«Approve» The Dean of the Faculty of Radio Engineering, Telecommunications and Communications Medeuov U year
|
|
- Warren Richard Rogers
- 6 years ago
- Views:
Transcription
1 Ministry of Education and Science of the Republic of Kazakhstan Non-Profit JSC «Almaty University of Power Engineering and Telecommunications» Faculty of Radio Engineering, Telecommunications and Communications The department of Electronics and Robotics «Approve» The Dean of the Faculty of Radio Engineering, Telecommunications and Communications Medeuov U year Syllabus Information security systems for the specialty «5B Instrument construction» Year of study 4-rd Semester 7-th Number of credits 3 Total ECTS credits 6 Total hours 135 including: lectures 30 h practical classes 15 h Self-study assignments (SSA) 90 h including: self-study under the teacher s supervision (SSTUS) 30h Computation graphic work 3 Examination Almaty 2017
2 The Course Syllabus has been developed by T. V. Golubeva, senior teacher. The syllabus is based on the curriculum and the standard program of the discipline for the specialty «5B Instrument construction» Work program was considered and approved at the meeting of department «Electronics and Robotics» from , Protocol 11. Head of Department Balbaev G.K. Work program was considered and approved at the meeting of an educational and methodical commission of the faculty Radio Engineering, Telecommunications and Communications (the protocol 8, from ). About teacher: Golubeva T. V., senior-teacher. Published 16 scientific articles and methodical works, scientific and pedagogical experience is 10 years. Laboratory classes according to the discipline are held in laboratory Б-329. Office: «Electronics and Robotics» department Address: , Almaty, Baitursynov street, 126. AUPET
3 1 Teacher: Golubeva T. V. senior teacher of «Electronics and Robotics» department. Contacts: 8(727) , 2 Time and place of classes are indicated in the schedule of training sessions, schedule of consultation is posted on the Dean's Office s and department s message boards. 3 Prerequisites: «Information», «Algorithmization and programming». 4 Post requisites: No requsites 5 Characteristics 5.1 The aim acquisition of fundamental knowledge about the basic principles of information security, as well as providing information security. Definitions of the main concepts are given: cryptography, privacy, integrity, autentification, digital signature. 5.2 Task to learn the main methods of modern means of information security in computer systems and networks. 5.3 Description The discipline is for students of specialty «5B Instrument construction» and aims to acquaint students with the basics of security systems and learn methods of evaluating protecting information, as well as to acquaint with the means of information systems against data loss and the possibility of predicting the state of security systems. At the end of the course «Design of cooling devices CMD and system HEC» student must know: about legislative and regulatory framework in providing security in information systems; about the conditions and factors affecting their working capacity during the transmission of information; about monitoring procedures in the areas of security and protection of information in information systems; basic technologies of providing security in information systems and their possibilities; main methods of information security in information systems; be able to: provide security of information during the transmission; apply methods for choosing the best way to ensure the protection of information in information systems; organize and carry out examination according to the protection of information in information systems.
4 The Course content 6.1 Lectures Theme The number of source 1 Introduction. Basic concepts of software and hardware protection. (2 hours) 2 Analysis of often used threats and vulnerabilities protection. (2 hours) 3 Malicious software. (2 hours) 4 Antivirus programs. (2 hours) 5 Adware. Spyware. The protection from them. (2 hours) 6 Classification of firewalls. (2 hours) 7 Screening as a security service. (2 hours) 8 Tunneling and management as security service. (2 hours) 9 Administrative level of information security. The security policy. (2 hours) 10 Administrative level of information security. The program of security. (2 hours) 11 Purpose of hardware protection. Classification. Hardware protection of software. (2 hours) 12 Hardware protection of computer and information. Hardware protection of network firewalls. (2 hours) 13 Kerberos Authentication service. Identification/ authentication with the help if the biometrical data (2 hours) 14 The use of object-oriented approach to the protected systems. (2 hours) 15 Disadvantages of traditional approach to information security from the object viewpoint (2 hours)
5 6.2 List of practical classes Methodological recommendations for work execution can be found in printed form at «Electronics» department. It is necessary to use the basic and additional literature from the list in paragraph 10. Theme Source 1 Investigation of the operating system with the help of the utility AVZ. (4 hours) 2 Setting up the hardware firewall. Simulation of protection against network attacks with the help of Packet Tracer 5.0. Construction of access lists (4 hours) 3 Construction of the tunnel on the basis of Packet Tracer 5.0. Demonstration of model (4 hours) 4 Configuring Local Security Policy snap-in using "Group Policy" (4 hours) 6.3 Themes for computation graphic work (CGW) 1, 3, 5 1, 3, 5 1, 3, 5 1, 3, 5 Methodological recommendations for work execution can be found in printed form at «Electronics» department. It is necessary to use the basic and additional literature from the list in paragraph 10. Theme of CGW 1: Based on the known data about virus develop a manual treatment algorithm. Bring screenshots for used programs and commands. Theme of CGW 2: The network virus attack. Based on Packet Tracer 5.0 demonstrate method of attack detection and its blocking. Theme of CGW 3: The overload of local network elements and external channel of enterprise. Based on Packet Tracer 5.0 demonstrate the method of detecting internal attack, its localization and blocking. Carried out in accordance to the guidelines. Tasks are given during the first week of a semester. 6.4 Themes of Self-Study Activities (SSA) SSAs are held according to the themes of lectures, laboratory glasses and CGWs. 6.5 Exam questions 1. Object-oriented approach to information security facilities. 2. Application of the object oriented approach to the protected systems. 3. Disadvantages of the traditional approach to information security with the object point of view. 4. Active and passive subjects.
