0% found this document useful (0 votes)
4 views4 pages

Computer System Security Course Syllabus

The document outlines the course 'Computer Systems Security' (CSE4307) offered at Adama Science and Technology University, focusing on security principles, policies, cryptography, and network security. It details course learning outcomes, assessment methods, and required resources, emphasizing the importance of secure software development and organizational security policies. The course is a core module for fourth-year students in the Computer Science and Engineering department, with a total of 3 credit hours.

Uploaded by

muler2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views4 pages

Computer System Security Course Syllabus

The document outlines the course 'Computer Systems Security' (CSE4307) offered at Adama Science and Technology University, focusing on security principles, policies, cryptography, and network security. It details course learning outcomes, assessment methods, and required resources, emphasizing the importance of secure software development and organizational security policies. The course is a core module for fourth-year students in the Computer Science and Engineering department, with a total of 3 credit hours.

Uploaded by

muler2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

ADAMA SCIENCE AND TECHNOLOGY UNIVERSITY

1
SCHOOL: Electrical Engineering and Computing DEPARTMENT: Computer Science & Engineering
2 Course Category: Core Module

Course Title: Computer Systems Security

Course Code: CSE4307


3 Synopsis:

This course covers fundamental issues and first principles of security and information
assurance. The course will look at the security policies, models and mechanisms related
confidentiality, integrity, authentication, identification, and availability issues related
information and information systems. Other topics covered include basics of cryptography
(e.g., digital signatures) and network security (e.g., intrusion detection and prevention),
management, security assurance and secure design principles, as well as e-commerce
security. Issues such as organizational security policy, legal and ethical issues in secure
standards and methodologies for security evaluation and certification will also be covered.
4 Academic and
Semester Staff:
Year
5 offered: Semester: I Year: 4
6 Credit Hour: 3 Lect: 2 Lab: 3 Tutor: 0
7 Prerequisite / Co-
requisite: (if any)
None
8
Course Learning Outcome (CLO): At the end of the course the student will be able to:

CLO-1 Explain the fundamentals concepts of computer security apply to different components of computing systems.

CLO-2 Identify the basic cryptographic techniques using existing software in maintain information security.
Describe how malicious attacks, threats, and protocols for security vulnerabilities impact a systems
CLO-3 infrastructure.
CLO-4 Describe the importance of network principles and architecture to security operations.

CLO-5 Define how to apply standard responses in the case spyware and malware is occurs.
Define information security standard, compliance laws, and security policy to real-world implementation in
CLO-6 ofboth
Mapping the Learning
Course private and public sector
Outcomes (CLOs) to the Student Learning Outcomes (Sos), Teaching Methods and
9 Assessment
Student Learning Outcomes (SOs) Teaching Methods Assessment
Course Learning

Assignment
Outcomes

Final Exam
Mid Exam
Lab/Tut

Project
(CLOs)
SO-1

SO-2

SO-3

SO-4

SO-5

SO-6

SO-7

SO-8

SO-9

Quiz
Test
PBL
Lec

GD

CLO-1 √ √ √ √
CLO-2 √ √ √ √ √ √ √ √
CLO-3 √ √ √ √
CLO-4 √ √ √
CLO-5 √ √ √
CLO-6 √ √ √ √
Indicate the relevancy between the CLO and PO by ticking “√”on the appropriate relevant box
10 Transferable Skills (if applicable)

(Skills learned in the course of study which can be useful and utilized in other settings)
Create secure software applications using object-oriented, structured, scripting and low-level programming
1 techniques and software engineering methodologies, which pertain to development, testing and
11
Distribution of Student Learning Time (SLT)
Guided Learning
(F2F) Guided Learning Independent
Total (SLT)
(NF2F) Learning (NF2F)
Course Content Outline CLO L T P O

Chapter 1: Introduction to Security 15 hrs


Concepts 1 √ √ √
1.1. Networking Vs. Security

1.2. Network protocols and TCP/IP


1.3. Different Attacks
1.4. Malicious Codes
1.5. Basic security terms
1.6. Authentication Mechanisms

25 hrs
Chapter 2 : Basics of Cryptography 2 √ √ √
2.1. Classic crypto techniques

2.2. Ideas of Confusion and Diffusion

2.3. Asymmetric ( public key) crypto


2.4. Symmetric crypto
2.5. Hash functions
2.6. Digital signatures
15 hrs
Chapter 3: Infrastructure Security 4 √ √ √
3.1. Security concerns of different
types of devices

3.2. Network Monitoring /


Diagnostics tools
3.3.Security concerns of different
types of media

3.4. Storage Media

3.5. Intrusion detection mechanisms


3.6.Security Baselines

Chapter 4: Managing
18 hrs
Communication and Network
Security 2&4 √ √ √
4.1. Remote access technologies
4.2. IPSEC (Internet Protocol
Security)

4.3. Email security concepts

4.4. How PGP and S/MIME works

4.5. SSL (Secure Sockets Layer)

4.6. TLS (Transport Layer Security)


4.7. HTTP/S

4.8. Directory Security Concepts:

10 hrs
Chapter 5: Security Policies 2&6 √ √ √
Total 83 hrs
13 Assessment
Continuous Assessment Percentage Total (50%) F2F NF2F SLT
Quiz 5.00% 1 5 6
Assignment 5.00% 1 1
Mid Exam 30.00% 2 5 7
Project 10.00% 2 8 10
Total 24 hrs
Final Exam Percentage Total (50%) F2F NF2F SLT
Final Exam 50.00% 3 10 13
Grand Total SLT 120 hrs

L = Lecture, T = Tutorial, PBL = Problem based learning, GD = Group Discussion, F2F = Face to Face, NF2F = Non Face to
Face

Note: indicates the CLO based on the CLO’s numbering in item 9.


14 Special requirements and resources 1 Computer lab
to deliver the course (e.g. software,
2
computer lab, simulation room
…etc.) 3
4
5
15 Text book and reference: Computer Security Fundamentals: Computer Security Fundamentals,
1
(note: ensure the latest edition 2/Edition, William (Chuck) Easttom, II. (2012, Pearson Education Company),
/publication) 2 ISBN-13:9780789748904
3
4
5

You might also like