«Approve» The Dean of the Faculty of Radio Engineering, Telecommunications and Communications Medeuov U year

Size: px
Start display at page:

Download "«Approve» The Dean of the Faculty of Radio Engineering, Telecommunications and Communications Medeuov U year"

Transcription

1 Ministry of Education and Science of the Republic of Kazakhstan Non-Profit JSC «Almaty University of Power Engineering and Telecommunications» Faculty of Radio Engineering, Telecommunications and Communications The department of Electronics and Robotics «Approve» The Dean of the Faculty of Radio Engineering, Telecommunications and Communications Medeuov U year Syllabus Information security systems for the specialty «5B Instrument construction» Year of study 4-rd Semester 7-th Number of credits 3 Total ECTS credits 6 Total hours 135 including: lectures 30 h practical classes 15 h Self-study assignments (SSA) 90 h including: self-study under the teacher s supervision (SSTUS) 30h Computation graphic work 3 Examination Almaty 2017

2 The Course Syllabus has been developed by T. V. Golubeva, senior teacher. The syllabus is based on the curriculum and the standard program of the discipline for the specialty «5B Instrument construction» Work program was considered and approved at the meeting of department «Electronics and Robotics» from , Protocol 11. Head of Department Balbaev G.K. Work program was considered and approved at the meeting of an educational and methodical commission of the faculty Radio Engineering, Telecommunications and Communications (the protocol 8, from ). About teacher: Golubeva T. V., senior-teacher. Published 16 scientific articles and methodical works, scientific and pedagogical experience is 10 years. Laboratory classes according to the discipline are held in laboratory Б-329. Office: «Electronics and Robotics» department Address: , Almaty, Baitursynov street, 126. AUPET

3 1 Teacher: Golubeva T. V. senior teacher of «Electronics and Robotics» department. Contacts: 8(727) , 2 Time and place of classes are indicated in the schedule of training sessions, schedule of consultation is posted on the Dean's Office s and department s message boards. 3 Prerequisites: «Information», «Algorithmization and programming». 4 Post requisites: No requsites 5 Characteristics 5.1 The aim acquisition of fundamental knowledge about the basic principles of information security, as well as providing information security. Definitions of the main concepts are given: cryptography, privacy, integrity, autentification, digital signature. 5.2 Task to learn the main methods of modern means of information security in computer systems and networks. 5.3 Description The discipline is for students of specialty «5B Instrument construction» and aims to acquaint students with the basics of security systems and learn methods of evaluating protecting information, as well as to acquaint with the means of information systems against data loss and the possibility of predicting the state of security systems. At the end of the course «Design of cooling devices CMD and system HEC» student must know: about legislative and regulatory framework in providing security in information systems; about the conditions and factors affecting their working capacity during the transmission of information; about monitoring procedures in the areas of security and protection of information in information systems; basic technologies of providing security in information systems and their possibilities; main methods of information security in information systems; be able to: provide security of information during the transmission; apply methods for choosing the best way to ensure the protection of information in information systems; organize and carry out examination according to the protection of information in information systems.

4 The Course content 6.1 Lectures Theme The number of source 1 Introduction. Basic concepts of software and hardware protection. (2 hours) 2 Analysis of often used threats and vulnerabilities protection. (2 hours) 3 Malicious software. (2 hours) 4 Antivirus programs. (2 hours) 5 Adware. Spyware. The protection from them. (2 hours) 6 Classification of firewalls. (2 hours) 7 Screening as a security service. (2 hours) 8 Tunneling and management as security service. (2 hours) 9 Administrative level of information security. The security policy. (2 hours) 10 Administrative level of information security. The program of security. (2 hours) 11 Purpose of hardware protection. Classification. Hardware protection of software. (2 hours) 12 Hardware protection of computer and information. Hardware protection of network firewalls. (2 hours) 13 Kerberos Authentication service. Identification/ authentication with the help if the biometrical data (2 hours) 14 The use of object-oriented approach to the protected systems. (2 hours) 15 Disadvantages of traditional approach to information security from the object viewpoint (2 hours)

5 6.2 List of practical classes Methodological recommendations for work execution can be found in printed form at «Electronics» department. It is necessary to use the basic and additional literature from the list in paragraph 10. Theme Source 1 Investigation of the operating system with the help of the utility AVZ. (4 hours) 2 Setting up the hardware firewall. Simulation of protection against network attacks with the help of Packet Tracer 5.0. Construction of access lists (4 hours) 3 Construction of the tunnel on the basis of Packet Tracer 5.0. Demonstration of model (4 hours) 4 Configuring Local Security Policy snap-in using "Group Policy" (4 hours) 6.3 Themes for computation graphic work (CGW) 1, 3, 5 1, 3, 5 1, 3, 5 1, 3, 5 Methodological recommendations for work execution can be found in printed form at «Electronics» department. It is necessary to use the basic and additional literature from the list in paragraph 10. Theme of CGW 1: Based on the known data about virus develop a manual treatment algorithm. Bring screenshots for used programs and commands. Theme of CGW 2: The network virus attack. Based on Packet Tracer 5.0 demonstrate method of attack detection and its blocking. Theme of CGW 3: The overload of local network elements and external channel of enterprise. Based on Packet Tracer 5.0 demonstrate the method of detecting internal attack, its localization and blocking. Carried out in accordance to the guidelines. Tasks are given during the first week of a semester. 6.4 Themes of Self-Study Activities (SSA) SSAs are held according to the themes of lectures, laboratory glasses and CGWs. 6.5 Exam questions 1. Object-oriented approach to information security facilities. 2. Application of the object oriented approach to the protected systems. 3. Disadvantages of the traditional approach to information security with the object point of view. 4. Active and passive subjects.