6 5. The criteria for the classification of threats. Security threats. 6. Security damage. 7. Classification of threats in relation to the supporting infrastructure. 8. The most common threats to availability. 9. The classification of the main sources of internal failures. 10.Malicious software. 11.Safe and secure system. 12.The main threats to the integrity. 13.Secure policy. 14.The attack on a computer system. 15.The main privacy threats. 16.Abuse of functions. 17.Kerberos authentication server. 18.The Administrative level of information security. 19.Security Program. 20.The main security threats. 21.The main goals of the security program. 22.Synchronization if security software with the lifecycle. 23.Identification / authentication using biometric data. 24.Masquerade. The concept and its use. 25.Interception of passwords and how to intercept passwords. 26.Trojan horse. Concept and its destructive functions. A number of measures that are necessary to protect a system. 27.Worm. Concept and its destructive functions. A number of measures that are necessary to protect a system. 28. Computer virus. Subfamily. A number of measures that are necessary to protect a system. 29. Screening as a security service. 30.Classification of firewalls. 31.Security analysis as security service. 32.Tunneling as security service. 33.The management, as a security service. 34.The concept of the proactive management. 35.The concept of trusted or delegated management. 36.Security of object reuse. 37.Limiting interface, as a kind of screening. 38.The separation of defense. 39.A two-component shielding with a demilitarized zone. 40.The concept of hardware and software protection. 6 Information on assessing the achievements of students 6.1 Evaluation system The level of the student's achievements in the course program is assessed on the scale of the final grades accepted in the credit technology of training (Table 1). Table 1 Alphabetic Points Percentage content Traditional
7 А 4, Excellent А- 3, Excellent В+ 3, Good В 3, Good В- 2, Good С+ 2, Satisfactorily С 2, Satisfactorily С- 1, Satisfactorily D+ 1, Satisfactorily 1, Satisfactorily F Unsatisfactorily The rating of the access rating is accumulated during the semester. Each type of training is assessed on a 100-point scale and included in the tolerance rating, taking into account the weighting factor in accordance with Table 2. Table 2 - Tolerance rating. Significance of each type of work Parameter Weight coefficient Performance of laboratory workshop 0,4 Course work 0,4 Attending lectures 0,2 Total: average assessment of current controls (Ср) 1,0 The admission rating for the discipline (Rating) for bachelors and undergraduates is calculated by the PLATONUS program using the formula: Rating= Р1+Р2 0,2+Ср 0,8, 2 where Р1 - an estimation for the first boundary control; P2 - estimate for the second boundary control; Cp is the arithmetic average of all completed assignments from 1 to 15 weeks (performing CGW, laboratory and course work, etc. Each task is evaluated on a 100-point scale). The final grade for the discipline is calculated by the formula: The final grade = 0,6 Rating + 0,4 E, где E exam assessment. 6.2 Pointing Policy: The maximum scores are given on condition of rhythmic performance and high quality of work. Evaluation scores for testing and attending lecture classes are given depending on the number of correct answers and the number of missed lectures. 6.3 Translation of assessments in the organization of academic mobility of students The translation of the ECTS (European Transfer (Transfer) and Accumulation of Credits) ratings into a rating-rating letter system for assessing the educational achievements of students of the RK and back is carried out according to Tables 3 and 4. Table 3 - Conversion of ECTS scores to a point-rating alphabetic system for assessing the educational achievements of students of the RK Estimated by ECTS Alphabetic Digital equivalent Points Percentage content А А 4,0 100 Excellent В В+ 3,33 85 С В 3,0 80 Good D С 2,0 65 E D 1,0 50 Satisfactorily Traditional
8 FX, F F 0 0 Unsatisfactory Table 4 - Translation of scores of the pointsrating alphabetic system RK into the assessments by ECTS Digital Percentage Estimated by Alphabetic equivalent Traditional content ECTS Points А 4, А- 3, Excellent А В+ 3, Good В В 3, Good В- 2, С С+ 2, Satisfactorily С 2, С- 1, Satisfactorily D D+ 1, D 1, Satisfactorily E F Unsatisfactory FX, F 7 Policy of the course: - do not be late and do not miss classes; - closely monitor the instructor's scenario, actively participating in it; - practice laboratory exercises missed for valid reasons (if there is an admission from the dean's office); - the course work for the defense to represent no later than the penultimate week of the semester: - self study in the library and at home. 8 Standards of academic ethics: - discipline; - good breeding; - benevolence; - honesty; - a responsibility; - work in the classroom with disabled cell phones. Conflict situations should be openly discussed in training groups with a teacher, an adviser, and if the conflict is not resolved, they should be brought to the dean's office. 