Computer Security


Course Name

Computer Security

Course Code

PD – IT – E4

Number of Contact Hours

45 hours

Credit Hours

3 Credit Hour

Duration and Frequency

  • 15 sessions 
  • Each session = 3 hours
  • Frequency: daily Monday to Friday
  • Duration: 3 weeks

Mode of Delivery

  • Online/ On Campus/ Hybrid 


Professional Development – 

E – Information Technology in Business


This course covers fundamental issues and first principles of security and information assurance. The course will look at the security policies, models and mechanisms related to confidentiality, integrity, authentication, identification, and availability issues related to information and information systems. Other topics covered include basics of cryptography (e.g., digital signatures) and network security (e.g., intrusion detection and prevention), risk management, security assurance and secure design principles, as well as e-commerce security. Issues such as organizational security policy, legal and ethical issues in security, standards and methodologies for security evaluation and certification will also be covered.



On completion of this course, students are expected to be able to understand and be able to perform basic, practical applications in:

  1. Computer security concepts and cryptographic Tools
  2. User authentication, access control, database and data center security
  3. Malicious software and respond to denial-of-s
  4. Firewalls and intrusion detection systems
  5. Software security and operating system security

Course Outline:

Basics of computer security

  • Overview
  • o Definition of terms
  • Security goals
  • Shortcomings
  • Attack and defense


Encryption and cryptography

  • Ciphers and codes
  • Public key algorithms
  • Key distribution
  • Digital signatures
  • Pretty good privacy


Authentication and key exchange protocols

  • Directory authentication service
  • Diffie-Hellm key exchange
  • Kerberos
  • Software security
  • Malicious code
  • Worms
  • Intruders
  • Error detection and correction
  • OS protection policies


Trusted systems

  • Memory protection
  • Access control matrix
  • User authentication
  • Security models
  • Disaster recovery


Database security

  • Integrity constraints
  • Multi phase commit protocols


Network security

  • Threats in networks
  • Privacy enhanced email
  • DS authentication


Web and electronic commerce

  • Threats on the web
  • Secure socket layer
  • Client-side certificates
  • Applet security model


Security policy: case study

  • Unix
  • Windows NT
  • Browsers and Java/scripts

Course Textbook

Computer Security: Principles and Practice, 4th Edition

William Stallings

Lawrie Brown



Feedback Given to Participants in Response to Assessed Work 

  • Individual written feedback on coursework
  • Feedback discussed as part of a tutorial
  • Individual feedback on request
  • Model answers 


Developmental Feedback Generated Through Teaching Activities

  • Feedback is given at presentations and during tutorial sessions
  • Dialogue between participants and staff in tutorials and lectures



The course grade will be based on a final project presented by the participant and graded by the instructor. Participants much achieve a passing grade of 70% or more to be awarded a certificate of completion of the course.