Information Security Course Specifications2011-2012



Similar documents
Network Security Course Specifications

Information Systems for Business Management INF612

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

(IŞIK - IT201) 1 / 6 COURSE PROFILE. Theory+PS+Lab (hour/week) Local Credits. Course Name Code Semester Term ECTS

University of Wisconsin-Whitewater Curriculum Proposal Form #3 New Course

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

Data Encryption and Network Security

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals

Computer and Network Security PG Unit Outline School of Information Sciences and Engineering

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Weighted Total Mark. Weighted Exam Mark

Course Syllabus. Course code: Academic Staff Specifics. Office Number and Location

Network Security SWISS GERMAN UNIVERSITY. Administration Charles Lim

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

Information, Network & Cyber Security

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

CS 450/650 Fundamentals of Integrated Computer Security

CS 464/564 Networked Systems Security SYLLABUS

Curran, K. Tutorials. Independent study (including assessment) N/A

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

e-code Academy Information Security Diploma Training Discerption

CSUS COLLEGE OF ENGINEERING AND COMPUTER SCIENCE Department of Computer Science (RVR 3018; /6834)

CRYPTOG NETWORK SECURITY

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

City University of Hong Kong. Information on a Course offered by Department of Computer Science with effect from Semester A in 2014 / 2015

CNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan

Network Security Essentials:

Course Design Document. IS403: Advanced Information Security and Trust

GUJARAT TECHNOLOGICAL UNIVERSITY, AHMEDABAD, GUJARAT COURSE CURRICULUM COURSE TITLE: ESSENTIALS OF NETWORK SECURITY (COURSE CODE: )

Tele3119 Trusted Networks Course Outline 2013

CIS 253. Network Security

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics

Cryptography and network security CNET4523

CPSC 467: Cryptography and Computer Security

Information Security

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline

CSCI 4541/6541: NETWORK SECURITY

CRYPTOGRAPHY AND NETWORK SECURITY

MS Information Security (MSIS)

NETWORK ADMINISTRATION AND SECURITY

Certificate in Cyber Security

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

Course Specification

Lecture 1 - Overview

(Instructor-led; 3 Days)

Common Syllabus Revised

SE 4472a / ECE 9064a: Information Security

A Technical Template for HIPAA Security Compliance

course specifications

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Council for Accreditation of Counseling and Related Educational Programs (CACREP) and The IDEA Student Ratings of Instruction System

TCOM 562 Network Security Fundamentals

Introduction to Cyber Security / Information Security

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

CCNA Security 2.0 Scope and Sequence

Computer Network Engineering

Content Teaching Academy at James Madison University

Computer Engineering ECSE-322B

Programme Specification and Curriculum Map for MSc Computer and Network Security

Evaluate the Usability of Security Audits in Electronic Commerce

Syllabus. No: CIS 200. Title: Fundamentals of Network Security. Credits: 4. Coordinator: Dr. B. Dike-Anyiam, Computer Science & Networking Lecturer

HIPAA and Network Security Curriculum

Intended Learning Outcomes (ILOs): Successful completion of the course should lead to the following outcomes:

Central Agency for Information Technology

Computer Security (EDA263 / DIT 641)

How To Teach Health Nursing

90% of data breaches are caused by software vulnerabilities.

BMC s Security Strategy for ITSM in the SaaS Environment

HOWARD. UNIVERSITY School of Business

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

Netzwerksicherheit [NetSec] Systemsicherheit [SysSec]

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.

3- Intended Learning Outcomes (ILOs): A- Knowledge and understandings: B- Intellectual Skills: C- Professional Skills: 1-Course data

LOUGHBOROUGH UNIVERSITY

Course Outline Computing Science Department Faculty of Science. COMP Credits Computer Network Security (3,1,0) Fall 2015

BSc (Hons) Sofware Engineering. Examinations for / Semester 2

City University of Hong Kong. Information on a Course offered by Department of Information Systems with effect from Semester B in 2013 / 2014

Guidelines for Establishment of Contract Areas Computer Science Department

Transcription:

Assiut University Faculty of Computers & Information Information Systems Department Quality Assurance Unit Information Security Course Specifications2011-2012 Relevant program Department offers the program Department offers the course Academic year Date of specification approval B.Sc. in Computers and Information (Information Systems). Information Systems Information Systems 4th Year 24/9/2012 A. Basic Information 1. Course Title: Information Security 2. Course Code: INF423 3. Course hours per week: Lecture Tutorial / Practical Total 3 2 5 B. Professional Information 1. Overall aims of the course Upon completing this course the student will have learned, through appropriate classroom and laboratory experiences, the following. Understanding the principles and fundamentals of information and network security with emphasis on: Basic concepts of information and computer network security; classical encryption techniques; modern symmetric encryption techniques; public-key encryption; system and network security tools and network security practice. Comprehensive knowledge, skills and attitudes appropriate for careers in information security. Understanding the organization s policies and processes, thereby reducing the organization s liability due to security failures. The latest advantages of information security. IS Program 4 th Year (2 nd Semester) Page 8-1