9 Recommended books and materials Main: 1. Галатенко В.А. Основы информационной безопасности.-м., Основы информационной безопасности./под ред. Е.Б.Белов и др.- М., Малюк А.А. Информационная безопасность: Концептуальные и методологические основы защита информации.-м., Петраков А.В. Основы практической защиты информации.-м., Рябко Б.Я. Криптографические методы защиты информации.-м., Гордейчик С.В. Безопасность беспроводных сетей.-м., Соболев А.Н. Физические основы технических средств обеспечения информационной безопасности.-м.,2006 Additional: 1. Максим Мерритт Безопасность беспроводных сетей.-м., Партыка Т.П. Информационная безопасность.-м.,2008
9 3. Прохода А.Н. Обеспечение интернет- безопасности.-м., Информационная безопасность. Компьютерных систем и сетей.-м., Романов О.А. Организационное обеспечение информационной безопасности.-м., Смит Д.Дж. Функциональная безопасность.-м.,2006
Network Security
44-555 Network Security Instructor: Scott Bell Office: 2220 Colden Hall Email: sbell@nwmissouri.edu Phone: (660) 562-1699 Description: An introduction to the fundamentals of network security, including
More informationITSY Information Technology Security Course Syllabus Spring 2018
ITSY 1342 - Information Technology Security Course Syllabus Spring 2018 Instructor Course Reference Number (CRN) Course Description: Name: Fidelis Ngang Tel: 713-718-5552 Office: Spring Branch, Room 900L
More informationComputer Science Technology Department
Computer Science Technology Department Houston Community College Department Phone Number: 713-718-6776 Houston Community College ITMT 2373 - Configuring Advanced Windows Server 2012 Services Course Syllabus
More informationMORGAN STATE UNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING COURSE SYLLABUS FALL, 2015
MORGAN STATE UNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING COURSE SYLLABUS FALL, 2015 CATALOG DESCRIPTION ONLINE EEGR.483 INTRODUCTION TO SECURITY MANAGEMENT CREDITS: 3 THIS COURSE IS A
More informationUNIT OUTLINE. Network Engineering 304. Mr Iain Murray. Department of Electrical and Computer Engineering Curtin Engineering
305682 Network Engineering 304 Mr Iain Murray Department of Electrical and Computer Engineering Curtin Engineering UNIT OUTLINE Semester 2 2009 CRICOS (Perth - 00301J) (Sydney - 02637B) Table of Contents
More informationComputer Science Technology Department
Computer Science Technology Department Houston Community College Department Phone Number: ab Houston Community College ITMT 1370 Windows Client Operating System - Windows 10 Course Syllabus Summer 2017
More informationAdvisory: Students should have already taken MICROCOMPUTER APPLICATIONS II - 431
Cyber Security I - CoSci 411 Los Angeles Mission College - Spring 2018 Instructor: Javier Rios E-mail: rios.javier@gmail.com E-mail communications will be will receive a response within 24 hours. Advisory:
More informationSyllabus for CIT 442 Information System Security 3 Credit Hours Spring 2015
Syllabus for CIT 442 Information System Security 3 Credit Hours Spring 2015 I. COURSE DESCRIPTION An overview of information system security to include managing security, protecting information technology
More informationStandard Course Outline IS 656 Information Systems Security and Assurance
Standard Course Outline IS 656 Information Systems Security and Assurance I. General Information s Course number: IS 656 s Title: Information Systems Security and Assurance s Units: 3 s Prerequisites:
More informationBEng (Hons) Civil Engineering E410 (Under Review)
BEng (Hons) Civil Engineering E410 (Under Review) 1.0 Introduction The aim of the degree programme is to provide students with a sound knowledge and understanding of the subject of Civil Engineering and
More informationSan José State University Department of Computer Science CS166, Information Security, Section 1, Fall, 2018
Course and Contact Information Instructor: Office Location: San José State University Department of Computer Science CS166, Information Security, Section 1, Fall, 2018 Fabio Di Troia DH282 Telephone: 408-924-7171
More informationCOMPUTER AND NETWORK SUPPORT TECHNICIAN PROGRAM
Network + Networking NH5200 Fundamentals COURSE TITLE: Network+ Networking Fundamentals 104 Total Hours 66 Theory Hours 38 Laboratory Hours COURSE OVERVIEW: After completing this course, students will
More informationBEng (Hons) Electronic and Communication Engineering - E431 (Under Review)
BEng (Hons) Electronic and Communication Engineering - E431 (Under Review) 1. Introduction The field of Electronic and Communication Engineering is one that currently evolves at an extremely fast rate.
