University of Wisconsin-Whitewater Curriculum Proposal Form #3 New Course



Similar documents
Information Security Course Specifications

Network Security Course Specifications

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

SE 4472a / ECE 9064a: Information Security

Curran, K. Tutorials. Independent study (including assessment) N/A

Data Encryption and Network Security

(IŞIK - IT201) 1 / 6 COURSE PROFILE. Theory+PS+Lab (hour/week) Local Credits. Course Name Code Semester Term ECTS

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

CS 450/650 Fundamentals of Integrated Computer Security

CS 464/564 Networked Systems Security SYLLABUS

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

e-code Academy Information Security Diploma Training Discerption

Tele3119 Trusted Networks Course Outline 2013

CCNA Security 2.0 Scope and Sequence

Course Design Document. IS403: Advanced Information Security and Trust

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

Computer and Network Security PG Unit Outline School of Information Sciences and Engineering

Computer and Network Security

Lecture 1: Introduction. CS 6903: Modern Cryptography Spring Nitesh Saxena Polytechnic University

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

CIS 253. Network Security

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline

KENNESAW STATE UNIVERSITY GRADUATE COURSE PROPOSAL OR REVISION, Cover Sheet (10/02/2002)

COURSE SYLLABUS FIREWALLS & NETWORK SECURITY. ITSY-2301 Number Lecture - Lab - Credit. ITSY-1342 Prerequisites. April 16, 2015 Revision Date

Common Syllabus Revised

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Cryptography and network security CNET4523

ITSY Security Assessment/Auditing Spring 2010 Professor: Zoltan Szabo D111 LEC TR 11:20AM 12:45PM D111 LAB TR 12:50PM 02:15PM

CSC 314: Operating Systems Spring 2005

Syllabus. No: CIS 200. Title: Fundamentals of Network Security. Credits: 4. Coordinator: Dr. B. Dike-Anyiam, Computer Science & Networking Lecturer

Information, Network & Cyber Security

Why Security Matters. Why Security Matters. 00 Overview 03 Sept CSCD27 Computer and Network Security. CSCD27 Computer and Network Security 1

Network Security SWISS GERMAN UNIVERSITY. Administration Charles Lim

St Petersburg College CTS1120 Online. Intro Network Security Foundations - (8 weeks online) Course Syllabus

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

V: Literary & Artistic Studies XI: Natural Sciences

CRYPTOG NETWORK SECURITY

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

PELLISSIPPI STATE TECHNICAL COMMUNITY COLLEGE MASTER SYLLABUS PROJECT SCHEDULING W/LAB CET 2021

CRYPTOGRAPHY AND NETWORK SECURITY

CENTRAL TEXAS COLLEGE ITSY 2459 SECURITY ASSESSMENT AND AUDITING. Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS:

Cisco Discovery 1: Networking for Home and Small Business (ITCC 1310)

FULL PROPOSAL: Substantive Change(s) to a Course

CCNA Security v1.0 Scope and Sequence

NETWORK SECURITY (W/LAB) Course Syllabus

CS4320 Computer and Network Security. Fall 2015 Syllabus

CSUS COLLEGE OF ENGINEERING AND COMPUTER SCIENCE Department of Computer Science (RVR 3018; /6834)

CNA 432/532 OSI Layers Security

BUS Computer Concepts and Applications for Business Fall 2012

Imperial Valley College Course Syllabus - Elementary Differential Equations Math 220

Weighted Total Mark. Weighted Exam Mark

Faculty Contact Milan Shipka

CIT 217 Security + Network Security Fall 2015

CNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan

CS 649 Database Management Systems. Fall 2011

Allegany College of Maryland. 239 Cisco Networking 2 * Offered Fall semester and

Elmira Business Institute Medical Transcription I (OFF 131)

CENTRAL TEXAS COLLEGE SYLLABUS FOR ARTC 2488 INTERNSHIP GRAPHIC DESIGN. Semester Hours Credit: 4 Contact Hours: 304 INSTRUCTOR: OFFICE HOURS:

CSE/EE 461 Lecture 23

MGMT 280 Impact Investing Ed Quevedo

HANDBOOK FOR DOCTORAL PROGRAM IN INFORMATION TECHNOLOGY

Interdisciplinary Program in Information Security and Assurance. By Kossi Edoh NC A&T State University Greensboro

Computer and Network Security

CS135 Computer Science I Spring 2015

This four (4) credit hour. Students will explore tools and techniques used penetrate, exploit and infiltrate data from computers and networks.

CIS 160 ST: Web Design and Technology

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

COLLIN COLLEGE Course Syllabus

Elmira Business Institute Introduction to Health Information Management(MED 270)

Boston University MET CS 690. Network Security

Raritan Valley Community College Academic Course Outline. CISY Advanced Computer Networking

Transcription:

Effective Term: 2147 (Fall 2014) University of Wisconsin-Whitewater Curriculum Proposal Form #3 New Course Subject Area - Course Number: COMPSCI 462 (See Note #1 below) Cross-listing: N/A Course Title:(Limited to 65 characters) 25-Character Abbreviation: Network Security Network Security Sponsor(s): Department(s): College(s): Dr. Jiazhen Zhou Mathematical and Computer Sciences Letters and Sciences Consultation took place: NA Yes (list departments and attach consultation sheet) Departments: Programs Affected: Computer Science Is paperwork complete for those programs? (Use "Form 2" for Catalog & Academic Report updates) NA Yes will be at future meeting Prerequisites: COMPSCI 223 and COMPSCI 271, or Consent of Instructor Grade Basis: Conventional Letter S/NC or Pass/Fail Course will be offered: Part of Load Above Load On Campus Off Campus - Location College: Letters and Sciences Dept/Area(s): Math and Computer Science Instructor: Dr. Jiazhen Zhou Note: If the course is dual-listed, instructor must be a member of Grad Faculty. Check if the Course is to Meet Any of the Following: Technological Literacy Requirement Diversity Writing Requirement General Education Option: Select one: Note: For the Gen Ed option, the proposal should address how this course relates to specific core courses, meets the goals of General Education in providing breadth, and incorporates scholarship in the appropriate field relating to women and gender. Credit/Contact Hours: (per semester) Total lab hours: 0 Total lecture hours: 48 Number of credits: 3 Total contact hours: 48 Can course be taken more than once for credit? (Repeatability) No Yes If "Yes", answer the following questions: No of times in major: No of times in degree: No of credits in major: No of credits in degree: Revised 10/02 1 of 5

