Computer Security

 

Course Name

Computer Security

Course Code

PD – IT – E4

Number of Contact Hours

45 hours

Credit Hours

3 Credit Hour

Duration and Frequency

  • 15 sessions 
  • Each session = 3 hours
  • Frequency: daily Monday to Friday
  • Duration: 3 weeks

Mode of Delivery

  • Online/ On Campus/ Hybrid 

Category

Professional Development – 

E – Information Technology in Business

COURSE DESCRIPTION 

This course covers fundamental issues and first principles of security and information assurance. The course will look at the security policies, models and mechanisms related to confidentiality, integrity, authentication, identification, and availability issues related to information and information systems. Other topics covered include basics of cryptography (e.g., digital signatures) and network security (e.g., intrusion detection and prevention), risk management, security assurance and secure design principles, as well as e-commerce security. Issues such as organizational security policy, legal and ethical issues in security, standards and methodologies for security evaluation and certification will also be covered.

 

COURSE LEARNING OUTCOMES (CLOs)

On completion of this course, students are expected to be able to understand and be able to perform basic, practical applications in:

  1. Computer security concepts and cryptographic Tools
  2. User authentication, access control, database and data center security
  3. Malicious software and respond to denial-of-s
  4. Firewalls and intrusion detection systems
  5. Software security and operating system security

Course Outline:

Basics of computer security

  • Overview
  • o Definition of terms
  • Security goals
  • Shortcomings
  • Attack and defense

 

Encryption and cryptography

  • Ciphers and codes
  • Public key algorithms
  • Key distribution
  • Digital signatures
  • Pretty good privacy

 

Authentication and key exchange protocols

  • Directory authentication service
  • Diffie-Hellm key exchange
  • Kerberos
  • Software security
  • Malicious code
  • Worms
  • Intruders
  • Error detection and correction
  • OS protection policies

 

Trusted systems

  • Memory protection
  • Access control matrix
  • User authentication
  • Security models
  • Disaster recovery

 

Database security

  • Integrity constraints
  • Multi phase commit protocols

 

Network security

  • Threats in networks
  • Privacy enhanced email
  • DS authentication

 

Web and electronic commerce

  • Threats on the web
  • Secure socket layer
  • Client-side certificates
  • Applet security model

 

Security policy: case study

  • Unix
  • Windows NT
  • Browsers and Java/scripts

Course Textbook

Computer Security: Principles and Practice, 4th Edition

William Stallings

Lawrie Brown

Link: https://www.pearson.com/us/higher-education/program/Stallings-Computer-Security-Principles-and-Practice-4th-Edition/PGM1805260.html

 

Feedback Given to Participants in Response to Assessed Work 

  • Individual written feedback on coursework
  • Feedback discussed as part of a tutorial
  • Individual feedback on request
  • Model answers 

 

Developmental Feedback Generated Through Teaching Activities

  • Feedback is given at presentations and during tutorial sessions
  • Dialogue between participants and staff in tutorials and lectures

 

GRADING AND SCORING 

The course grade will be based on a final project presented by the participant and graded by the instructor. Participants much achieve a passing grade of 70% or more to be awarded a certificate of completion of the course.