More informationBSc (Honours) Computer Science Curriculum Outline
BSc (Honours) Computer Science Curriculum Outline 1. Introduction: The economic and strategic importance provided by Computer Science and Information Technology is increasing daily. This importance is
More informationISO Lead Auditor Program Risk Management System (RMS) Training Program
FINAL CERTIFICATION AWARDED BY PECB CANADA ISO 31000 Lead Auditor Program Risk Management System (RMS) Training Program ISO 31000 Lead Auditor Risk Manager training enables you to gain comprehensive and
More informationHOLY ANGEL UNIVERSITY COLLEGE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY CYBER SECURITY COURSE SYLLABUS
HOLY ANGEL UNIVERSITY LLEGE OF INFORMATION AND MMUNICATIONS TECHNOLOGY CYBER SECURITY URSE SYLLABUS Course Code : 6CSEC Prerequisite : 6MPRO2L Course Credit : 3 Units (2 hours LEC,3 hours LAB) Year Level:
More informationCyber Security CYBER SECURITY
Cyber Security We live in a digital world. Whether it s keeping in touch with friends, operating a city s energy grid or strengthening national security, it happens online. The need to secure our networks
More informationCONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING
MAJOR: DEGREE: COMPUTER SCIENCE MASTER OF SCIENCE (M.S.) CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING The Department of Computer Science offers a Master of Science
More informationASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Technology. on Technology. IT PH.D. Program.
ASSIUT UNIVERSITY Faculty of Computers and Information Department of Information Technology Informatiio on Technology PhD Program IT PH.D. Program Page 0 Assiut University Faculty of Computers & Informationn
More informationSan José State University Department of Computer Science CS-174, Server-side Web Programming, Section 2, Spring 2018
San José State University Department of Computer Science CS-174, Server-side Web Programming, Section 2, Spring 2018 Course and Contact Information Instructor: Office Location: Fabio Di Troia DH282 Telephone:
More informationDepartment of Computer & Information Sciences. CSCI-342: Introduction to Information Security Syllabus
Department of Computer & Information Sciences CSCI-342: Introduction to Information Security Syllabus Course Description This course provides an introduction to the various basic technical and administrative
More informationSYLLABUS POSTGRADUATE TRAINING FOR NORDIC COMPUTER FORENSIC INVESTIGATORS. Module 3E Windows Forensics 10 ECTS
SYLLABUS POSTGRADUATE TRAINING FOR NORDIC COMPUTER FORENSIC INVESTIGATORS Module 3E Windows Draft for the Board at NPUC 2 December2015 (5 November) 1. Introduction Personal computing has for years been
More informationCity University of Hong Kong. Course Syllabus. offered by Department of Computer Science with effect from Semester B 2016/17
City University of Hong Kong offered by Department of Computer Science with effect from Semester B 2016/17 Part I Course Overview Course Title: Information Security for ecommerce Course Code: CS5285 Course
More informationBEng (Hons) Chemical Engineering (Minor: Energy Engineering) E403 (Under Review)
BEng (Hons) Chemical (Minor: Energy ) E403 (Under Review) 1. Introduction Chemical engineering is a broad based discipline that extends to numerous areas of technology and development. Chemical engineers
More informationSyllabus. 1. Program information. 2. Course information Instructors. 3. Total estimated time. 4. Prerequisites. Page 1/5
Syllabus 1. Program information 1.1. Institution ACADEMY OF ECONOMIC STUDIES 1.2. Faculty Economic Cybernetics, Statistics and Informatics 1.3. Departments (Departament) INFORMATICA SI CIBERNETICA ECONOMICA
More informationUniversity of San Francisco Course Syllabus and Outline
College of Professional Studies BSIS 340 Business Data Networks and Telecommunications University of San Francisco Fall Semester 2008 Robert C. Hughes, M.S. Email: rchughes3@usfca.edu Enrolled Student
More informationFIT3056 Secure and trusted software systems. Unit Guide. Semester 2, 2010
