kfupm


King Fahd University of Petroleum & Minerals

College of Computer Sciences and Engineering

Information and Computer Science Department

 icon

ICS 444: Computer and Network Security (3-0-3) [Elective Course]

 

Syllabus – Spring Semester 2014-2015 (142) [PDF]

 

 

 

Participate .. Share .. Learn

 

Website:

All course material and resources are posted in Blackboard (WebCT) http://webcourses.kfupm.edu.sa

 

Class Time, Venue and Instructor Information:

 

 

Time

Venue

Instructor

Office Hours

UTR

10:00-10:50am

23/014

changed to 24/141

Dr. EL-SAYED EL-ALFY

Office: 22-108

Phone: 03-860-1930

E-mail: alfy@kfupm.edu.sa,

http:faculty.kfupm.edu.sa/ics/alfy

 

 

Announced on Blackboard

 

Course Catalog Description

 

Introduction to computer and network security; Security services: confidentiality, integrity, availability, accountability; Hacker techniques and attack types; Public and private key encryption; Authentication; Digital signature; User identification and access control; Computer viruses, Trojans and worms; Risk management and analysis; Information security process; Internet security: security protocols such as IPSec, SSL, TLS, email and web security; Security technologies and systems: Firewalls, VPN and IDS.

 

Pre-requisites:  ICS 343 or COE 344

 

 

Course Objectives

 

Develop a fundamental understanding of computer and network security proper practices, policies, technologies and standards.

 

Course Learning Outcomes

 

Upon completion of the course, you should be able to:

  1. Describe computer and network security fundamental concepts and principles.
  2. Describe the inner-workings of popular encryption algorithms, digital signatures, and certificates: DES, AES, RSA, SHA-512, X.509, etc.
  3. Describe the inner-workings of today's remote exploitation and penetration techniques.
  4. Demonstrate the ability to select among available network security technology and protocols such as IDS, IPS, firewalls, SSL, IPSec, TLS, VPNs, etc.
  5. Gain hands-on experience using popular security tools, auditing, vulnerability scanning, and pen-testing.
  6. Identify and assess different types of threats, malware, spyware, viruses, vulnerabilities, and today's attacks such as Trojans and Rootkits.
  7. Demonstrate the ability to use security lingo and terminology.
  8. Identify ethical, professional responsibilities, risks and liabilities in computer and network environment, and best practices to write a security policy.

 

 

 

Required Material

 

    Lecture Handouts and assigned readings material  (via Blackboard)

 

 

 

 

Other Recommended References

 

Assessment Plan

 

 

 

 

 

 

 

 

 

 

 

 

 

Tentative Schedule

 

 

 

 

How to do well and become a star?

 

skill

 

 

 

 

Other Resources on the Web: