• No results found

Network Security Course Specifications

N/A
N/A
Protected

Academic year: 2021

Share "Network Security Course Specifications"

Copied!
6
0
0

Loading.... (view fulltext now)

Full text

(1)

IT Program – 4th Year (2nd Semester) Page 8-1 Assiut University

Faculty of Computers & Information Department of Information Technology

Quality Assurance Unit

Network Security

Course Specifications2011-2012

Relevant program B.Sc. in Computers and Information (Information Technology)

Department offers the program Information Technology

Department offers the course Information Technology

Academic year 4th Year

Date of specification approval 24/9/2012

A. Basic Information

1. Course Title: Network Security 2. Course Code: IT422

3. Course hours per week:

Lecture Tutorial / Practical Total

3 2 5

B. Professional Information

1. Overall aims of the course

Upon completing this course the student will have learned, through

appropriate classroom and laboratory experiences, the following.

 The basic issues, concepts, principles, and mechanisms in information security.  Providing a comprehensive understanding of network security techniques.  Common attack techniques, application of cryptography in security,

authentication and authorization, network security, enterprise network defense, web security, and economics of security.

(2)

IT Program – 4th Year (2nd Semester) Page 8-2

2. Intended Learning Outcomes (ILOs) of the course

a. Knowledge and Understanding Skills

On successful completion of the course, graduates should be able to:

a1. Provide a deeper understanding of legal, professional and moral aspects of the exploitation of IT.

a2. Show a critical understanding of the challenges inherent in the maintenance and evolution of IT-based systems, and the techniques and best practices currently available for dealing with them.

a3. Understand the importance of security systems.

a4. Understand types of security threats, system vulnerabilities and security goals and services.

a5. Understand the basic concepts and techniques of data security. a6. Understand the basic key distribution techniques.

a7. Understand the basic authentication and web security methods.

a8. Knowledge of the methods used in defining and assessing criteria for measuring the extent to which a computer system is appropriate for its current deployment and future evolution.

b. Intellectual Skills

On successful completion of this course, graduates should be able to:

b1. Define traditional and nontraditional information technology systems problems, set goals towards solving them, observe results, reason and apply judgment. b2. Identify a range of solutions and critically evaluate and justify proposed design

solutions.

b3. Solve information technology problems with pressing commercial or industrial constraints.

b4. Appreciate the subtleties related to different attacks on data security.

b5. Evaluate different types of security algorithms in order to use the appropriate one.

b6. Express, present and defend the developed security program. b7. Analyze the security of some security packages.

b8. Define and assess criteria to measure the appropriateness of a computer system for its current deployment and future evolution, and to interpret the results thereof.

b9. Reach computing judgments considering balanced costs, benefits, safety, quality, reliability, and environmental impact.

c. Professional and Practical Skills

On successful completion of this course, graduates should be able to:

c1. Specify, investigate, analyze, design and develop computer-based systems using appropriate tools and techniques.

c2. Recognize risks or safety aspects involved in the operation of computer-based systems.

c3. Evaluate systems in terms of their quality and possible trade-offs, evaluate appropriate hardware and software solutions for given scenarios.

c4. Implement some of classical ciphering techniques. c5. Use DES and 3-DES algorithm.

c6. Use RSA algorithm.

(3)

IT Program – 4th Year (2nd Semester) Page 8-3 d. General and Transferable Skills

On successful completion of this course, graduates should be able to:

d1. Effectively employ information-retrieval skills, (including the use of browsers, search engines, and on-line library catalogues), communicate effectively using a variety of communication methods, and communicate effectively with team members, managers and customers.

d2. Lead and motivate individuals.

d3. Work as part of a development team and to recognize the different roles of its members.

d4. Prepare their work in the form of reports, oral presentations or an internet web site.

d5. Ability to work independently and as part of a team with minimum guidance. d6. Communicate effectively.

3. Contents

No Topic taught No. of hours ILOs

Lecture Tut/Prac 1 Discussion of the need for

network security, describe various threats, attack types and hackers.

12 8 a1-a4, a8, b1-b4, b8, c2, d1-d6

2 Explain authentication, encryption & encryption standard. Secret–Key, public key algorithm authentication protocols, digital certificate.