6 5. The criteria for the classification of threats. Security threats. 6. Security damage. 7. Classification of threats in relation to the supporting infrastructure. 8. The most common threats to availability. 9. The classification of the main sources of internal failures. 10.Malicious software. 11.Safe and secure system. 12.The main threats to the integrity. 13.Secure policy. 14.The attack on a computer system. 15.The main privacy threats. 16.Abuse of functions. 17.Kerberos authentication server. 18.The Administrative level of information security. 19.Security Program. 20.The main security threats. 21.The main goals of the security program. 22.Synchronization if security software with the lifecycle. 23.Identification / authentication using biometric data. 24.Masquerade. The concept and its use. 25.Interception of passwords and how to intercept passwords. 26.Trojan horse. Concept and its destructive functions. A number of measures that are necessary to protect a system. 27.Worm. Concept and its destructive functions. A number of measures that are necessary to protect a system. 28. Computer virus. Subfamily. A number of measures that are necessary to protect a system. 29. Screening as a security service. 30.Classification of firewalls. 31.Security analysis as security service. 32.Tunneling as security service. 33.The management, as a security service. 34.The concept of the proactive management. 35.The concept of trusted or delegated management. 36.Security of object reuse. 37.Limiting interface, as a kind of screening. 38.The separation of defense. 39.A two-component shielding with a demilitarized zone. 40.The concept of hardware and software protection. 6 Information on assessing the achievements of students 6.1 Evaluation system The level of the student's achievements in the course program is assessed on the scale of the final grades accepted in the credit technology of training (Table 1). Table 1 Alphabetic Points Percentage content Traditional

7 А 4, Excellent А- 3, Excellent В+ 3, Good В 3, Good В- 2, Good С+ 2, Satisfactorily С 2, Satisfactorily С- 1, Satisfactorily D+ 1, Satisfactorily 1, Satisfactorily F Unsatisfactorily The rating of the access rating is accumulated during the semester. Each type of training is assessed on a 100-point scale and included in the tolerance rating, taking into account the weighting factor in accordance with Table 2. Table 2 - Tolerance rating. Significance of each type of work Parameter Weight coefficient Performance of laboratory workshop 0,4 Course work 0,4 Attending lectures 0,2 Total: average assessment of current controls (Ср) 1,0 The admission rating for the discipline (Rating) for bachelors and undergraduates is calculated by the PLATONUS program using the formula: Rating= Р1+Р2 0,2+Ср 0,8, 2 where Р1 - an estimation for the first boundary control; P2 - estimate for the second boundary control; Cp is the arithmetic average of all completed assignments from 1 to 15 weeks (performing CGW, laboratory and course work, etc. Each task is evaluated on a 100-point scale). The final grade for the discipline is calculated by the formula: The final grade = 0,6 Rating + 0,4 E, где E exam assessment. 6.2 Pointing Policy: The maximum scores are given on condition of rhythmic performance and high quality of work. Evaluation scores for testing and attending lecture classes are given depending on the number of correct answers and the number of missed lectures. 6.3 Translation of assessments in the organization of academic mobility of students The translation of the ECTS (European Transfer (Transfer) and Accumulation of Credits) ratings into a rating-rating letter system for assessing the educational achievements of students of the RK and back is carried out according to Tables 3 and 4. Table 3 - Conversion of ECTS scores to a point-rating alphabetic system for assessing the educational achievements of students of the RK Estimated by ECTS Alphabetic Digital equivalent Points Percentage content А А 4,0 100 Excellent В В+ 3,33 85 С В 3,0 80 Good D С 2,0 65 E D 1,0 50 Satisfactorily Traditional

8 FX, F F 0 0 Unsatisfactory Table 4 - Translation of scores of the pointsrating alphabetic system RK into the assessments by ECTS Digital Percentage Estimated by Alphabetic equivalent Traditional content ECTS Points А 4, А- 3, Excellent А В+ 3, Good В В 3, Good В- 2, С С+ 2, Satisfactorily С 2, С- 1, Satisfactorily D D+ 1, D 1, Satisfactorily E F Unsatisfactory FX, F 7 Policy of the course: - do not be late and do not miss classes; - closely monitor the instructor's scenario, actively participating in it; - practice laboratory exercises missed for valid reasons (if there is an admission from the dean's office); - the course work for the defense to represent no later than the penultimate week of the semester: - self study in the library and at home. 8 Standards of academic ethics: - discipline; - good breeding; - benevolence; - honesty; - a responsibility; - work in the classroom with disabled cell phones. Conflict situations should be openly discussed in training groups with a teacher, an adviser, and if the conflict is not resolved, they should be brought to the dean's office. 9 Recommended books and materials Main: 1. Галатенко В.А. Основы информационной безопасности.-м., Основы информационной безопасности./под ред. Е.Б.Белов и др.- М., Малюк А.А. Информационная безопасность: Концептуальные и методологические основы защита информации.-м., Петраков А.В. Основы практической защиты информации.-м., Рябко Б.Я. Криптографические методы защиты информации.-м., Гордейчик С.В. Безопасность беспроводных сетей.-м., Соболев А.Н. Физические основы технических средств обеспечения информационной безопасности.-м.,2006 Additional: 1. Максим Мерритт Безопасность беспроводных сетей.-м., Партыка Т.П. Информационная безопасность.-м.,2008

9 3. Прохода А.Н. Обеспечение интернет- безопасности.-м., Информационная безопасность. Компьютерных систем и сетей.-м., Романов О.А. Организационное обеспечение информационной безопасности.-м., Смит Д.Дж. Функциональная безопасность.-м.,2006

Network Security

Network Security 44-555 Network Security Instructor: Scott Bell Office: 2220 Colden Hall Email: sbell@nwmissouri.edu Phone: (660) 562-1699 Description: An introduction to the fundamentals of network security, including

More information

ITSY Information Technology Security Course Syllabus Spring 2018

ITSY Information Technology Security Course Syllabus Spring 2018 ITSY 1342 - Information Technology Security Course Syllabus Spring 2018 Instructor Course Reference Number (CRN) Course Description: Name: Fidelis Ngang Tel: 713-718-5552 Office: Spring Branch, Room 900L

More information

Computer Science Technology Department

Computer Science Technology Department Computer Science Technology Department Houston Community College Department Phone Number: 713-718-6776 Houston Community College ITMT 2373 - Configuring Advanced Windows Server 2012 Services Course Syllabus

More information

MORGAN STATE UNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING COURSE SYLLABUS FALL, 2015

MORGAN STATE UNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING COURSE SYLLABUS FALL, 2015 MORGAN STATE UNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING COURSE SYLLABUS FALL, 2015 CATALOG DESCRIPTION ONLINE EEGR.483 INTRODUCTION TO SECURITY MANAGEMENT CREDITS: 3 THIS COURSE IS A

More information

UNIT OUTLINE. Network Engineering 304. Mr Iain Murray. Department of Electrical and Computer Engineering Curtin Engineering

UNIT OUTLINE. Network Engineering 304. Mr Iain Murray. Department of Electrical and Computer Engineering Curtin Engineering 305682 Network Engineering 304 Mr Iain Murray Department of Electrical and Computer Engineering Curtin Engineering UNIT OUTLINE Semester 2 2009 CRICOS (Perth - 00301J) (Sydney - 02637B) Table of Contents

More information

Computer Science Technology Department

Computer Science Technology Department Computer Science Technology Department Houston Community College Department Phone Number: ab Houston Community College ITMT 1370 Windows Client Operating System - Windows 10 Course Syllabus Summer 2017

More information

Advisory: Students should have already taken MICROCOMPUTER APPLICATIONS II - 431

Advisory: Students should have already taken MICROCOMPUTER APPLICATIONS II - 431 Cyber Security I - CoSci 411 Los Angeles Mission College - Spring 2018 Instructor: Javier Rios E-mail: rios.javier@gmail.com E-mail communications will be will receive a response within 24 hours. Advisory:

More information

Syllabus for CIT 442 Information System Security 3 Credit Hours Spring 2015

Syllabus for CIT 442 Information System Security 3 Credit Hours Spring 2015 Syllabus for CIT 442 Information System Security 3 Credit Hours Spring 2015 I. COURSE DESCRIPTION An overview of information system security to include managing security, protecting information technology

More information

Standard Course Outline IS 656 Information Systems Security and Assurance

Standard Course Outline IS 656 Information Systems Security and Assurance Standard Course Outline IS 656 Information Systems Security and Assurance I. General Information s Course number: IS 656 s Title: Information Systems Security and Assurance s Units: 3 s Prerequisites:

More information

BEng (Hons) Civil Engineering E410 (Under Review)

BEng (Hons) Civil Engineering E410 (Under Review) BEng (Hons) Civil Engineering E410 (Under Review) 1.0 Introduction The aim of the degree programme is to provide students with a sound knowledge and understanding of the subject of Civil Engineering and

More information

San José State University Department of Computer Science CS166, Information Security, Section 1, Fall, 2018

San José State University Department of Computer Science CS166, Information Security, Section 1, Fall, 2018 Course and Contact Information Instructor: Office Location: San José State University Department of Computer Science CS166, Information Security, Section 1, Fall, 2018 Fabio Di Troia DH282 Telephone: 408-924-7171

More information

COMPUTER AND NETWORK SUPPORT TECHNICIAN PROGRAM

COMPUTER AND NETWORK SUPPORT TECHNICIAN PROGRAM Network + Networking NH5200 Fundamentals COURSE TITLE: Network+ Networking Fundamentals 104 Total Hours 66 Theory Hours 38 Laboratory Hours COURSE OVERVIEW: After completing this course, students will

More information

BEng (Hons) Electronic and Communication Engineering - E431 (Under Review)

BEng (Hons) Electronic and Communication Engineering - E431 (Under Review) BEng (Hons) Electronic and Communication Engineering - E431 (Under Review) 1. Introduction The field of Electronic and Communication Engineering is one that currently evolves at an extremely fast rate.

More information

BSc (Honours) Computer Science Curriculum Outline

BSc (Honours) Computer Science Curriculum Outline BSc (Honours) Computer Science Curriculum Outline 1. Introduction: The economic and strategic importance provided by Computer Science and Information Technology is increasing daily. This importance is

More information

ISO Lead Auditor Program Risk Management System (RMS) Training Program

ISO Lead Auditor Program Risk Management System (RMS) Training Program FINAL CERTIFICATION AWARDED BY PECB CANADA ISO 31000 Lead Auditor Program Risk Management System (RMS) Training Program ISO 31000 Lead Auditor Risk Manager training enables you to gain comprehensive and

More information

HOLY ANGEL UNIVERSITY COLLEGE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY CYBER SECURITY COURSE SYLLABUS

HOLY ANGEL UNIVERSITY COLLEGE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY CYBER SECURITY COURSE SYLLABUS HOLY ANGEL UNIVERSITY LLEGE OF INFORMATION AND MMUNICATIONS TECHNOLOGY CYBER SECURITY URSE SYLLABUS Course Code : 6CSEC Prerequisite : 6MPRO2L Course Credit : 3 Units (2 hours LEC,3 hours LAB) Year Level:

More information

Cyber Security CYBER SECURITY

Cyber Security CYBER SECURITY Cyber Security We live in a digital world. Whether it s keeping in touch with friends, operating a city s energy grid or strengthening national security, it happens online. The need to secure our networks

More information

CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING

CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING MAJOR: DEGREE: COMPUTER SCIENCE MASTER OF SCIENCE (M.S.) CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING The Department of Computer Science offers a Master of Science

More information

ASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Technology. on Technology. IT PH.D. Program.

ASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Technology. on Technology. IT PH.D. Program. ASSIUT UNIVERSITY Faculty of Computers and Information Department of Information Technology Informatiio on Technology PhD Program IT PH.D. Program Page 0 Assiut University Faculty of Computers & Informationn

More information

San José State University Department of Computer Science CS-174, Server-side Web Programming, Section 2, Spring 2018

San José State University Department of Computer Science CS-174, Server-side Web Programming, Section 2, Spring 2018 San José State University Department of Computer Science CS-174, Server-side Web Programming, Section 2, Spring 2018 Course and Contact Information Instructor: Office Location: Fabio Di Troia DH282 Telephone:

More information

Department of Computer & Information Sciences. CSCI-342: Introduction to Information Security Syllabus

Department of Computer & Information Sciences. CSCI-342: Introduction to Information Security Syllabus Department of Computer & Information Sciences CSCI-342: Introduction to Information Security Syllabus Course Description This course provides an introduction to the various basic technical and administrative

More information

SYLLABUS POSTGRADUATE TRAINING FOR NORDIC COMPUTER FORENSIC INVESTIGATORS. Module 3E Windows Forensics 10 ECTS

SYLLABUS POSTGRADUATE TRAINING FOR NORDIC COMPUTER FORENSIC INVESTIGATORS. Module 3E Windows Forensics 10 ECTS SYLLABUS POSTGRADUATE TRAINING FOR NORDIC COMPUTER FORENSIC INVESTIGATORS Module 3E Windows Draft for the Board at NPUC 2 December2015 (5 November) 1. Introduction Personal computing has for years been

More information

City University of Hong Kong. Course Syllabus. offered by Department of Computer Science with effect from Semester B 2016/17

City University of Hong Kong. Course Syllabus. offered by Department of Computer Science with effect from Semester B 2016/17 City University of Hong Kong offered by Department of Computer Science with effect from Semester B 2016/17 Part I Course Overview Course Title: Information Security for ecommerce Course Code: CS5285 Course

More information

BEng (Hons) Chemical Engineering (Minor: Energy Engineering) E403 (Under Review)

BEng (Hons) Chemical Engineering (Minor: Energy Engineering) E403 (Under Review) BEng (Hons) Chemical (Minor: Energy ) E403 (Under Review) 1. Introduction Chemical engineering is a broad based discipline that extends to numerous areas of technology and development. Chemical engineers

More information

Syllabus. 1. Program information. 2. Course information Instructors. 3. Total estimated time. 4. Prerequisites. Page 1/5

Syllabus. 1. Program information. 2. Course information Instructors. 3. Total estimated time. 4. Prerequisites. Page 1/5 Syllabus 1. Program information 1.1. Institution ACADEMY OF ECONOMIC STUDIES 1.2. Faculty Economic Cybernetics, Statistics and Informatics 1.3. Departments (Departament) INFORMATICA SI CIBERNETICA ECONOMICA

More information

University of San Francisco Course Syllabus and Outline

University of San Francisco Course Syllabus and Outline College of Professional Studies BSIS 340 Business Data Networks and Telecommunications University of San Francisco Fall Semester 2008 Robert C. Hughes, M.S. Email: rchughes3@usfca.edu Enrolled Student

More information

FIT3056 Secure and trusted software systems. Unit Guide. Semester 2, 2010

FIT3056 Secure and trusted software systems. Unit Guide. Semester 2, 2010 FIT3056 Secure and trusted software systems Unit Guide Semester 2, 2010 The information contained in this unit guide is correct at time of publication. The University has the right to change any of the

More information

Software Reliability and Reusability CS614

Software Reliability and Reusability CS614 Software Reliability and Reusability CS614 Assiut University Faculty of Computers & Information Quality Assurance Unit Software Reliability and Reusability Course Specifications2011-2012 Relevant program

More information

Course Outline. CISSP - Certified Information Systems Security Professional

Course Outline. CISSP - Certified Information Systems Security Professional Course Outline CISSP - Certified Information Systems Security 10 Jan 2019 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education COURSE OF STUDY 2017-2018 (C)ITM 820 Information Systems Security and Privacy

More information

Department of Computer Science

Department of Computer Science Department of Computer Science The Department of Computer Science offers a Master of Science degree and a Doctor of Philosophy degree in Computer Science. M.S. in Computer Science (p. 1) Ph.D. in Computer

More information

Computer Science Technology Department

Computer Science Technology Department Computer Science Technology Department Houston Community College Department Phone Number: ab Houston Community College ITMT 2301 - Windows Server 2008 Network Infrastructure Configuration Administering

More information

ISO LEAD AUDITOR TRAINING

ISO LEAD AUDITOR TRAINING FINAL CERTIFICATION AWARDED BY PECB CANADA ISO 22301 LEAD AUDITOR TRAINING & CERTIFICATION (Business Continuity Management) Master the Audit of Business Continuity Management System (BCMS) based on ISO

More information

Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017

Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017 Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017 ITD 3443 Network Security Students will provide Cyber Defense while understanding Cyber Threats. Their attack types

More information

San José State University Department of Computer Science CS-144, Advanced C++ Programming, Section 1, Fall 2017

San José State University Department of Computer Science CS-144, Advanced C++ Programming, Section 1, Fall 2017 San José State University Department of Computer Science CS-144, Advanced C++ Programming, Section 1, Fall 2017 Course and Contact Information Instructor: Office Location: Fabio Di Troia DH282 Telephone:

More information

CompTIA Cybersecurity Analyst+

CompTIA Cybersecurity Analyst+ CompTIA Cybersecurity Analyst+ Course CT-04 Five days Instructor-Led, Hands-on Introduction This five-day, instructor-led course is intended for those wishing to qualify with CompTIA CSA+ Cybersecurity

More information

MGMT 4336 Networks & Data Communication Section D10

MGMT 4336 Networks & Data Communication Section D10 MGMT 4336 Networks & Data Communication Section D10 Course Description/Overview A first course in data communications and networking. Topics include: IP networks and services, comparative network configurations

More information

BSc (Hons) Software Engineering (FT) - IC320

BSc (Hons) Software Engineering (FT) - IC320 BSc (Hons) Software Engineering (FT) - IC320 1. Introduction The BSc Software Engineering degree concentrates more on the skills needed for a career in the software industry by focusing on the process

More information

10EC832: NETWORK SECURITY

10EC832: NETWORK SECURITY 10EC832: NETWORK SECURITY Objective: In this electronic age, security and privacy are two of the issues whose importance cannot be stressed enough. How do we ensure the systems we use are resistant to

More information

ITSY 2330 Intrusion Detection Course Syllabus

ITSY 2330 Intrusion Detection Course Syllabus ITSY 2330 Intrusion Detection Course Syllabus Instructor Course Reference Number (CRN) Course Description: Course Prerequisite(s) Course Semester Credit Hours (SCH) (Lecture, Lab) Name: Hung Le Tel: Office:

More information

CSc 2310 Principles of Programming (Java) Jyoti Islam

CSc 2310 Principles of Programming (Java) Jyoti Islam CSc 2310 Principles of Programming (Java) Jyoti Islam Are you in the right class??? Check the CRN of your registration Instructor Jyoti Islam PhD Student, concentration: Machine Learning 4+ years of Industry

More information

E-guide CISSP Prep: 4 Steps to Achieve Your Certification

E-guide CISSP Prep: 4 Steps to Achieve Your Certification CISSP Prep: 4 Steps to Achieve Your Certification Practice for the exam and keep your skills sharp : Thank you for downloading our CISSP certification guide. Aside from this handy PDF, you can also access

More information

Cloud Security. Copyright Ramesh Nagappan. All rights reserved.

Cloud Security. Copyright Ramesh Nagappan. All rights reserved. Cloud Security 1 Cloud Security Week 1 Lecture 1 Ramesh Nagappan Harvard University Extension School Brandeis University GPS 2 Week 1 Lecture - 1 Course Introduction Evolution of Cloud Computing Introduction

More information

BEng (Hons) Mechanical Engineering - E440 (Under Review)

BEng (Hons) Mechanical Engineering - E440 (Under Review) BEng (Hons) Mechanical Engineering - E440 (Under Review) 1.0 Introduction Mechanical Engineering is the historical root of engineering practice. It gave its name to the realm of technology-based problem-solving,

More information

Washtenaw Community College Comprehensive Report. CNT 251 Designing Windows Server Security Effective Term: Fall 2012

Washtenaw Community College Comprehensive Report. CNT 251 Designing Windows Server Security Effective Term: Fall 2012 Washtenaw Community College Comprehensive Report CNT 251 Designing Windows Server Security Effective Term: Fall 2012 Course Cover Division: Business and Computer Technologies Department: Computer Instruction

More information

Syllabus Revised 01/03/2018

Syllabus Revised 01/03/2018 Department of Information Sciences and Technology Volgenau School of Engineering George Mason University Spring 2018 IT 445 Advanced Networking Principles II Syllabus Revised 01/03/2018 Section DL1: Instructor:

More information

COURSE SYLLABUS FOR COMP-162 COMPUTER CONCEPTS AND APPLICATIONS

COURSE SYLLABUS FOR COMP-162 COMPUTER CONCEPTS AND APPLICATIONS Coffeyville Community College COURSE SYLLABUS FOR COMP-162 COMPUTER CONCEPTS AND APPLICATIONS KRSN COURSE NUMBER: CSC-1010 The learning outcomes and competencies detailed in this course outline or syllabus

More information

Pearson CompTIA: Security+ SY0-401 (Course & Lab) Course Outline. Pearson CompTIA: Security+ SY0-401 (Course & Lab)

Pearson CompTIA: Security+ SY0-401 (Course & Lab) Course Outline. Pearson CompTIA: Security+ SY0-401 (Course & Lab) Course Outline Pearson CompTIA: Security+ SY0-401 (Course & Lab) 03 May 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

The University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus

The University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus The University of Jordan Accreditation & Quality Assurance Center COURSE Syllabus 1 Course title Computer Networks-1 2 Course number 1931361 Credit hours (theory, practical) 3 3 Contact hours (theory,

More information

Bachelor of Science in Business Administration - Information Systems and Technology Major

Bachelor of Science in Business Administration - Information Systems and Technology Major Bachelor of Science in Administration - Information Systems and Technology Major Ling Li, Chair Harris Wu, Information Technology Area Coordinator Roya Ardalan, Chief Discipline Advisor The information

More information

Academic Course Description

Academic Course Description BEC012 - CRYPTOGRAPHY AND NETWORK SECURITY Academic Course Description BHARATH UNIVERSITY Faculty of Engineering and Technology Department of Electronics and Communication Engineering BEC012 Cryptography

