Course Syllabus. Course code: 371410. Academic Staff Specifics. Office Number and Location



Similar documents
Philadelphia University Faculty of Information Technology Department of Computer Science --- Semester, 2007/2008. Course Syllabus

Course Syllabus. Academic Staff Specifics

Philadelphia University Faculty of Administrative and Financial Sciences Department of Networking and Systems Management First Semester,

Philadelphia University Faculty of Information Technology Department of Computer Science Semester, 2007/2008.

Philadelphia University Faculty of Information Technology Department of Computer Science --- Semester, 2007/2008. Course Syllabus

Philadelphia University Faculty of Nursing First Semester, 2009/2010. Course Syllabus. Course code:

Network Security Course Specifications

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Philadelphia University Faculty of Information Technology Department of Computer Science First Semester, 2007/2008.

Network Security SWISS GERMAN UNIVERSITY. Administration Charles Lim

Information Security Course Specifications

Syllabus. No: CIS 200. Title: Fundamentals of Network Security. Credits: 4. Coordinator: Dr. B. Dike-Anyiam, Computer Science & Networking Lecturer

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

(IŞIK - IT201) 1 / 6 COURSE PROFILE. Theory+PS+Lab (hour/week) Local Credits. Course Name Code Semester Term ECTS

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

Weighted Total Mark. Weighted Exam Mark

Applied Network Security Course Syllabus Spring 2015

NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS. Division: Applied Science (AS) Liberal Arts (LA) Workforce Development (WD)

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

Computer Science 3CN3 Computer Networks and Security. Software Engineering 4C03 Computer Networks and Computer Security. Winter 2008 Course Outline

COURSE SYLLABUS FIREWALLS & NETWORK SECURITY. ITSY-2301 Number Lecture - Lab - Credit. ITSY-1342 Prerequisites. April 16, 2015 Revision Date

CSC-570 Introduction to Database Management Systems

NETWORK SECURITY (W/LAB) Course Syllabus

CS 464/564 Networked Systems Security SYLLABUS

CS 450/650 Fundamentals of Integrated Computer Security

Common Syllabus Revised

Boston University MET CS 690. Network Security

University of Florida Department of Decision and Information Sciences ISM 6128: Systems Analysis and Design I Spring 2016

ISM 4113: SYSTEMS ANALYSIS & DESIGN

BUS Computer Concepts and Applications for Business Fall 2012

Computer and Network Security PG Unit Outline School of Information Sciences and Engineering

Southwestern Michigan College School of Business Dowagiac, Michigan. Course Syllabus FALL SEMESTER 2012

CIT 217 Security + Network Security Fall 2015

SE 4472a / ECE 9064a: Information Security

COURSE PROFILE. Business Intelligence MIS531 Fall

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

CSUS COLLEGE OF ENGINEERING AND COMPUTER SCIENCE Department of Computer Science (RVR 3018; /6834)

THE UNIVERSITY OF HONG KONG FACULTY OF BUSINESS AND ECONOMICS

CIT 212 Microsoft Networking II Windows Server 2012 R2 Administration Fall 2015

Introduction to Cyber Security / Information Security

SYLLABUS CIS 3660: OBJECT-ORIENTED SYSTEM ANALYSIS AND DESIGN SPRING 2010

CS4320 Computer and Network Security. Fall 2015 Syllabus

Tele3119 Trusted Networks Course Outline 2013

CIS490 Design in Software Engineering. Course Syllabus for the Virtual Class

NETWORK ADMINISTRATION AND SECURITY

SAULTCOLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline

Data Encryption and Network Security

Course Title: ITAP 4311: Database Management. Semester Credit Hours: 3 (3,0)

Cryptography and network security CNET4523

NETWORK SYSTEMS 3 Learner Guide

BUS 3525 Strategic Management Online

CSCI 454/554 Computer and Network Security. Final Exam Review

COURSE OUTLINE. SOC SCI 2UA3E (Winter 2013) Principles of Applied Behaviour Analysis 1

Implementing and Administering Security in a Microsoft Windows Server 2003 Network

College of Business Department of Accounting and Management Information Systems

How To Pass A Credit Course At Florida State College At Jacksonville

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

CNA 432/532 OSI Layers Security

FACULTY: Instructor: Linda Eligh Classroom: SSC Campus Phone: Ext Office Hours: Tuesdays 2:00 p.m. 5:00 p.m.

