Data Security

  • Computer Engineering |

Description

Goals of data security ? classical encryption techniques ? encryption standards ? Internet security issues: (e-mail ? e-commerce ? firewall).

Program

Bachelor Degree in Computer Engineering

Objectives

  • This is an introductory course on the methods, algorithms, techniques, and tools of data security and cryptography. After studying the theoretical aspects of cryptographic algorithms and protocols, we show how these techniques can be integrated to solve particular data and communication security problems. This course material is of use to computer and communication engineers who are interested in embedding security into an information system, and thus, providing integrity, confidentiality, and authenticity of the documents and the communicating parties.

Textbook

Data will be available soon!

Course Content

content serial Description
1Week Number 1 : Goals of data & information security and Threats -Types of Attacks.
2Week Number 2 : Classical Encryption Techniques.
3Week Number 3 : Playfair Cipher and Hill Cipher.
4Week Number 4 : Polyalphabetic Cipher and Transposition techniques.
5Week Number 5 : Block Cipher & DES:-Simplified DES.
6Week Number 6 : Block cipher design principles and Block cipher modes of operation.
7Week Number 7 : 7th Week Exam.
8Week Number 8 : Advanced encryption standard: Evaluation criteria for AES.
9Week Number 9 : Electronic mail Security Threats.
10Week Number 10 : Message authentication Techniques.
11Week Number 11 : Pretty good privacy(PGP) message generation.
12Week Number 12 : 12th Week Exam.
13Week Number 13 : Firewall design principles.
14Week Number 14 : Trusted systems.
15Week Number 15 : Security Aspects and Intruders.
16Week Number 16 : Final exam
1Week Number 1 : Goals of data & information security and Threats -Types of Attacks.
2Week Number 2 : Classical Encryption Techniques.
3Week Number 3 : Playfair Cipher and Hill Cipher.
4Week Number 4 : Polyalphabetic Cipher and Transposition techniques.
5Week Number 5 : Block Cipher & DES:-Simplified DES.
6Week Number 6 : Block cipher design principles and Block cipher modes of operation.
7Week Number 7 : 7th Week Exam.
8Week Number 8 : Advanced encryption standard: Evaluation criteria for AES.
9Week Number 9 : Electronic mail Security Threats.
10Week Number 10 : Message authentication Techniques.
11Week Number 11 : Pretty good privacy(PGP) message generation.
12Week Number 12 : 12th Week Exam.
13Week Number 13 : Firewall design principles.
14Week Number 14 : Trusted systems.
15Week Number 15 : Security Aspects and Intruders.
16Week Number 16 : Final exam
1Week Number 1 : Goals of data & information security and Threats -Types of Attacks.
2Week Number 2 : Classical Encryption Techniques.
3Week Number 3 : Playfair Cipher and Hill Cipher.
4Week Number 4 : Polyalphabetic Cipher and Transposition techniques.
5Week Number 5 : Block Cipher & DES:-Simplified DES.
6Week Number 6 : Block cipher design principles and Block cipher modes of operation.
7Week Number 7 : 7th Week Exam.
8Week Number 8 : Advanced encryption standard: Evaluation criteria for AES.
9Week Number 9 : Electronic mail Security Threats.
10Week Number 10 : Message authentication Techniques.
11Week Number 11 : Pretty good privacy(PGP) message generation.
12Week Number 12 : 12th Week Exam.
13Week Number 13 : Firewall design principles.
14Week Number 14 : Trusted systems.
15Week Number 15 : Security Aspects and Intruders.
16Week Number 16 : Final exam
1Week Number 1 : Goals of data & information security and Threats -Types of Attacks.
2Week Number 2 : Classical Encryption Techniques.
3Week Number 3 : Playfair Cipher and Hill Cipher.
4Week Number 4 : Polyalphabetic Cipher and Transposition techniques.
5Week Number 5 : Block Cipher & DES:-Simplified DES.
6Week Number 6 : Block cipher design principles and Block cipher modes of operation.
7Week Number 7 : 7th Week Exam.
8Week Number 8 : Advanced encryption standard: Evaluation criteria for AES.
9Week Number 9 : Electronic mail Security Threats.
10Week Number 10 : Message authentication Techniques.
11Week Number 11 : Pretty good privacy(PGP) message generation.
12Week Number 12 : 12th Week Exam.
13Week Number 13 : Firewall design principles.
14Week Number 14 : Trusted systems.
15Week Number 15 : Security Aspects and Intruders.
16Week Number 16 : Final exam

Markets and Career

  • Generation, transmission, distribution and utilization of electrical power for public and private sectors to secure both continuous and emergency demands.
  • Electrical power feeding for civil and military marine and aviation utilities.
  • Electrical works in construction engineering.

Start your application

Start The your journey to your new career.