Computer System Security Course Syllabus
Computer System Security Course Syllabus
1
SCHOOL: Electrical Engineering and Computing DEPARTMENT: Computer Science & Engineering
2 Course Category: Core Module
This course covers fundamental issues and first principles of security and information
assurance. The course will look at the security policies, models and mechanisms related
confidentiality, integrity, authentication, identification, and availability issues related
information and information systems. Other topics covered include basics of cryptography
(e.g., digital signatures) and network security (e.g., intrusion detection and prevention),
management, security assurance and secure design principles, as well as e-commerce
security. Issues such as organizational security policy, legal and ethical issues in secure
standards and methodologies for security evaluation and certification will also be covered.
4 Academic and
Semester Staff:
Year
5 offered: Semester: I Year: 4
6 Credit Hour: 3 Lect: 2 Lab: 3 Tutor: 0
7 Prerequisite / Co-
requisite: (if any)
None
8
Course Learning Outcome (CLO): At the end of the course the student will be able to:
CLO-1 Explain the fundamentals concepts of computer security apply to different components of computing systems.
CLO-2 Identify the basic cryptographic techniques using existing software in maintain information security.
Describe how malicious attacks, threats, and protocols for security vulnerabilities impact a systems
CLO-3 infrastructure.
CLO-4 Describe the importance of network principles and architecture to security operations.
CLO-5 Define how to apply standard responses in the case spyware and malware is occurs.
Define information security standard, compliance laws, and security policy to real-world implementation in
CLO-6 ofboth
Mapping the Learning
Course private and public sector
Outcomes (CLOs) to the Student Learning Outcomes (Sos), Teaching Methods and
9 Assessment
Student Learning Outcomes (SOs) Teaching Methods Assessment
Course Learning
Assignment
Outcomes
Final Exam
Mid Exam
Lab/Tut
Project
(CLOs)
SO-1
SO-2
SO-3
SO-4
SO-5
SO-6
SO-7
SO-8
SO-9
Quiz
Test
PBL
Lec
GD
CLO-1 √ √ √ √
CLO-2 √ √ √ √ √ √ √ √
CLO-3 √ √ √ √
CLO-4 √ √ √
CLO-5 √ √ √
CLO-6 √ √ √ √
Indicate the relevancy between the CLO and PO by ticking “√”on the appropriate relevant box
10 Transferable Skills (if applicable)
(Skills learned in the course of study which can be useful and utilized in other settings)
Create secure software applications using object-oriented, structured, scripting and low-level programming
1 techniques and software engineering methodologies, which pertain to development, testing and
11
Distribution of Student Learning Time (SLT)
Guided Learning
(F2F) Guided Learning Independent
Total (SLT)
(NF2F) Learning (NF2F)
Course Content Outline CLO L T P O
25 hrs
Chapter 2 : Basics of Cryptography 2 √ √ √
2.1. Classic crypto techniques
Chapter 4: Managing
18 hrs
Communication and Network
Security 2&4 √ √ √
4.1. Remote access technologies
4.2. IPSEC (Internet Protocol
Security)
10 hrs
Chapter 5: Security Policies 2&6 √ √ √
Total 83 hrs
13 Assessment
Continuous Assessment Percentage Total (50%) F2F NF2F SLT
Quiz 5.00% 1 5 6
Assignment 5.00% 1 1
Mid Exam 30.00% 2 5 7
Project 10.00% 2 8 10
Total 24 hrs
Final Exam Percentage Total (50%) F2F NF2F SLT
Final Exam 50.00% 3 10 13
Grand Total SLT 120 hrs
L = Lecture, T = Tutorial, PBL = Problem based learning, GD = Group Discussion, F2F = Face to Face, NF2F = Non Face to
Face