More information

CSE111 Introduction to Computer Applications

CSE111 Introduction to Computer Applications CSE111 Introduction to Computer Applications Lecture 0 Organizational Issues Prepared By Asst. Prof. Dr. Samsun M. BAŞARICI Course Title Introduction to Computer Applications Course Type 1. Compulsory

More information

Only the original curriculum in Danish language has legal validity in matters of discrepancy

Only the original curriculum in Danish language has legal validity in matters of discrepancy CURRICULUM Only the original curriculum in Danish language has legal validity in matters of discrepancy CURRICULUM OF 1 SEPTEMBER 2007 FOR THE BACHELOR OF ARTS IN INTERNATIONAL BUSINESS COMMUNICATION (BA

More information

San José State University Department of Computer Science CS158B, Computer Network Management, Section 1, Fall 2016

San José State University Department of Computer Science CS158B, Computer Network Management, Section 1, Fall 2016 San José State University Department of Computer Science CS158B, Computer Network Management, Section 1, Fall 2016 Course and Contact Information Instructor: Alberto Gonzalez Prieto Office Location: MH

More information

Academic Course Description

Academic Course Description BEC601 - COMPUTER COMMUNICATION AND NETWORKS Course (catalog) description Academic Course Description BHARATH UNIVERSITY Faculty of Engineering and Technology Department of Electronics and Communication

More information

Graduate Certificate in Internet Business

Graduate Certificate in Internet Business Graduate Certificate in Internet Business Looking for a Career in Internet Business? Since the past decade, internet and web-based technologies have evolved to become a fundamental part of operations in

More information

MASTER OF DISASTER MANAGEMENT CURRICULUM

MASTER OF DISASTER MANAGEMENT CURRICULUM MASTER OF DISASTER MANAGEMENT CURRICULUM THE FACULTY OF HEALTH AND MEDICAL SCIENCES UNIVERSITY OF COPENHAGEN CURRICULUM OF THE MASTER OF DISASTER MANAGEMENT Applicable to students enrolling in one or more

More information

Part A: Course Outline

Part A: Course Outline University of Macau Faculty of Science and Technology Course Title: Department of Electrical and Computer Engineering Part A: Course Outline Communication System and Data Network Course Code: ELEC460 Year

More information

Curriculum for the Bachelor's Degree Programme in Web Development Institutional section

Curriculum for the Bachelor's Degree Programme in Web Development Institutional section Curriculum for the Bachelor's Degree Programme in Web Development Institutional section Curriculum for the Bachelor's Degree Programme in Web Development Institutional section Table of contents 1.... 0

More information

Instructor: Eric Rettke Phone: (every few days)

Instructor: Eric Rettke Phone: (every few days) Instructor: Eric Rettke Phone: 818 364-7775 email: rettkeeg@lamission.edu (every few days) Fall 2016 Computer Science 411 - Principles of Cyber Security 1 Please keep a copy of the syllabus handy for the

More information

The University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus

The University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus The University of Jordan Accreditation & Quality Assurance Center COURSE Syllabus 1 Course title Computer Security 2 Course number 1901463 Credit hours (theory, practical) 3 3 Contact hours (theory, practical)

More information

Course Syllabus: CompTIA Network+

Course Syllabus: CompTIA Network+ Course Syllabus: CompTIA Network+ Instructor: Roger Elliott Email: relliott@c-tec.edu Phone: Office: (740) 364-2299 Cell (740) 814-7504 Courseware Course #: Hours: TestOut Network Pro 4.1 CompTIA Network+

More information

SYLLABUS. 1. Information regarding the programme 1.1 Higher education Babeş-Bolyai University of Cluj-Napoca

SYLLABUS. 1. Information regarding the programme 1.1 Higher education Babeş-Bolyai University of Cluj-Napoca SYLLABUS 1. Information regarding the programme 1.1 Higher education Babeş-Bolyai University of Cluj-Napoca institution 1.2 Faculty Faculty of Mathematics and Computer Science 1.3 Departament Departament

More information

NOTE: This syllabus is subject to change during the semester. Please check this syllabus on a regular basis for any updates.

NOTE: This syllabus is subject to change during the semester. Please check this syllabus on a regular basis for any updates. Course Syllabus NOTE: This syllabus is subject to change during the semester. Please check this syllabus on a regular basis for any updates. Department : Emergency Services Course Title : Firefighter Certification

More information

Red Hat Certified Engineer (RH300) 50 Cragwood Rd, Suite 350 South Plainfield, NJ 07080

Red Hat Certified Engineer (RH300) 50 Cragwood Rd, Suite 350 South Plainfield, NJ 07080 COURSE SYLLABUS Red Hat Certified Engineer (RH300) 50 Cragwood Rd, Suite 350 South Plainfield, NJ 07080 Victoria Commons, 613 Hope Rd Building #5, Eatontown, NJ 07724 130 Clinton Rd, Fairfield, NJ 07004

More information

Syllabus Revised 08/21/17

Syllabus Revised 08/21/17 Department of Information Sciences and Technology Volgenau School of Engineering George Mason University Fall 2017 IT 445 Advanced Networking Principles II Syllabus Revised 08/21/17 Instructor: Pouyan

More information

CompTIA A Course Overview. Course Goals. Syllabus

CompTIA A Course Overview. Course Goals. Syllabus Syllabus CompTIA A+ 220-902 Course Overview CompTIA A+ 220-902 is a one-semester course that covers the objectives of the CompTIA A+ 220-902 exam. This course begins by describing Windows operating systems.

