|
|
Course descripton
Historical perspective of cryptography including some classical encryption techniques, cryptanalysis, and steganography. Symmetric key encryption methods. Public-key encryption methods. Access control, firewalls, and web security. Viruses and intruders.
Intended learning outcomes
1. Assess the threats, vulnerabilities, and risks to a network.
2. Defend against access, modification, Denial-of-service and repudiation attacks.
3. Identify a verity of hacking methods, including sniffing, spoofing viruses, Trojan and worms.
4. Configure wireless security technologies.
5. Apply security technologies such as firewalls, VPNs, encryption methods and detection system.
6. Implement security measures for web.
2. Defend against access, modification, Denial-of-service and repudiation attacks.
3. Identify a verity of hacking methods, including sniffing, spoofing viruses, Trojan and worms.
4. Configure wireless security technologies.
5. Apply security technologies such as firewalls, VPNs, encryption methods and detection system.
6. Implement security measures for web.
course assessment
Assessment Type
Report and Presentation
Midterm Lab Final Total |
Frequency
2
2 9 1 16 |
Wieght
20%
40% 10% 40% 100% |
chapter 1 - introduction to information security
chapter 2 - authentication technologies
chapter 3 - direct attacks on computational devices
chapter 4 - rfid security
chapter 5 - file system security
chapter 6 - malware
|
|