FIT3056 Secure and trusted software systems Unit Guide Semester 2, 2010 The information contained in this unit guide is correct at time of publication. The University has the right to change any of the
More informationSoftware Reliability and Reusability CS614
Software Reliability and Reusability CS614 Assiut University Faculty of Computers & Information Quality Assurance Unit Software Reliability and Reusability Course Specifications2011-2012 Relevant program
More informationCourse Outline. CISSP - Certified Information Systems Security Professional
Course Outline CISSP - Certified Information Systems Security 10 Jan 2019 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led
More informationRYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education
RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education COURSE OF STUDY 2017-2018 (C)ITM 820 Information Systems Security and Privacy
More informationDepartment of Computer Science
Department of Computer Science The Department of Computer Science offers a Master of Science degree and a Doctor of Philosophy degree in Computer Science. M.S. in Computer Science (p. 1) Ph.D. in Computer
More informationComputer Science Technology Department
Computer Science Technology Department Houston Community College Department Phone Number: ab Houston Community College ITMT 2301 - Windows Server 2008 Network Infrastructure Configuration Administering
More informationISO LEAD AUDITOR TRAINING
FINAL CERTIFICATION AWARDED BY PECB CANADA ISO 22301 LEAD AUDITOR TRAINING & CERTIFICATION (Business Continuity Management) Master the Audit of Business Continuity Management System (BCMS) based on ISO
More informationOklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017
Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017 ITD 3443 Network Security Students will provide Cyber Defense while understanding Cyber Threats. Their attack types
More informationSan José State University Department of Computer Science CS-144, Advanced C++ Programming, Section 1, Fall 2017
San José State University Department of Computer Science CS-144, Advanced C++ Programming, Section 1, Fall 2017 Course and Contact Information Instructor: Office Location: Fabio Di Troia DH282 Telephone:
More informationCompTIA Cybersecurity Analyst+
CompTIA Cybersecurity Analyst+ Course CT-04 Five days Instructor-Led, Hands-on Introduction This five-day, instructor-led course is intended for those wishing to qualify with CompTIA CSA+ Cybersecurity
More informationMGMT 4336 Networks & Data Communication Section D10
MGMT 4336 Networks & Data Communication Section D10 Course Description/Overview A first course in data communications and networking. Topics include: IP networks and services, comparative network configurations
More informationBSc (Hons) Software Engineering (FT) - IC320
BSc (Hons) Software Engineering (FT) - IC320 1. Introduction The BSc Software Engineering degree concentrates more on the skills needed for a career in the software industry by focusing on the process
More information10EC832: NETWORK SECURITY
10EC832: NETWORK SECURITY Objective: In this electronic age, security and privacy are two of the issues whose importance cannot be stressed enough. How do we ensure the systems we use are resistant to
More informationITSY 2330 Intrusion Detection Course Syllabus
ITSY 2330 Intrusion Detection Course Syllabus Instructor Course Reference Number (CRN) Course Description: Course Prerequisite(s) Course Semester Credit Hours (SCH) (Lecture, Lab) Name: Hung Le Tel: Office:
More informationCSc 2310 Principles of Programming (Java) Jyoti Islam
CSc 2310 Principles of Programming (Java) Jyoti Islam Are you in the right class??? Check the CRN of your registration Instructor Jyoti Islam PhD Student, concentration: Machine Learning 4+ years of Industry
More informationE-guide CISSP Prep: 4 Steps to Achieve Your Certification
CISSP Prep: 4 Steps to Achieve Your Certification Practice for the exam and keep your skills sharp : Thank you for downloading our CISSP certification guide. Aside from this handy PDF, you can also access
More informationCloud Security. Copyright Ramesh Nagappan. All rights reserved.