More information

Course specification

Course specification The University of Southern Queensland Course specification Description: Object-Oriented Programming in C++ Subject CSC Cat-nbr 2402 Class 35101 Term 2, 2004 Mode ONC Units 1.00 Campus WIBAY Academic group:

More information

Syllabus: AIT Information Systems Infrastructure Lifecycle Management

Syllabus: AIT Information Systems Infrastructure Lifecycle Management Syllabus: AIT 671 - Information Systems Infrastructure Lifecycle Management Term: Fall 2014 Instructor: Jay Holcomb, Adjunct Faculty, Department of Applied Information Technology, Volgenau School of Engineering

More information

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name Telecommunications and Networks Award MSc School School of Engineering and Mathematical Sciences Department or equivalent School

More information

The University of Jordan. Accreditation & Quality Assurance Center. Curriculum for Doctorate Degree

The University of Jordan. Accreditation & Quality Assurance Center. Curriculum for Doctorate Degree Accreditation & Quality Assurance Center Curriculum for Doctorate Degree 1. Faculty King Abdullah II School for Information Technology 2. Department Computer Science الدكتوراة في علم الحاسوب (Arabic).3

More information

Textbook Charles Petzold, Programming Windows, 5th edition, Microsoft Press. References - other textbooks or materials none

Textbook Charles Petzold, Programming Windows, 5th edition, Microsoft Press. References - other textbooks or materials none CS351 Systems Programming Last Updated - 03/01/02 Course Manager Dr. Phil Dickens, Assistant Professor 3 credit hours; required for CS & CPE; 100 min. lecture & 100 min. lab each week Current Catalog Description

More information

SI - Computer Security

SI - Computer Security Coordinating unit: 270 - FIB - Barcelona School of Informatics Teaching unit: 701 - AC - Department of Computer Architecture Academic year: Degree: 2017 BACHELOR'S DEGREE IN INFORMATICS ENGINEERING (Syllabus

More information

Cyber Security Program

Cyber Security Program Cyber Security Program Cyber Security Program Goals and Objectives Goals Provide comprehensive Security Education and Awareness to the University community Build trust with the University community by

More information

Network Architecture I

Network Architecture I Network Architecture I Degree in: Communications Electronic Engineering Telecommunication Systems Engineering Telecommunication Technologies Engineering Telematics Engineering Universidad de Alcalá 2016/17

More information

City University of Hong Kong Course Syllabus. offered by Department of Computer Science with effect from Semester B 2017/18

City University of Hong Kong Course Syllabus. offered by Department of Computer Science with effect from Semester B 2017/18 City University of Hong Kong offered by Department of Computer Science with effect from Semester B 2017/18 Part I Course Overview Course Title: Internet Security and E-Commerce Protocols Course Code: CS4286

More information

Syllabus CSCI 405 Operating Systems Fall 2018

Syllabus CSCI 405 Operating Systems Fall 2018 Syllabus CSCI 405 Operating Systems Fall 2018 1.0 General Information Class Time: Monday/Wednesday/Friday 11:00 AM - 11:50 AM Class Location: 317 Thompson Instructor: Dr. Deepti Joshi; Office: 224 Thompson;

More information

Digital Communication and Aesthetics,

Digital Communication and Aesthetics, Curriculum for the Elective Study at Bachelor Level in Digital Communication and Aesthetics, 2016 Corrected 2017 Amended 2018 Department of Media, Cognition and Communication Faculty of Humanities University

More information

Pearson CISSP Cert Guide with Labs. Course Outline. Pearson CISSP Cert Guide with Labs. 17 Oct

Pearson CISSP Cert Guide with Labs. Course Outline. Pearson CISSP Cert Guide with Labs. 17 Oct Course Outline Pearson CISSP Cert Guide with Labs 17 Oct 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training

More information

Course Syllabus: CompTIA A+ Hardware

Course Syllabus: CompTIA A+ Hardware Course Syllabus: CompTIA A+ Hardware Instructor: Email: Phone: Office: (740) 364-364-2299 Cell: Course Material: CompTIA A+ Certification (Exam 220-901) 30Bird Media Supplemental Material Course #: Hours:

More information

Computing Accreditation Commission Version 2.0 CRITERIA FOR ACCREDITING COMPUTING PROGRAMS

Computing Accreditation Commission Version 2.0 CRITERIA FOR ACCREDITING COMPUTING PROGRAMS Computing Accreditation Commission Version 2.0 CRITERIA FOR ACCREDITING COMPUTING PROGRAMS Optional for Reviews During the 2018-2019 Accreditation Cycle Mandatory for Reviews During the 2019-2020 Accreditation

More information

NOTE: This syllabus is subject to change during the semester. Please check this syllabus on a regular basis for any updates.

NOTE: This syllabus is subject to change during the semester. Please check this syllabus on a regular basis for any updates. Course Syllabus NOTE: This syllabus is subject to change during the semester. Please check this syllabus on a regular basis for any updates. Department : Emergency Services Course Title : Firefighter Certification

More information

KEY PROGRAMME INFORMATION. Originating institution(s) Bournemouth University. Faculty responsible for the programme Faculty of Science and Technology

KEY PROGRAMME INFORMATION. Originating institution(s) Bournemouth University. Faculty responsible for the programme Faculty of Science and Technology KEY PROGRAMME INFORMATION Originating institution(s) Bournemouth University Faculty responsible for the programme Faculty of Science and Technology Final award(s), title(s) and credits 20 (60 ECTS) Level

More information

ESET 349 Microcontroller Architecture, Fall 2018

ESET 349 Microcontroller Architecture, Fall 2018 ESET 349 Microcontroller Architecture, Fall 2018 Syllabus Contact Information: Professor: Dr. Byul Hur Office: 008 Fermier Telephone: (979) 845-5195 FAX: E-mail: byulmail@tamu.edu Web: rftestgroup.tamu.edu