15 10 a1, a4-a8, b1-b9, c4-c6, d1-d6

3 Virtual private network, (VPN), secure sockets layer (SSL). Firewalls, and firewalls topology, packet filters and proxy servers.

15 10 a1, a4, a5-a8, b1-b9, c1, c3, c7, d1-d6

4. Teaching and Learning Methods

4a. Lectures

4b. Tutorial Exercises

5. Student Assessment

5a. Tools

Final Exam To measure knowledge, understanding, intellectual and professional skills.

Mid-Term Exam To measure following up and understanding the studied topics Practical Exam To measure professional and general skills

Class Work To measure the participation of the student during the tutorial, professional and general skills.

(4)

IT Program – 4th Year (2nd Semester) Page 8-4 5b. Time Schedule Assessment Week No Final Exam 16 Mid-Term Exam 8 5c. Grading System Assessment Grade % Final Exam 70% Mid-Term Exam 15% 5d. Formative Assessment

Regular quizzes distributed along the whole semester.

6. List of References

6a. Course Notes

o Short course notes available at doctor’s office.

6b. Required Books (Textbooks)

o .

6c. Recommended Books

o .

7. Facilities Required for Teaching and Learning

A lecture hall is equipped with a projector and a computer.

Labs are equipped with computers and Internet facilities.

Tutorial rooms are equipped with projectors and computers.

A library.

Course Coordinator: Prof. Dr. Yousef B. Mahdy Signature:

Date: 24/9/2012

Department Head: Prof. Hosny M. Ibrahim Signature:

(5)

IT Program – 4th Year (2nd Semester) Page 8-5

Course Matrix

Course Name Network Security Course Code IT422

Course Aims Course Content Teaching Weeks

ILOs Teaching and Learning

Methods Assessment Tools

Crit er ia a’s b’s c’s d’s Le cture s Tuto ria l E xe rc is es Pra ctic al Ex erc is es Wo rks ho ps Pro je cts Ca se Stu d y D ata Colle ctio ns Fina l E xa m Mid -Te rm E xa m Pra ctic al Ex am Cla ss Wo rk O ra l E xa m

 The basic issues, concepts, principles, and mechanisms in information security.

 Providing a comprehensive understanding of network security techniques.

 Common attack techniques, application of cryptography in security, authentication and authorization, network security, enterprise network defense, web security, and economics of security.

 Gaining an experience in applying the theory to practice.

Discussion of the need for network security, describe various threats, attack types and hackers. 1-4 1-4,8 1-4,8 2 1-6     Studen t ev alua tio n, cours e fil e, ex am res ult s Explain authentication, encryption & encryption standard. Secret–Key, public key algorithm authentication protocols, digital certificate. 5-9 1, 4-8 1-9 4-6 1-6     Virtual private network, (VPN), secure sockets layer (SSL). Firewalls, and firewalls topology, packet filters and proxy servers.

9-13 1, 4, 5-8 1-9 1, 3, 7 1-6    

Course Coordinator Prof. Dr. Yousef B. Mahdy

Department Head Prof. Hosny M. Ibrahim

(6)

References

Related documents

Results: In the inter-group analysis, in the study product group compared with the placebo group, a significant difference (t4 study treatment vs. t4 placebo, p = 0.03) was observed

Left lower lobe sleeve lobectomy for lung cancer using the Da Vinci surgical system.. Yandong Zhao * , Wenjie Jiao, Xiaoyang Ren, Liangdong Zhang, Tong Qiu, Bo Fu and

determine, it seems that (I) coaches are well informed about their athletes ’ DS practices, (II) athletes and coa- ches share the same opinions about doping in sailing, (III)

The characteristics of our method in constructing the model of orthotopic transplanted tumor. The animal model of ovarian cancer is an important method by which to study the

In our study 25 sutureless self-anchoring, Perceval S, (LivaNova Biomedica Cardio Srl, Sallugia, Italy) valves are compared with 25 conventional biological stented pros-

This study, the first to investigate ovarian reserve func- tion in women with MetS, found that ovarian reserve, as determined by ovarian volume, was significantly lower in patients

The average values of HE4, CA125, YKL-40, bcl-2 and cathepsin-L were compared between the group of pa- tients who underwent primary surgery and the group of patients selected