ICS
444 ---T071
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
Catalog Description Introduction to computer and network security; Security services: confidentiality, integrity, availability, accountability; Hacker techniques and attack types; Public and private key encryption; Authentication; Digital signature; User identification and access control; Computer viruses, Trojans and worms; Risk management and analysis; Information security process; Internet security: security protocols such as IPSec, SSL, TLS, email and web security; Security technologies and systems: Firewalls, VPN and IDS.
Prerequisite:
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
Course ObjectivesDevelop a fundamental understanding of computer and network security proper practices, policies, technologies and standards.
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
Learning outcome Upon completion of this course, students will have the ability to:
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
Text Book
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
Selected References
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
Grading Policy
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
Plagiarism, copying and other anti-intellectual behavior are prohibited by the university regulations. Violators may have to face serious consequences. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||
Topics | |||||||||||||||||||||||||||||||||||||||||||||||||||||
|