IS Security

  • Information Systems |
  • English

Description

The course is an introduction to computer and network security. The course encompasses the study of security mechanisms for secrecy, integrity, and availability. Topics include basic cryptography and its applications, security in computer networks and distributed systems and control and prevention of viruses and other rogue programs. In addition, hands-on experience will be provided through a series of programming assignments.

Program

IS -132 CRs

Objectives

  • 1. Identify threats and security attacks to computer systems. 2. Master symmetric and asymmetric cryptography techniques. 3. Experiment with symmetric and asymmetric key distribution protocols. 4. Experiment with message authentication mechanisms 5. Experiment with system security

Textbook

W. Stallings, Cryptography and Network Security, Principles and Practices, Prentice Hall.

Course Content

content serial Description
1Course Introduction
2Classical Encryption Techniques
3Data Encryption Standard (DES)
4Block cipher design principles/modes of operation and Triple DES (3DES)
5Introduction to Number Theory
6Public Key cryptography
7Public Key cryptography (cont)
8Key Distribution for Symmetric Encryption
9Key Distribution for Asymmetric Encryption
10Key Distribution for Asymmetric Encryption (cont.)
11Message Authentication
12Message Authentication (cont)
13Digital signatures
14Firewalls
15Intrusion Detection

Markets and Career

  • Generation, transmission, distribution and utilization of electrical power for public and private sectors to secure both continuous and emergency demands.
  • Electrical power feeding for civil and military marine and aviation utilities.
  • Electrical works in construction engineering.

Start your application

Start The your journey to your new career.