0% found this document useful (0 votes)
25 views5 pages

Security Course Outline

The document outlines a course on Computer Security and Privacy, covering topics such as security threats, cryptography, network security, and security evaluation. It includes a structured course outline with sections on security mechanisms, policies, and references for further reading. Evaluation methods for the course consist of a mid exam, final exam, and assignments.

Uploaded by

benti
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views5 pages

Security Course Outline

The document outlines a course on Computer Security and Privacy, covering topics such as security threats, cryptography, network security, and security evaluation. It includes a structured course outline with sections on security mechanisms, policies, and references for further reading. Evaluation methods for the course consist of a mid exam, final exam, and assignments.

Uploaded by

benti
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Course Outline

1. Introduction to Computer Security and Privacy


1.1 Overview
1.2 Brief History of Computer Security and Privacy
1.3 Computer Security Controls
1.4 Physical Security

2. Computer Security Threats and Attacks


2.1 Threats and Attacks
2.2 Malware Attack
2.3 Internet Fraud

1
3. Cryptography and Encryption Techniques
3.1 Introduction
3.2 Symmetric Cryptosystems
3.3 Asymmetric Cryptosystems
3.4 Concluding Remarks about Encryption Mid Exam

4. Network Security Concepts and Mechanisms


4.1 Introduction
4.2 What is Network Security?
4.3 Network Protocols and Vulnerabilities
4.4 Web Security
4.5 Application Layer Security
4.6 E-mail Security
2
5. Security Mechanisms and Techniques
5.1 Introduction
5.2 Access Control
5.3 Authentication
5.4 Firewall
5.5 Intrusion Detection/Prevention
6. Information Security Policies and Procedures
6.1 Information Security Policy
6.2 Legal Issues and Information Security
For your
7. Security Evaluation Reading
7.1 Introduction
7.2 Security Assessment Components
7.3 Methods for Security Evaluation
3
References
1. William Stallings, Network Security Essentials, Pearson,
5th edition, 2014.
2. William Stallings, Cryptography and Network Security
Principles and Practice, Prentice Hall, 5th edition, 2011.
[Soft Copy, 4th Edition]
3. Chuck Easttom, Computer Security Fundamentals,
Prentice Hall, 2nd edition, 2012. [Soft Copy]
4. Matt Bishop, Introduction to Computer Security, Addison
Wesley, 2005. [Soft Copy]
5. Michael Erbschloe, Physical Security for IT, Elsevier, 1st
edition, 2005.
6. D. Russel and G. Gangemi, Computer Security Basics,
O'Reilly Media, 2nd edition, 2006.
7. Security Complete, BPB Publications.
8. Information Security Policies and Procedures, Thomas R.
Peltier.
4
Mode of Delivery
 Lectures - preferably interactive (ask questions, intervene in
discussions)

Evaluation
 Mid Exam
 Final Exam
 Assignments

You might also like