Cloud Security 1 Cloud Security Week 1 Lecture 1 Ramesh Nagappan Harvard University Extension School Brandeis University GPS 2 Week 1 Lecture - 1 Course Introduction Evolution of Cloud Computing Introduction
More informationBEng (Hons) Mechanical Engineering - E440 (Under Review)
BEng (Hons) Mechanical Engineering - E440 (Under Review) 1.0 Introduction Mechanical Engineering is the historical root of engineering practice. It gave its name to the realm of technology-based problem-solving,
More informationWashtenaw Community College Comprehensive Report. CNT 251 Designing Windows Server Security Effective Term: Fall 2012
Washtenaw Community College Comprehensive Report CNT 251 Designing Windows Server Security Effective Term: Fall 2012 Course Cover Division: Business and Computer Technologies Department: Computer Instruction
More informationSyllabus Revised 01/03/2018
Department of Information Sciences and Technology Volgenau School of Engineering George Mason University Spring 2018 IT 445 Advanced Networking Principles II Syllabus Revised 01/03/2018 Section DL1: Instructor:
More informationCOURSE SYLLABUS FOR COMP-162 COMPUTER CONCEPTS AND APPLICATIONS
Coffeyville Community College COURSE SYLLABUS FOR COMP-162 COMPUTER CONCEPTS AND APPLICATIONS KRSN COURSE NUMBER: CSC-1010 The learning outcomes and competencies detailed in this course outline or syllabus
More informationPearson CompTIA: Security+ SY0-401 (Course & Lab) Course Outline. Pearson CompTIA: Security+ SY0-401 (Course & Lab)
Course Outline Pearson CompTIA: Security+ SY0-401 (Course & Lab) 03 May 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led
More informationThe University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus
The University of Jordan Accreditation & Quality Assurance Center COURSE Syllabus 1 Course title Computer Networks-1 2 Course number 1931361 Credit hours (theory, practical) 3 3 Contact hours (theory,
More informationBachelor of Science in Business Administration - Information Systems and Technology Major
Bachelor of Science in Administration - Information Systems and Technology Major Ling Li, Chair Harris Wu, Information Technology Area Coordinator Roya Ardalan, Chief Discipline Advisor The information
More informationAcademic Course Description
BEC012 - CRYPTOGRAPHY AND NETWORK SECURITY Academic Course Description BHARATH UNIVERSITY Faculty of Engineering and Technology Department of Electronics and Communication Engineering BEC012 Cryptography
More informationCSE111 Introduction to Computer Applications
CSE111 Introduction to Computer Applications Lecture 0 Organizational Issues Prepared By Asst. Prof. Dr. Samsun M. BAŞARICI Course Title Introduction to Computer Applications Course Type 1. Compulsory
More informationOnly the original curriculum in Danish language has legal validity in matters of discrepancy
CURRICULUM Only the original curriculum in Danish language has legal validity in matters of discrepancy CURRICULUM OF 1 SEPTEMBER 2007 FOR THE BACHELOR OF ARTS IN INTERNATIONAL BUSINESS COMMUNICATION (BA
More informationSan José State University Department of Computer Science CS158B, Computer Network Management, Section 1, Fall 2016
San José State University Department of Computer Science CS158B, Computer Network Management, Section 1, Fall 2016 Course and Contact Information Instructor: Alberto Gonzalez Prieto Office Location: MH
More informationAcademic Course Description
BEC601 - COMPUTER COMMUNICATION AND NETWORKS Course (catalog) description Academic Course Description BHARATH UNIVERSITY Faculty of Engineering and Technology Department of Electronics and Communication
More informationGraduate Certificate in Internet Business
Graduate Certificate in Internet Business Looking for a Career in Internet Business? Since the past decade, internet and web-based technologies have evolved to become a fundamental part of operations in
More informationMASTER OF DISASTER MANAGEMENT CURRICULUM
MASTER OF DISASTER MANAGEMENT CURRICULUM THE FACULTY OF HEALTH AND MEDICAL SCIENCES UNIVERSITY OF COPENHAGEN CURRICULUM OF THE MASTER OF DISASTER MANAGEMENT Applicable to students enrolling in one or more
More informationPart A: Course Outline
University of Macau Faculty of Science and Technology Course Title: Department of Electrical and Computer Engineering Part A: Course Outline Communication System and Data Network Course Code: ELEC460 Year
More informationCurriculum for the Bachelor's Degree Programme in Web Development Institutional section
Curriculum for the Bachelor's Degree Programme in Web Development Institutional section Curriculum for the Bachelor's Degree Programme in Web Development Institutional section Table of contents 1.... 0
More informationInstructor: Eric Rettke Phone: (every few days)
Instructor: Eric Rettke Phone: 818 364-7775 email: rettkeeg@lamission.edu (every few days) Fall 2016 Computer Science 411 - Principles of Cyber Security 1 Please keep a copy of the syllabus handy for the
More informationThe University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus
The University of Jordan Accreditation & Quality Assurance Center COURSE Syllabus 1 Course title Computer Security 2 Course number 1901463 Credit hours (theory, practical) 3 3 Contact hours (theory, practical)
More informationCourse Syllabus: CompTIA Network+
Course Syllabus: CompTIA Network+ Instructor: Roger Elliott Email: relliott@c-tec.edu Phone: Office: (740) 364-2299 Cell (740) 814-7504 Courseware Course #: Hours: TestOut Network Pro 4.1 CompTIA Network+
More informationSYLLABUS. 1. Information regarding the programme 1.1 Higher education Babeş-Bolyai University of Cluj-Napoca
SYLLABUS 1. Information regarding the programme 1.1 Higher education Babeş-Bolyai University of Cluj-Napoca institution 1.2 Faculty Faculty of Mathematics and Computer Science 1.3 Departament Departament
More informationNOTE: This syllabus is subject to change during the semester. Please check this syllabus on a regular basis for any updates.