Proposal Information:(Procedures for form #3) Course justification: Security is a major issue in computer networking. There is a high need of technicians and scientists in this area to ensure a secure and reliable network in support applications going through the Internet. Providing education in network security will largely boost the career of students graduating from the Computer Science program, and it also benefit our community significantly. This course will also act as one course in the forthcoming networking emphasis area in our Computer Science program. Relationship to program assessment objectives: The following Computer Science program objectives are at least partially addressed by this course: To provide students with: Technical, analytic, problem solving skills required for an entry-level position. Hands-on experience with appropriate technology. High level of adaptability to new technology and a commitment to continual learning. Group and individual communication skills. Professional and personal development skills. Budgetary impact: Staffing: Several members of the current Computer Science staff have the expertise necessary to staff this course. It is anticipated that Dr. Jiazhen Zhou a will initially be the instructors. Computer laboratory space on campus is already sufficient to run this course. Academic unit library and service & supply budget: It is not anticipated that this course will affect the department s service & supply or library budget. Impact on campus instructional resource units: This course will serve as a emphasis area course in networking for our newly established Computer Science program. Laboratory facilities: adequate lecture space is available. This course can be taught in any classroom or lab rooms such as McGraw 115 or Hyer 210. The networking lab of Dr. Jiazhen Zhou can provide space and equipment necessary for the hand-on experiments. Course description: This course covers the basic and fundamental cryptographic algorithms and security protocols for computer networks. Network vulnerabilities, attacks on Internet, network monitoring, security at the link, network and transport layers are also covered in the course. Course Objectives and tentative course syllabus with mandatory information(paste syllabus below): Revised 10/02 2 of 5

COMPSCI 462: Network Security Required Texts: Cryptography and Network Security: Principles and Practices, 5th Ed. -by William Stallings, Pearson Education, 2011 (ISBN 10: 0-13-609704-9) Course Description This course covers the basic and fundamental cryptographic algorithmsand security protocols for computer networks. Network vulnerabilities,attacks on Internet, network monitoring, security at the link, network andtransport layers are also covered in the course. Prerequisite: COMPSCI 223 and COMPSCI 271, or Consent of Instructor CourseObjectives 1 2 To understand concepts related to applied cryptography, and the theory behind the security of different cryptographic algorithms. To understand common network vulnerabilities and attacks, defense mechanisms againstnetwork attacks, and cryptographic protection mechanisms. TentativeCourseSchedule WEEK READINGS Assignment Description Presentation/Project/Exams 1 Chapter 1 Introduction; Networking basics and security issues 2 Chapter 3 Classical encryption techniques 3 Chapter 5,6 Block ciphers and the data encryption standard 4 Chapter 7 Advanced encryption standard Project 1 5 Chapter 8 Confidentiality using symmetric encryption 6 Chapter 9, 10 Public-key cryptography and RSA 7 Chapter 15 8 9 Key management and other public-key cryptosystems Chapter 11, 12 Message authentication and Hash functions Chapter 13, 14 Digital signatures and authentication protocols Revised 10/02 3 of 5

10 Chapter 16 Web security Project 2 11 Chapter 17 Transport layer security 12 Chapter 18 IP security 13 Intrusion detection systems 14 Firewalls 15 Project presentations Presentation GradingPolicy GRADABLE Percentage Projects 40% Labs 15% Quizzes 5% Midterm 15% Final Exam 25% Total 100% Letter Grade Percentage Letter Grade Percentage A 90 to 100% A- 87 to 89.9% B+ 83 to 86.9% B 80 to 82.9% B- 77 to 79.9% C+ 73 to 76.9% C 70 to 72.9% C- 67 to 69.9% D+ 63 to 66.9% D 60 to 62.9% D- 50 to 60% F Less than 50% Attendance and participation: Class participation is very important and will be based on class attendance, punctuality, ability to contribute in class discussions, answer questions and coming prepared to class with assigned readings. All students are expected to prepare for and participate in all of classes except absences for university-sponsored events,absences caused by medical reasons in which cases, doctor s notes are required, or absences by family emergencies which will be determined on case-by-case basis. Absence for University-Sponsored Events: Revised 10/02 4 of 5

University policy adopted by Faculty Senate and the Whitewater Student Government states that students will not be academically penalized for missing class in order to participate in university-sanctioned events. They will be provided an opportunity to make up any work that is missed; and if class attendance is a requirement, missing a class in order to participate in a university-sanctioned event will not be counted as an absence. A university-sanctioned event is defined to be any intercollegiate athletic contest or other such event as determined by the Provost. Activity sponsors are responsible for obtaining the Provost s prior approval of an event as being university-sanctioned and for providing an official list of participants. Students are responsible for notifying their instructors in advance of their participation in such events. Technology requirement 1. Java SDK and Eclipse 2. Wireshark for packet capturing and analysis Revised 10/02 5 of 5