COIT 324
|
1
|
|
Course number:
|
COIT 324
|
Name :
|
Information
Security
|
2
|
|
Credits:
|
3
|
Contact hours:
|
42 Hrs Lecture
|
|
|
|
|
|
|
3
|
|
Course coordinator’s name:
|
Prof. Dr. Altyeb Altaher
|
4
|
|
Textbook:
|
Corporate Computer and Network Security, 3rd Edition, P. Raymond, Prentice Hall, 2013, ISBN-13: 978-0-13-214535-0 ISBN-10: 0-13-214535-9
|
|
a
|
Other references:
|
Information Security: Principles and Practice, Mark Stamp, Wiley-Interscience publisher, 2021, ISBN: 978-1-119-50590-7.
|
5
|
a)
|
Synopsis:
|
The course aims at teaching students the principles and concepts of the Information security. Students will familiarize with the concepts of the threat environment, Security Planning and Policy, Cryptography and Access Control. In addition, students will be taught how to use information security techniques to address current security issues.
|
a)
|
b)
|
Prerequisites:
|
None
|
b)
|
c)
|
Type
of course:
|
Core
|
6
|
a)
|
Course Learning
Outcomes
Upon finishing this course, the students should be able to:
· Be familiar with information
security awareness, ethics and understand the importance of information security (4,6 )
· Know the information
security threats, vulnerabilities, countermeasures, attacks, compromises and
remediation ( 4 and 6)
·
Understand how to develop
the secure enterprise network architecture.
(4 and 6)
·
Understand the basic principles of Access control techniques (6)
·
Understand the basic
principles of cryptography ( 1 and 6)
|
|
b)
|
Course Relationship to Key Student Outcomes
STUDENT OUTCOMES
|
1
|
2
|
3
|
4
|
5
|
6
|
*
|
|
|
*
|
|
*
|
.
|
7
|
|
Brief list of topics
and their duration
Number
|
Description
|
Duration in weeks
|
1
|
The threat environment.
Malware, Hackers and attacks, the criminal era
|
1
|
2
|
Security Planning and Policy
-Compliance laws and regulations
-
Ethics
-
Risk analysis
-
Governance Frameworks
|
1
|
3
|
Cryptography
-
The classical encryption algorithms
|
1
|
4
|
Cryptography
-
Public-Key Cryptography
|
1
|
5
|
Secure networks
-
Denial-of-service attacks
-
ARP poisoning
|
1
|
6
|
Secure networks
-
Secure Ethernet networks
-
Potential attacks against wireless networks
|
|
7
|
Access Control
-
Basic access control terminology
-
Mandatory and Discretionary Access Control
|
1
|
8
|
Access Control
-
Biometric authentication, including verification
and identification.
-
Biometric Errors and Deception , Biometric Methods
|
|
9
|
Firewalls
-
Static Packet Filtering
-
Stateful Packet Inspection (SPI)
-
Network Access Translation (NAT)
|
1
|
10
|
Firewalls
-
Basic Firewall operation
-
Firewall management
|
|
11
|
Modern Encryption Techniques
|
|
12
|
Application Security
|
1
|
13
|
Database Security
-SQL Injection Attack
|
|
14
|
Intrusion detection and prevention systems
|
1
|
|
Final Exam
|
|
|
8
|
|
Class Schedule
Meet 60 minutes three times/week
Lab 120 minutes one time/week (if any)
|
9
|
|
Assessment Tools with Marks Distribution
Assessment Type
|
Percentage of Mark
|
Project
|
20 %
|
Assignments
|
20 %
|
Midterm Exam
|
20 %
|
Final Exam
|
40 %
|
Total
|
100 %
|
|
|
Last Update
6/16/2022 1:43:50 AM
|
|
|