0% found this document useful (0 votes)
92 views5 pages

4205-Comuter Systems Security Course Outline

This document provides details about the course "Computer Systems Security" offered at Adama Science and Technology University. The 3-credit, semester-long course covers fundamental computer security concepts like confidentiality, integrity, authentication and issues related to securing information systems. Topics include cryptography, network security, risk management, security standards and legal/ethical issues. The course aims to explain security principles and how attacks impact infrastructure. Students will learn to apply security responses and define standards implementation in public/private sectors. It will be taught through lectures, tutorials and self-study, and assessed via assignments, quizzes, exams and a lab report. A computer lab is required.

Uploaded by

Michael Zewdie
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
92 views5 pages

4205-Comuter Systems Security Course Outline

This document provides details about the course "Computer Systems Security" offered at Adama Science and Technology University. The 3-credit, semester-long course covers fundamental computer security concepts like confidentiality, integrity, authentication and issues related to securing information systems. Topics include cryptography, network security, risk management, security standards and legal/ethical issues. The course aims to explain security principles and how attacks impact infrastructure. Students will learn to apply security responses and define standards implementation in public/private sectors. It will be taught through lectures, tutorials and self-study, and assessed via assignments, quizzes, exams and a lab report. A computer lab is required.

Uploaded by

Michael Zewdie
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Adama Science and Technology University

1 School: Electrical Engineering and Department: Computer Science &


Computing Engineering
2 Course Core Module
Category
Course Name Computer Systems Security
Course Code: CSEg4205
3 Synopsis: This course covers fundamental issues and first principles of security
and information assurance. The course will look at the security policies,
models and mechanisms related to confidentiality, integrity,
authentication, identification, and availability issues related to
information and information systems. Other topics covered include
basics of cryptography (e.g., digital signatures) and network security
(e.g., intrusion detection and prevention), risk management, security
assurance and secure design principles, as well as e-commerce security.
Issues such as organizational security policy, legal and ethical issues in
security, standards and methodologies for security evaluation and
certification will also be covered.
4 Name(s) of Abubeker Y., Hundaol Bedada, Hibrezemed Mengistu and Gemechu
Academic Tadele
Staff:
5 Semester and Semester: I Year 4

Year offered: :
6 Credit Hour: 3

7 Prerequisite/ None
Co-requisite: (if
any)
8 Course Learning Outcome ( CLO): At the end of the course the student will be able to do:

CLO Explain the fundamentals concepts of computer security apply to different


1 components of computing systems.
CLO Identify the basic cryptographic techniques using existing software in maintain
2 information security.
CLO Describe how malicious attacks, threats, and protocols for security vulnerabilities
3 impact a systems infrastructure.
CLO Describe the importance of network principles and architecture to security
4 operations.
CLO Define how to apply standard responses in the case spyware and malware is
5 occurs.
CLO Describe information security standards, compliance laws, and security policy to
6 real-world implementation in both the private and public sector
9 Mapping of the course Learning Outcomes to the program Learning Outcomes, Teaching
Methods and Assessment:
Program Learning Outcomes (PO)
Learning

Assessment
Outcomes (CLO)

Teaching
PO10
PO11
PO12

Assignment
PO1
PO2
PO3
PO4
PO5
PO6
PO7
PO8
PO9

Methods
Course

Project
L T P O

Final
Test
Mid
CL √ √  
O1
CL √ √ √ √  √ 
O2
CL √ √  
O3
CL √ √ √ √ √ 
O4
CL √ √ √ √ 
O5
CL √ √ √ √ 
O6
Indicate the relevancy between the CLO and PO by ticking “√”on the appropriate relevant
box
1 Transferable Skills (if applicable)
0 (Skills learned in the course of study which can be useful and utilized in other settings)
1 Create secure software applications using object-oriented, structured, scripting and
low-level programming techniques and software engineering methodologies, which
pertain to development, testing and documentation activities.

1 Distribution of Student Learning Time (SLT)


1 Teaching and Learning Activities Total (SLT)
C
Course Content Outline L Guided learning Guided Independ
O (F2F) Learni ent
ng Learning
(NF2F)

(NF2F)
L T P O
Chapter 1: Introduction to 1 √ √ √ 15hrs
Security Concepts
1.1. Networking Vs Security
1.2. Network protocols and
TCP/IP
1.3. Different Attacks
1.4. Malicious Software
1.5. Basic security terms
1.6. Authentication
Mechanisms
Chapter 2: Basics of 2 √ √ √ 25hrs
Cryptography

2.1. Classic crypto techniques


2.2. Ideas of Confusion and
Diffusion
2.3. Asymmetric ( public key)
crypto
2.4. Symmetric crypto

2.5. Hash functions

2.6. Digital signatures

Chapter 3: Infrastructure 4 √ √ √ 15hrs


Security
3.1. Security concerns of
different types of devices
3.2.Network Monitoring /
Diagnostics tools
3.3.Security concerns of
different types of media
3.4. Storage Media

3.5. Intrusion detection


mechanisms
3.6.Security Baselines

Chapter 4: Managing 2 √ √ √ 18hrs


&
Communication and
4
Network Security
4.1. Remote access
technologies:
4.2. IPSEC (Internet Protocol
Security)
4.3. Email security concepts
4.4. How PGP and S/MIME
works:
4.5. SSL (Secure Sockets
Layer)
4.6. TLS (Transport Layer
Security)
4.7. HTTP/S
4.8.Directory Security Concepts:

Chapter 5: Security Policies 2 √ √ √ 10hrs


&
6
Total 83hrs
Assessment
Continuous Percentage F2F NF2F SLT
Assessment Total-60(%)
1 Assignments Assignment I 1 5 6hrs
(10%)
2 Quiz Quiz (10%) 1 1hr
3 Lab-report 10% 2 5 7hrs
4 Others Mid Exam (30%) 2 8 10hrs
Total 24hrs
Final Exam Percentage 50 (%) F2F NF2F SLT
Final Exam 40% 3 10 13hrs
Grand Total SLT 120hrs
L = Lecture, T = Tutorial, P = Practical, O = Others, F2F = Face to Face, NF2F = Non
Face to Face
Note: indicates the CLO based on the CLO’s numbering in item 9.
1 Special requirements and Computer Lab
2 resources to deliver the course
(e.g. software, computer lab,
simulation room …etc.)

1 Text book and 1 Computer Security Fundamentals: Computer Security


3 reference: Fundamentals, 2/Edition, William (Chuck) Easttom, II. (2012,
Pearson Education Company), ISBN-13:9780789748904

You might also like