Course Syllabus NOTE: This syllabus is subject to change during the semester. Please check this syllabus on a regular basis for any updates. Department : Emergency Services Course Title : Firefighter Certification
More informationRed Hat Certified Engineer (RH300) 50 Cragwood Rd, Suite 350 South Plainfield, NJ 07080
COURSE SYLLABUS Red Hat Certified Engineer (RH300) 50 Cragwood Rd, Suite 350 South Plainfield, NJ 07080 Victoria Commons, 613 Hope Rd Building #5, Eatontown, NJ 07724 130 Clinton Rd, Fairfield, NJ 07004
More informationSyllabus Revised 08/21/17
Department of Information Sciences and Technology Volgenau School of Engineering George Mason University Fall 2017 IT 445 Advanced Networking Principles II Syllabus Revised 08/21/17 Instructor: Pouyan
More informationCompTIA A Course Overview. Course Goals. Syllabus
Syllabus CompTIA A+ 220-902 Course Overview CompTIA A+ 220-902 is a one-semester course that covers the objectives of the CompTIA A+ 220-902 exam. This course begins by describing Windows operating systems.
More informationCourse specification
The University of Southern Queensland Course specification Description: Object-Oriented Programming in C++ Subject CSC Cat-nbr 2402 Class 35101 Term 2, 2004 Mode ONC Units 1.00 Campus WIBAY Academic group:
More informationSyllabus: AIT Information Systems Infrastructure Lifecycle Management
Syllabus: AIT 671 - Information Systems Infrastructure Lifecycle Management Term: Fall 2014 Instructor: Jay Holcomb, Adjunct Faculty, Department of Applied Information Technology, Volgenau School of Engineering
More informationPROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES
PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name Telecommunications and Networks Award MSc School School of Engineering and Mathematical Sciences Department or equivalent School
More informationThe University of Jordan. Accreditation & Quality Assurance Center. Curriculum for Doctorate Degree
Accreditation & Quality Assurance Center Curriculum for Doctorate Degree 1. Faculty King Abdullah II School for Information Technology 2. Department Computer Science الدكتوراة في علم الحاسوب (Arabic).3
More informationTextbook Charles Petzold, Programming Windows, 5th edition, Microsoft Press. References - other textbooks or materials none
CS351 Systems Programming Last Updated - 03/01/02 Course Manager Dr. Phil Dickens, Assistant Professor 3 credit hours; required for CS & CPE; 100 min. lecture & 100 min. lab each week Current Catalog Description
More informationSI - Computer Security
Coordinating unit: 270 - FIB - Barcelona School of Informatics Teaching unit: 701 - AC - Department of Computer Architecture Academic year: Degree: 2017 BACHELOR'S DEGREE IN INFORMATICS ENGINEERING (Syllabus
More informationCyber Security Program
Cyber Security Program Cyber Security Program Goals and Objectives Goals Provide comprehensive Security Education and Awareness to the University community Build trust with the University community by
More informationNetwork Architecture I
Network Architecture I Degree in: Communications Electronic Engineering Telecommunication Systems Engineering Telecommunication Technologies Engineering Telematics Engineering Universidad de Alcalá 2016/17
More informationCity University of Hong Kong Course Syllabus. offered by Department of Computer Science with effect from Semester B 2017/18
City University of Hong Kong offered by Department of Computer Science with effect from Semester B 2017/18 Part I Course Overview Course Title: Internet Security and E-Commerce Protocols Course Code: CS4286
More informationSyllabus CSCI 405 Operating Systems Fall 2018
Syllabus CSCI 405 Operating Systems Fall 2018 1.0 General Information Class Time: Monday/Wednesday/Friday 11:00 AM - 11:50 AM Class Location: 317 Thompson Instructor: Dr. Deepti Joshi; Office: 224 Thompson;
More informationDigital Communication and Aesthetics,
Curriculum for the Elective Study at Bachelor Level in Digital Communication and Aesthetics, 2016 Corrected 2017 Amended 2018 Department of Media, Cognition and Communication Faculty of Humanities University
More informationPearson CISSP Cert Guide with Labs. Course Outline. Pearson CISSP Cert Guide with Labs. 17 Oct
Course Outline Pearson CISSP Cert Guide with Labs 17 Oct 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training
More informationCourse Syllabus: CompTIA A+ Hardware
Course Syllabus: CompTIA A+ Hardware Instructor: Email: Phone: Office: (740) 364-364-2299 Cell: Course Material: CompTIA A+ Certification (Exam 220-901) 30Bird Media Supplemental Material Course #: Hours:
More informationComputing Accreditation Commission Version 2.0 CRITERIA FOR ACCREDITING COMPUTING PROGRAMS
Computing Accreditation Commission Version 2.0 CRITERIA FOR ACCREDITING COMPUTING PROGRAMS Optional for Reviews During the 2018-2019 Accreditation Cycle Mandatory for Reviews During the 2019-2020 Accreditation
More informationNOTE: This syllabus is subject to change during the semester. Please check this syllabus on a regular basis for any updates.