A. COURSE DESCRIPTION

CS135 Computer Science I Spring 2015

Information Systems and Tech (IST)

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

Syllabus. Required Textbooks: 1. Title: Hands-On Networking Fundamentals Author: Palmer Edition: 2nd Copyright Year: 2013 ISBN:

MGT 5309 FALL 07 LOGISTICS AND SUPPLY CHAIN MANAGEMENT SYLLABUS

SYSTEMS ANALYSIS DESIGN

San José State University Department of World Languages and Literatures CHIN 132, Chinese for Professionals Fall 2012

MASTER SYLLABUS

MTH 110: Elementary Statistics (Online Course) Course Syllabus Fall 2012 Chatham University

PSYCH 3510: Introduction to Clinical Psychology Fall 2013 MWF 2:00pm-2:50pm Geology 108

MIS630 Data and Knowledge Management Course Syllabus

Accounting Information Systems (ACC409) Spring 2015 School of Accountancy Shidler College of Business University of Hawaii at Manoa

CSC 474 Information Systems Security

STATE UNIVERSITY OF NEW YORK COLLEGE OF TECHNOLOGY CANTON, NEW YORK CITA/MINS 300. Management Information Systems

Advanced Database Management MISM Course F A Fall 2014

Course Title: ITAP 3471: Web Server Management

Course Design Document. IS403: Advanced Information Security and Trust

PSYC 3200-C Child Psychology 3 SEMESTER HOURS

CS 340 Cyber Security Weisberg Division of Computer Science College of Information Technology & Engineering Marshall University

Curran, K. Tutorials. Independent study (including assessment) N/A

College of Public Health & Health Professions Course Syllabus. Public Health Concepts in Infectious Diseases PHC 6517, section 1816

INFORMATION TECHNOLOGY EDUCATION PROGRAMMING AND ANALYSIS COURSE SYLLABUS. Instructor: Debbie Reid. Course Credits: Office Location:

Transcription:

Philadelphia University Faculty of Administrative & Financial Sciences Department of Business Networking and Systems Management First semester, 2009/2010 Course Syllabus Course Title: Systems & Networks Security and Firewalls. Course code: 371410 Course Level: fourth year Course prerequisite (s) and/or co requisite (s): 371251 Lecture Time: 8:15-9:45 Mon. Wed Credit hours: 3 Academic Staff Specifics Name Rank Office Number and Location Office Hours E-mail Address Mr. Ahmad Al- Ghoul M.Sc. 32404 9:40-11:10 Mon. Wed ahmad4_2_69@hotmail.com Course module description: This course provides end-to-end, detailed coverage of the state of the art in all aspects of computer security. Starting with a clear, in-depth review of cryptography, it also covers specific options for securing software and data against malicious code and intruders; the special challenges of securing networks and distributed systems; firewalls; ways to administer security on personal computers and UNIX systems; analyzing security risks and benefits; and the legal and ethical issues surrounding computer security. Course module objectives: Provides a comprehensive introduction to information security issues, concepts and technologies. Understand the technologies of access control, cryptography, digital signatures, authentication, network firewalls, and network security services and mechanisms Explain the threat of viruses and other rogue programs, and recommended countermeasures Understand and explain the specification, verification, and design of secure networks using rigorous and formal logical methods. 1