2. Intended Learning Outcomes (ILOs) of the course a. Knowledge and Understanding On successful completion of the program, graduates should be able to: a1. Identify contemporary issues in information security. a2. Define information security risks. a3. Define the three aspects of information security: services, mechanisms and attacks. a4. Describe cipher principles. a5. Discuss the cryptographic systems. a6. Describe the basic operations and applications of firewalls, Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS). a7. Discuss the Malicious Software and Antivirus Approaches. a8. Identify the policy and technology trade-offs involved in developing information security systems of adequate quality. b. Intellectual Skills b1. Evaluate classical techniques of information security. b2. Evaluate cryptographic systems algorithms. b3. Identify the impact of different security breaches on Information security. b4. Explain the guidelines and procedures of Information security investigations. b5. Perform comparisons between (methods, techniques...etc) related to information security. b6. Identify countermeasures and review techniques appropriate to the management of information security risks. c. Professional and Practical Skills c1. Institute Information security program management. c2. Perform contingency and disaster planning. c3. Use appropriate programming languages. c4. Implement cryptographic systems algorithms. c5. Implement different ciphers on Software. d. General and Transferable Skills d1. Work in stressful environment and within constraints. d2. Communicate effectively. d3. Demonstrate efficient IT capabilities. d4. Lead and motivate individuals. d5. Manage tasks and resources. IS Program 4 th Year (2 nd Semester) Page 8-2

3. Contents No Topic taught 1 Introduction to Information Security. Identification and authentication, authorization rules. 2 Data classification. Different encryption and decryption techniques, different types of ciphers, characteristics of good ciphers, crypt analysis, public key system, single key system and data encryption standards. 3 Threats, safeguards and security objectives, security with some existing systems, security levels. 4 Computer virus protection, privacy and data protection, designing of secure system, models of security, database security, reliability and integrity, sensitive data. 5 Multi- level data security, protection of files, copy protection. No. of hours Lecture Tut/Prac ILOs 6 4 a1-a3, b1, b4-b6, d1- d5 12 8 a1, a2, a4, a5, b1, b2, b5, b6, c2-c4, d1-d5 6 4 a1-a3, a6, b3, b5, b6, c2-c4, d1-d5 12 8 a1, a2, a6-a8, b1, b3- b6, c1, d1-d5 6 4 a1, a2, a8, b5, b6, c1, d1-d5 4. Teaching and Learning Methods 4a. Lectures 4b. Tutorial Exercises 4c. Practical Exercises 5. Student Assessment 5a. Tools Final Exam Mid-Term Exam Class Work 5b. Time Schedule Assessment Week No Final Exam 16 Mid-Term Exam 8 To measure knowledge, understanding, intellectual and professional skills. To measure following up and understanding the studied topics To measure the participation of the student during the tutorial, professional and general skills. IS Program 4 th Year (2 nd Semester) Page 8-3

5c. Grading System The students points are calculated through the following point distribution. Assessment Grade % Final Exam 70% Mid-Term Exam 20% Class Work 10% Then, the passing and failing grades are evaluated from the student achievement point X based on the following table. Very Poor Poor Pass Good Very Good Distinguished 0% X < 30% 30% X < 50% 50% X < 65% 65% X < 75% 75% X < 85% 85% X 100% 5d. Formative Assessment Regular quizzes distributed along the whole semester. 6. List of References 6a. Course Notes o Short course notes available at doctor s office. 6b. Required Books (Textbooks) o Stallings, William. "Cryptography and network security: principles and practices", Fourth edition, Prentice-Hall, Inc, 2005 6c. Recommended Books o Arthur E. Hutt, Douglas B. Hoyt, Seymour Bosworth. "Computer Security Handbook", third edition, John Wiley & Sons, Inc, 1995. o Rick Lehtinen. "Computer Security Basics", second edition, O'Reilly Media, Inc, 2006. 7. Facilities Required for Teaching and Learning A lecture hall is equipped with a projector and a computer. Tutorial rooms are equipped with projectors and computers. A library. Course Coordinator: Prof. Dr. Yousef B. Mahdy Signature: Date: 24/9/2012 Department Head: Dr. Taysir H. Abdel-Hamid Signature: Date: 24/9/2012 IS Program 4 th Year (2 nd Semester) Page 8-4

Criteria Oral Exam Class Work Practical Exam Mid-Term Exam Final Exam Data Collections Case Study Projects Workshops Practical Exercises Tutorial Exercises Lectures Teaching Weeks Student evaluation, course file, exam results Course Name Information Security Course Matrix ILOs Course Code INF423 Teaching and Learning Methods Assessment Tools Course Aims Course Content a s b s c s d s Understanding the principles and fundamentals of information and network security with emphasis on: Basic concepts of information and computer network security; classical encryption techniques; modern symmetric encryption techniques; public-key encryption; system and network security tools and network security practice. Comprehensive knowledge, skills and attitudes appropriate for careers in information security. Understanding the organization s policies and processes, thereby reducing the organization s liability due to security failures. The latest advantages of information security. Introduction to Information Security. Identification and authentication, authorization rules. Data classification. Different encryption and decryption techniques, different types of ciphers, characteristics of good ciphers, crypt analysis, public key system, single key system and data encryption standards. Threats, safeguards and security objectives, security with some existing systems, security levels. Computer virus protection, privacy and data protection, designing of secure system, models of security, database security, reliability and integrity, sensitive data. Multi- level data security, protection of files, copy protection. 1-2 1-3 1, 4-6 1-5 3-6 1, 2, 4, 5 7-8 1-3, 6 8-11 1, 2, 6-8 1, 2, 5, 6 3, 5, 6, 2-4 1-5 2-4 1-5 1, 3-6 1 1-5 12-14 1, 2, 8 5, 6 1 1-5 Course Coordinator Prof. Dr. Yousef B. Mahdy Signature Department Head Dr. Taysir H. Soliman Signature IS Program 4 th Year (2 nd Semester) Page 8-5