Course home-page: hh.se/english/ide/education/student/coursewebp ages/networksecurity cisco.netacad.net Packet

More information

See Course and Program Development Policy and Procedures (www.ubalt.edu/provost) for instructions. o PROGRAM ACTIONS. Original Program Title:

See Course and Program Development Policy and Procedures (www.ubalt.edu/provost) for instructions. o PROGRAM ACTIONS. Original Program Title: llb ~. Document N: Course and Program Development: IMPACT AND APPROVAL SIGNATURES See Course and Program Development Policy and Procedures (www.ubalt.edu/provost) for instructions. SCHOOL: o LAW OMSB o

More information

18-731 Midterm. Name: Andrew user id:

18-731 Midterm. Name: Andrew user id: 18-731 Midterm 6 March 2008 Name: Andrew user id: Scores: Problem 0 (10 points): Problem 1 (10 points): Problem 2 (15 points): Problem 3 (10 points): Problem 4 (20 points): Problem 5 (10 points): Problem

More information

Session 2422. Development of a Graduate Certificate in Information Assurance

Session 2422. Development of a Graduate Certificate in Information Assurance Session 2422 Development of a Graduate Certificate in Information Assurance Dr. Doug Jacobson Department of Electrical and Computer Engineering, Iowa State University The growing need for information security

More information

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras Cryptography & Network Security Introduction Chester Rebeiro IIT Madras The Connected World 2 Information Storage 3 Increased Security Breaches 81% more in 2015 http://www.pwc.co.uk/assets/pdf/2015-isbs-executive-summary-02.pdf

More information

Page 1. Lecture 1: Introduction to. Introduction to Computer Networks Security. Input file DES DES DES DES. Output file

Page 1. Lecture 1: Introduction to. Introduction to Computer Networks Security. Input file DES DES DES DES. Output file 1 2 Prof. Sead Muftic Matei Ciobanu Morogan Lecture 1: Introduction to Computer s Security Introduction to Computer s Security 4. security services and mechanisms 3 Approach 4 Introduction to Computer

More information

St Petersburg College CTS1120 Online. Intro Network Security Foundations - (8 weeks online) Course Syllabus

St Petersburg College CTS1120 Online. Intro Network Security Foundations - (8 weeks online) Course Syllabus St Petersburg College CTS1120 Online Intro Network Security Foundations - (8 weeks online) PROFESSOR: Ryan Irving Course Syllabus Instructor Web Page: http://www.spcollege.edu/instructors/id/irving.ryan

More information

FBLA Cyber Security aligned with Common Core 6.14. FBLA: Cyber Security RST.9-10.4 RST.11-12.4 RST.9-10.4 RST.11-12.4 WHST.9-10.4 WHST.11-12.

FBLA Cyber Security aligned with Common Core 6.14. FBLA: Cyber Security RST.9-10.4 RST.11-12.4 RST.9-10.4 RST.11-12.4 WHST.9-10.4 WHST.11-12. Competency: Defend and Attack (virus, spam, spyware, Trojans, hijackers, worms) 1. Identify basic security risks and issues to computer hardware, software, and data. 2. Define the various virus types and

More information

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus COMP-530 Cryptographic Systems Security *Requires Programming Background University of Nicosia, Cyprus Course Code Course Title ECTS Credits COMP-530 Cryptographic Systems 10 Security Department Semester

More information

Network Security ITP 457 (4 Units)

Network Security ITP 457 (4 Units) Network Security ITP 457 (4 Units) Description Objectives Prerequisites/ Recommended Preparation Instructor Contacting the Instructor Lecture Required Textbooks Web Site Due to the emergence of the internet

More information

Weighted Total Mark. Weighted Exam Mark

Weighted Total Mark. Weighted Exam Mark CMP4103 Computer Systems and Network Security Period per Week Contact Hour per Semester Weighted Total Mark Weighted Exam Mark Weighted Continuous Assessment Mark Credit Units LH PH TH CH WTM WEM WCM CU

More information

Networked Systems Security

Networked Systems Security Unit 32: Networked Systems Security Unit code: QCF Level 3: Credit value: 10 Guided learning hours: 60 Aim and purpose J/601/7332 BTEC National The aim of this unit is to ensure learners know about the

More information

CS5008: Internet Computing

CS5008: Internet Computing CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is

More information

Angel Dichev RIG, SAP Labs

Angel Dichev RIG, SAP Labs Enabling SSL and Client Certificates on the SAP J2EE Engine Angel Dichev RIG, SAP Labs Learning Objectives As a result of this session, you will be able to: Understand the different SAP J2EE Engine SSL

More information

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1 Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions

More information

Tim Bovles WILEY. Wiley Publishing, Inc.

Tim Bovles WILEY. Wiley Publishing, Inc. Tim Bovles WILEY Wiley Publishing, Inc. Contents Introduction xvii Assessment Test xxiv Chapter 1 Introduction to Network Security 1 Threats to Network Security 2 External Threats 3 Internal Threats 5

More information

CSci 530 Midterm Exam. Fall 2012

CSci 530 Midterm Exam. Fall 2012 CSci 530 Midterm Exam Fall 2012 Instructions: Show all work. No electronic devices are allowed. This exam is open book, open notes. You have 100 minutes to complete the exam. Please prepare your answers

More information

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

COURSE SYLLABUS FIREWALLS & NETWORK SECURITY. ITSY-2301 Number. 2-3-3 Lecture - Lab - Credit. ITSY-1342 Prerequisites. April 16, 2015 Revision Date

COURSE SYLLABUS FIREWALLS & NETWORK SECURITY. ITSY-2301 Number. 2-3-3 Lecture - Lab - Credit. ITSY-1342 Prerequisites. April 16, 2015 Revision Date COURSE SYLLABUS FIREWALLS & NETWORK SECURITY ITSY-2301 Number 2-3-3 Lecture - Lab - Credit ITSY-1342 Prerequisites April 16, 2015 Revision This syllabus has been reviewed and is current on the date indicated.