Course/ module components Books Text book: Security in Computing, by Charles P. Pfleeger, Prentice Hall 2003 ISBN : 0-13-035548-8 In addition to the above, the students will be provided with handouts by the lecturer. Homework guide. HOMEWORK: Homework is an essential part of the educational process. The homework in this course will reinforce the material covered in the classroom and provide time for practice. Students will earn points for each homework assignment completed. Homework assignments will be graded based on completion. Teaching methods: Duration: 16 weeks in first semester, 48 hours in total Lectures: 32 hours (2.5 hours per week), Laboratories: 16 hours, 1 per week Learning outcomes: Knowledge and understanding A student completing this module should: -Define security and understand security statistics - List the attributes of an effective security system and create a security policy - Use authentication techniques and access control to secure your network - Define encryption, and encryption types and uses - Describe the elements involved in the use of firewalls - Describe firewall strategies, goals, and designs - Plan for proactive detection of and appropriate responses to a security breach Cognitive skills (thinking and analysis). The lecturer will present the material in the text book in an interactive way that stimulates the thinking side of students. Conducting the learning objectives for each module components in clear manner to insure the material is digested by the students. - Analyzing, summarizing and integrating information from a variety of media. The student must be to understand different available tools, techniques and methods to apply security different, have the ability and understanding of using the suitable method depends on cases. Communication skills (personal and academic). -Module language: English -For every lecture the last five minutes will be open for discussion. For further discussion, the students are welcome at the lecturer s office hour as appeared in first page. Time Management: Assignments are varied, integrated, and overlapping, and students must focus on multiple issues, projects, and demands. Students must, therefore, take responsibility for planning and pacing their own work as well as developing time management skills. 2

Project Development: Groups of approximately two to three students develop projects, complete research, schedule meetings, write papers and reports, and deliver a 20-30 minute oral presentation using visual aids. Group Management: Students work on group projects to practice interpersonal skills by communicating with group members, other groups, and peers outside the group. Practical and subject specific skills (Transferable Skills). The student is able to analyze and design security system using the suitable method and tools. Assessment instruments Short reports and/ or presentations, and/ or Short research projects Quizzes. Home works Final examination: 50 marks Allocation of Marks Assessment Instruments First examination Second examination Final examination: 50 marks Reports, research projects, Quizzes, Home works, Projects Total 15 15 50 20 100 Mark Documentation and academic honesty This course is given from the textbook mentioned above. It is copyright protected. Students are encouraged to purchase this textbook from the university bookshop. Definition of Plagiarism Plagiarism is the unacknowledged borrowing of another writer s words or ideas. How Can Students Avoid Plagiarism? To avoid plagiarism, you must give credit whenever you use another person s idea, opinion, or theory; any facts, statistics, graphs, drawings any pieces of information that are not common knowledge; quotations of another person s actual spoken or written words; or Paraphrase of another person s spoken or written words. 3

If you are in doubt about whether what you are doing is inappropriate, consult your instructor. A claim that you didn t know it was wrong will not be accepted as an excuse. Penalty for Plagiarism The minimum penalty for an act of plagiarism is a 0 on the assignment, homework, and project. Serious cases of plagiarism may result in failure in the course as a whole, or expulsion from the university. 4

Course/module academic calendar week Basic and support material to be covered Homework/reports and their due dates (1) Information cycle, what is security, what is the threat & risk, effective security systems, ensure security in a network & enhancing security by, security procedures & security phases (2) Planning a security policy, system classification, security Goals, creating a security policy, Types of Threat, Risk, Attack Tutorial 1 (3) Elements of security, security standards, & security architecture, authentication, access control, building a defense (4) Encryption & method of defense, basic encryption and decryption, encryption strategy, encryption with key Tutorial 2 (5) Public key encryption, uses of encryption, digital signature H/W and S/W Security, physical Security, secure encryption systems (6) First examination Definition of protocols, types of protocols, key distribution, types of ciphers, Tutorial 3 (7) Error prevention and detection, one-way encryption, cipher block chain (8) Repetition (encryption), Tutorial 4 (9) Viruses & types of viruses, how viruses attach & how viruses gain control, homes for viruses, virus signature, source of viruses, preventing virus infection, facts and misconceptions about viruses, examples of malicious codes (10) What is a firewall, packet filters, proxy servers and circuit-level gateways, 5