More information

ASTON UNIVERSITY PROGRAMME SPECIFICATION

ASTON UNIVERSITY PROGRAMME SPECIFICATION ASTON UNIVERSITY PROGRAMME SPECIFICATION Programme Title UCAS/JACS School/Subject Area Final Award Interim Awards Mode(s) of Study Normal Length of Programme Total Credits Programme Accredited By Dates

More information

Module Documentation

Module Documentation Module Documentation INFO07017 Contents of this document are copyright of Galway Mayo Institute of Technology Page 1 of 5 INFO07017 Short Title Full Title Attendance N/A Discipline 482 COMPUTER USE (INFO

More information

San José State University Department of Computer Science CS 166 / SE 166, Information Security, Section 4, spring, 2017

San José State University Department of Computer Science CS 166 / SE 166, Information Security, Section 4, spring, 2017 San José State University Department of Computer Science CS 166 / SE 166, Information Security, Section 4, spring, 2017 Course and Contact Information Instructor: Prakash Atawale Office Location: DH 282

More information

Rochester Institute of Technology Golisano College of Computing and Information Sciences Department of Information Sciences and Technologies

Rochester Institute of Technology Golisano College of Computing and Information Sciences Department of Information Sciences and Technologies Rochester Institute of Technology Golisano College of Computing and Information Sciences Department of Information Sciences and Technologies 4002-360.01 ~ Introduction to Database & Data Modeling ~ Spring

More information

Computer Science Technology Department

Computer Science Technology Department Computer Science Technology Department Houston Community College Department Phone Number: ab Houston Community College ITSC 1309 Integrated Software Applications I Course Syllabus Instructor Course Reference

More information

CURRICULUM MASTER OF DISASTER MANAGEMENT

CURRICULUM MASTER OF DISASTER MANAGEMENT CURRICULUM MASTER OF DISASTER MANAGEMENT Applicable to students enrolling in one or more of the below components of the Master of Disaster Management (MDMa) as of September 1 st 2013 The programme is delivered

More information

CPSC 4600 Biometrics and Cryptography Fall 2013, Section 0

CPSC 4600 Biometrics and Cryptography Fall 2013, Section 0 CPSC 4600 Biometrics and Cryptography Fall 2013, Section 0 Course: CPSC4600, Section 0, CRN 42532 Title: Biometrics and Cryptography Class Schedule: EMCS302, MW 2:00 pm-3:15 pm Credit: 3 Faculty: Dr. Li

More information

Course specification

Course specification The University of Southern Queensland Course specification Description: Object-Oriented Programming in C++ Subject Cat-nbr Class Term Mode Units Campus CSC 2402 30366 1, 2004 ONC 1.00 TWMBA Academic group:

More information

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each. Name Date Chapter 10: Security After completion of this chapter, students should be able to: Explain why security is important and describe security threats. Explain social engineering, data wiping, hard

More information

TREASURY BANKING OPERATIONS Certification Program

TREASURY BANKING OPERATIONS Certification Program FINAL CERTIFICATION AWARDED BY IMRTC - USA TREASURY BANKING OPERATIONS Certification Program This highly specialized and concentrated Program is ideally suited to following individuals who: Are fresh University

More information

PRINCE GEORGE'S COMMUNITY COLLEGE OFFICE OF INSTRUCTION MASTER COURSE SYLLABUS

PRINCE GEORGE'S COMMUNITY COLLEGE OFFICE OF INSTRUCTION MASTER COURSE SYLLABUS PRINCE GEORGE'S COMMUNITY COLLEGE OFFICE OF INSTRUCTION MASTER COURSE SYLLABUS CIS 101 Computer Literacy Michael Burt 12/19/2006 Course Designator and Title Prepared by Date Barry Bugg ` Dr. Aaron Stucker

More information

PELLISSIPPI STATE COMMUNITY COLLEGE MASTER SYLLABUS WINDOWS PROFESSIONAL CSIT 2700

PELLISSIPPI STATE COMMUNITY COLLEGE MASTER SYLLABUS WINDOWS PROFESSIONAL CSIT 2700 PELLISSIPPI STATE COMMUNITY COLLEGE MASTER SYLLABUS WINDOWS PROFESSIONAL CSIT 2700 Class Hours: 3.0 Credit Hours: 4.0 Laboratory Hours: 3.0 Revised: Spring 2010 Catalog Course Description: The course covers

More information

ITT Technical Institute. NT2740 Advanced Networking Devices Onsite and Online Course SYLLABUS

ITT Technical Institute. NT2740 Advanced Networking Devices Onsite and Online Course SYLLABUS ITT Technical Institute NT2740 Advanced Networking Devices Onsite and Online Course SYLLABUS Credit hours: 3 Contact/Instructional hours: 40 (20 Theory Hours, 20 Lab Hours) Prerequisite(s) and/or Corequisite(s):

More information

Course Curriculum for Master Degree in Network Engineering and Security

Course Curriculum for Master Degree in Network Engineering and Security Course Curriculum for Master Degree in Network Engineering and Security The Master Degree in Network Engineering and Security is awarded by the Faculty of Graduate Studies at Jordan University of Science

More information

The GenCyber Program. By Chris Ralph

The GenCyber Program. By Chris Ralph The GenCyber Program By Chris Ralph The Mission of GenCyber Provide a cybersecurity camp experience for students and teachers at the K-12 level. The primary goal of the program is to increase interest

More information

Descriptions for CIS Classes (Fall 2017)

Descriptions for CIS Classes (Fall 2017) Descriptions for CIS Classes (Fall 2017) Major Core Courses 1. CIS 1015. INTRODUCTION TO COMPUTER INFORMATION SYSTEMS. (3-3-0). This course provides students an introductory overview to basic computer

More information