More information

CCNA Security 2.0 Scope and Sequence

CCNA Security 2.0 Scope and Sequence CCNA Security 2.0 Scope and Sequence Last Updated August 26, 2015 Target Audience The Cisco CCNA Security course is designed for Cisco Networking Academy students seeking career-oriented, entry-level security

More information

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led Certification: ENSA Exam 312-38 Course Description This course looks at the network security in defensive view.

More information

ICAWEB423A Ensure dynamic website security

ICAWEB423A Ensure dynamic website security ICAWEB423A Ensure dynamic website security Release: 1 ICAWEB423A Ensure dynamic website security Modification History Release Release 1 Comments This Unit first released with ICA11 Information and Communications

More information

Computer Security Curriculum at the Univ. of Wisconsin Eau Claire. Paul J. Wagner wagnerpj@uwec.edu

Computer Security Curriculum at the Univ. of Wisconsin Eau Claire. Paul J. Wagner wagnerpj@uwec.edu Computer Security Curriculum at the Univ. of Wisconsin Eau Claire Paul J. Wagner wagnerpj@uwec.edu Background! Attended week-long workshop at Indiana University of Pennsylvania in 2002 with colleague Andy

More information

e-code Academy Information Security Diploma Training Discerption

e-code Academy Information Security Diploma Training Discerption e-code Academy Information Security Diploma Training 2015 I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. OBJECTIVE... 3 LIST OF POSTGRADUATE COURSES... 3 FIRST SEMESTER

More information

ASSESSMENT RECORD FOR DEPARTMENT OF

ASSESSMENT RECORD FOR DEPARTMENT OF RECORD DEPARTMENT OF Form A Computer Science and Engineering -------------------------------------------------------------------------------------------------------------------------------------------------------------

More information

Computer Engineering and Information Technology BSc Program Specifications

Computer Engineering and Information Technology BSc Program Specifications Modern Academy for Engineering and Technology in Maadi Electrical Engineering Department Computer Engineering and Information Technology BSc Program Specifications By Law-2000 Page Intentionally Left Blank

More information

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview

More information

NETWORK ADMINISTRATION AND SECURITY

NETWORK ADMINISTRATION AND SECURITY NETWORK ADMINISTRATION AND SECURITY Unit I (NAS) (W- 10) Q. 1) What is Security Attack? Explain general categories of attack with examples. 7 Q. 2) List and define the five security services. 5 Q. 3) Define

More information

CS 348: Computer Networks. - Security; 30 th - 31 st Oct 2012. Instructor: Sridhar Iyer IIT Bombay

CS 348: Computer Networks. - Security; 30 th - 31 st Oct 2012. Instructor: Sridhar Iyer IIT Bombay CS 348: Computer Networks - Security; 30 th - 31 st Oct 2012 Instructor: Sridhar Iyer IIT Bombay Network security Security Plan (RFC 2196) Identify assets Determine threats Perform risk analysis Implement

More information

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶 Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course

More information

Written by Edmond Ng on behalf of D-Link for a Thai magazine (before translation) Page 1 of 4

Written by Edmond Ng on behalf of D-Link for a Thai magazine (before translation) Page 1 of 4 Increasing Network Security Introduction Network and data security has been a growing concern in many organizations. With the emergence of wireless networking, security preemptives have been primarily

More information

Building A Secure Microsoft Exchange Continuity Appliance

Building A Secure Microsoft Exchange Continuity Appliance Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building

More information

70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network

70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network 70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network Course Number: 70 299 Length: 1 Day(s) Course Overview This course is part of the MCSA training.. Prerequisites

More information

NETWORK SECURITY Staying Ahead of the Curve

NETWORK SECURITY Staying Ahead of the Curve NETWORK SECURITY Staying Ahead of the Curve PREFACE Very few things in this world move at the pace of technology. Today s internet infrastructure offers a tremendous value proposition to those implementing

More information

Institution : Majmaah University. Academic Department : College of Science at AzZulfi. Programme : Computer Science and Information Course :

Institution : Majmaah University. Academic Department : College of Science at AzZulfi. Programme : Computer Science and Information Course : Institution : Majmaah University. Academic Department : College of Science at AzZulfi. Programme : Computer Science and Information Course : Computer Graphics (CSI-425) Course Coordinator : Mr. ISSA ALSMADI

More information

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module

More information

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For Secure Socket Layer Secure Socket Layer Introduction Overview of SSL What SSL is Useful For Introduction Secure Socket Layer (SSL) Industry-standard method for protecting web communications. - Data encryption

More information

Common Syllabus Revised 01.17.2015

Common Syllabus Revised 01.17.2015 Department of Applied Information Technology Volgenau School of Engineering IT 366 Information Security Fundamentals Common Syllabus Revised 01.17.2015 This syllabus contains information common to all

More information