(11) Second examination application-level gateway proxy server, Tutorial 5 Second Exam, - Practical implementation (The Cisco PIX Firewall) (12) building a firewall (bastion host), common firewall designs & Firewalls Design Approaches (13) Personal Computer Security Management, UNIX Security Management, risks Analysis & Security Planning, organizational Security Policies, Tutorial 6 (14) Authentication methods, use of passwords, authentication protocols, PAP, CHAP, RADIUS, SSL, TLS, IPSec, Kerberos, Tutoria7. (15) Introduction to ISA server, using caching, using firewalls, deployment scenarios for ISA server (16) Final Examination Installing ISA server, installing and configuring ISA server clients, maintaining ISA server, tutorial 8 Expected workload: On average students need to spend 2 hours of study and preparation for each 50-minute lecture/tutorial. Attendance policy: Absence from lectures and/or tutorials shall not exceed 15%. Students who exceed the 15% limit without a medical or emergency excuse acceptable to and approved by the Dean of the relevant college/faculty shall not be allowed to take the final examination and shall receive a mark of zero for the course. If the excuse is approved by the Dean, the student shall be considered to have withdrawn from the course. Module references Books Students will be expected to give the same attention to these references as given to the Module textbook(s) [1] System analysis and design, sixth edition Authors: Kenneth E. Kendall and Julie E. Kendall Publisher: Prentice Hall [2] MODERN SYSTEMS ANALYSIS AND DESIGN Third Edition Authors: Jeffrey A. Hoffer, Joey F. George, Joseph S. Valacich 6

Publisher: prentice hall [3] Introduction to Systems Analysis and Design. Authors: Hawryszkiewyer Publisher: prentice hall 1990 [4] Systems Analysis and Design, 3rd Edition Authors: Alan Dennis, Barbara Haley Wixom and Roberta M. Roth, Publisher: John Wiley's & Sons Inc., 2006. ISBN: 047172257X Websites System Analysis JAD http://www.utexas.edu/ecs/trecs/hris/pub/jad.php RAD http://webopedia.internet.com/term/r/rapid_application_development.html The Unified Modeling Language http://www-306.ibm.com/software/rational/uml/?smsession=no Yourdon Symbols http://www.yourdon.com/ Data Dictionaries http://burks.bton.ac.uk/burks/foldoc/47/28.htm Decision Tables http://www.cems.uwe.ac.uk/jharney/table.html Outsourcing http://www.outsourcing-journal.com/ Application Service Providers http://www.aspnews.com/ Financial Analysis Tools http://www.toolkit.cch.com/text/p06_6500.asp Benchmark Tests http://www.tpc.org/ Object-Oriented Analysis Unified Modeling Language http://www.uml.org/ Polymorphism http://whatis.techtarget.com/definition/0,,sid9_gci212803,00.html Use Case Modeling http://www.objectworkshop.com/index.html Use Case Diagrams http://www.andrew.cmu.edu/course/90-754/umlucdfaq.html System Design Printed Output http://edweb.sdsu.edu/courses/et650_online/mapps/glossary.html User Interface Design http://www.asktog.com/basics/firstprinciples.html Human-Computer Interaction http://www.hcibib.org/ Input Devices http://www.billbuxton.com/inputsources.html Data Entry http://www.nd-soft.com/prod01.htm Referential Integrity 7

http://webopedia.internet.com/term/r/referential_integrity.html Entity-Relationship Diagrams http://www.smartdraw.com/filenotfound.aspx?aspxerrorpath=404;http://www.smartdraw.com/resourc es/centers/software/erdcontents.htm Cardinality http://www.smartdraw.com/filenotfound.aspx?aspxerrorpath=404;http://www.smartdraw.com/resourc es/centers/software/erdcardinality.htm Normalization http://www.sum-it.nl/cursus/dbdesign/english/logis010.php3 Data Warehousing http://www.datawarehousing.com/ Data Mining http://www.twocrows.com/glossary.htm 8