Course info
The course is aimed mostly at senior students. The class is concerned with the
fundamentals of computer security. Topics in this class can be divided into three main parts:
cryptography (with a focus on single -key and public key), computer system security (operating systems issues including authentication, detection, access control, viruses, etc. as well as network security.
fundamentals of computer security. Topics in this class can be divided into three main parts:
cryptography (with a focus on single -key and public key), computer system security (operating systems issues including authentication, detection, access control, viruses, etc. as well as network security.
Course Outcomes
Upon successful completion of this course, you will be able to:
explain the challenges and scope of information security;
explain such basic security concepts as confidentiality, integrity, and availability, which are used frequently in the field of information security;
explain the importance of cryptographic algorithms used in information security in the context of the overall information technology (IT) industry;
describe the access control mechanism used for user authentication and authorization;
identify and explain symmetric algorithms for encryption-based security of information;
identify and explain public-key based asymmetric algorithms for encryption-based security of information;
describe Secure Sockets Layer (SSL) as a common solution enabling security of many applications, including all Internet-based commerce;
describe securing Internet Protocol (IP) communications by using Internet Protocol Security (IPSec);
explain the importance of physical security and discuss ways to improve physical security of an enterprise;
explain the use of such security tools as firewalls and intrusion prevention systems;
explain malicious software issues such as those introduced by software-based viruses and worms;
describe the basic process of risk assessment in the context of overall IT security management.
Upon successful completion of this course, you will be able to:
explain the challenges and scope of information security;
explain such basic security concepts as confidentiality, integrity, and availability, which are used frequently in the field of information security;
explain the importance of cryptographic algorithms used in information security in the context of the overall information technology (IT) industry;
describe the access control mechanism used for user authentication and authorization;
identify and explain symmetric algorithms for encryption-based security of information;
identify and explain public-key based asymmetric algorithms for encryption-based security of information;
describe Secure Sockets Layer (SSL) as a common solution enabling security of many applications, including all Internet-based commerce;
describe securing Internet Protocol (IP) communications by using Internet Protocol Security (IPSec);
explain the importance of physical security and discuss ways to improve physical security of an enterprise;
explain the use of such security tools as firewalls and intrusion prevention systems;
explain malicious software issues such as those introduced by software-based viruses and worms;
describe the basic process of risk assessment in the context of overall IT security management.
- Teacher: Radwan Tahboub