0% found this document useful (0 votes)
79 views3 pages

AU Security Course Outline

This document outlines the course objectives, expected learning outcomes, description, and evaluation for a graduate-level "Computer and Network Security" course. The course aims to provide fundamental concepts in computer security, threats, principles of secure design, and state-of-the-art techniques. It will cover topics like cryptography, public key infrastructure, network security, operating systems security, firewalls, web security, and wireless/mobile security. Students will be evaluated through quizzes, exams, exercises, presentations, and a project.

Uploaded by

samuel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
79 views3 pages

AU Security Course Outline

This document outlines the course objectives, expected learning outcomes, description, and evaluation for a graduate-level "Computer and Network Security" course. The course aims to provide fundamental concepts in computer security, threats, principles of secure design, and state-of-the-art techniques. It will cover topics like cryptography, public key infrastructure, network security, operating systems security, firewalls, web security, and wireless/mobile security. Students will be evaluated through quizzes, exams, exercises, presentations, and a project.

Uploaded by

samuel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Ambo University

Institute of Technology
Department of Computer Science
Graduate Program in Computer Science

Instructor: Dr. Henock Mulugeta


Course name: Computer and Network Security
Course code:
Course objectives:
o Provide fundamental concepts in computer systems security
o Enable students to understand threats to security of computer systems
o Introduce students to the principles of secure system design
o Introduce students to the fundamentals of cryptography
o Introduce students to the security issues and defense techniques in operating systems,
networks, web applications, and mobile devices
o Introduce students to the state-of-the-art techniques for vulnerability analysis,
prevention, and defense

Course Expected Learning Outcomes:


After successful completion of the course the student is expected to have knowledge and understanding
that help to:
o Possess solid understanding of principles and practices of computer systems security
o Be able to recognize, explain, and act-on threats to confidentiality, integrity, and
availability of a computer system
o Apply formalisms and technologies to defend computer systems from security threats
o Be familiar with security issues and defense mechanisms in operating systems,
networks, web applications, and mobile devices
o Be conversant with automated analysis of security threats, design and implementation
of countermeasures

Course description
1. Security fundamentals
 What is security?
 Why security?
 Security trends
 Security requirements
 Security attack types
 Security service and mechanisms
 Security model
 Goals in security
2. Fundamentals of Cryptography
 Basic Security techniques
 Cryptography
 Symmetric and asymmetric encryption
 Cryptanalytic Attacks
 Block vs Stream Ciphers
 Substitution-Permutation Ciphers
 Cryptographic Algorithms
 Symmetric Block Cipher Algorithms
- DES (Data Encryption Standard), Double DES, Triple DES
- AES (Reading assignment)
3. Public key cryptography, Digital signature, and Certificates
 Private and public keys
 Public key cryptography classifications
 RSA public key cryptography
 Diffie -Hellman key exchange algorithm
 Digital signature
- Using public key
- Using hash algorithms/message digest
 Digital certificates
- Distribution of public key
- Certificate Authority and PKI
- Direct key exchange protocols

4. Network Security
 Security issues in protocols
 Network services
 Types of attacks on TCP/IP protocols
 IPSEC
- Architecture, applications, implementation
 Transport and application layer attacks and countermeasures

5. Operating Systems Security


 Memory attacks and protection
 Users management
 Enforcement of security
 Security evaluation
 Trusted devices
 Digital rights management

6. Firewall and Proxy Server


 Relationship between Proxy Server and Firewall
 Types of Firewalls
 Packet Filtering Firewalls
 Application level gateway
 Circuit level gateway
 Firewall configuration/topology
 Proxy server
 How Proxy Servers Work
 Proxy Servers and Packet Filters
 Goals of Proxy Servers
7. Web Security
 Web fundamentals
 Browser security models
 Vulnerabilities
 Prevention and defense

8. Wireless and Mobile Security


 Wireless and mobile security model
 Vulnerabilities
 Prevention and defense

9. Kerberos and Intrusion Detection System (optional)

EVALUATION
- Quiz
- Mid and Final exams
- Practical exercise
- Seminar presentation
- Project

You might also like