Course Syllabus NOTE: This syllabus is subject to change during the semester. Please check this syllabus on a regular basis for any updates. Department : Emergency Services Course Title : Firefighter Certification
More informationKEY PROGRAMME INFORMATION. Originating institution(s) Bournemouth University. Faculty responsible for the programme Faculty of Science and Technology
KEY PROGRAMME INFORMATION Originating institution(s) Bournemouth University Faculty responsible for the programme Faculty of Science and Technology Final award(s), title(s) and credits 20 (60 ECTS) Level
More informationESET 349 Microcontroller Architecture, Fall 2018
ESET 349 Microcontroller Architecture, Fall 2018 Syllabus Contact Information: Professor: Dr. Byul Hur Office: 008 Fermier Telephone: (979) 845-5195 FAX: E-mail: byulmail@tamu.edu Web: rftestgroup.tamu.edu
More informationASTON UNIVERSITY PROGRAMME SPECIFICATION
ASTON UNIVERSITY PROGRAMME SPECIFICATION Programme Title UCAS/JACS School/Subject Area Final Award Interim Awards Mode(s) of Study Normal Length of Programme Total Credits Programme Accredited By Dates
More informationModule Documentation
Module Documentation INFO07017 Contents of this document are copyright of Galway Mayo Institute of Technology Page 1 of 5 INFO07017 Short Title Full Title Attendance N/A Discipline 482 COMPUTER USE (INFO
More informationSan José State University Department of Computer Science CS 166 / SE 166, Information Security, Section 4, spring, 2017
San José State University Department of Computer Science CS 166 / SE 166, Information Security, Section 4, spring, 2017 Course and Contact Information Instructor: Prakash Atawale Office Location: DH 282
More informationRochester Institute of Technology Golisano College of Computing and Information Sciences Department of Information Sciences and Technologies
Rochester Institute of Technology Golisano College of Computing and Information Sciences Department of Information Sciences and Technologies 4002-360.01 ~ Introduction to Database & Data Modeling ~ Spring
More informationComputer Science Technology Department
Computer Science Technology Department Houston Community College Department Phone Number: ab Houston Community College ITSC 1309 Integrated Software Applications I Course Syllabus Instructor Course Reference
More informationCURRICULUM MASTER OF DISASTER MANAGEMENT
CURRICULUM MASTER OF DISASTER MANAGEMENT Applicable to students enrolling in one or more of the below components of the Master of Disaster Management (MDMa) as of September 1 st 2013 The programme is delivered
More informationCPSC 4600 Biometrics and Cryptography Fall 2013, Section 0
CPSC 4600 Biometrics and Cryptography Fall 2013, Section 0 Course: CPSC4600, Section 0, CRN 42532 Title: Biometrics and Cryptography Class Schedule: EMCS302, MW 2:00 pm-3:15 pm Credit: 3 Faculty: Dr. Li
More informationCourse specification
The University of Southern Queensland Course specification Description: Object-Oriented Programming in C++ Subject Cat-nbr Class Term Mode Units Campus CSC 2402 30366 1, 2004 ONC 1.00 TWMBA Academic group:
More informationChapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.
Name Date Chapter 10: Security After completion of this chapter, students should be able to: Explain why security is important and describe security threats. Explain social engineering, data wiping, hard
More informationTREASURY BANKING OPERATIONS Certification Program
FINAL CERTIFICATION AWARDED BY IMRTC - USA TREASURY BANKING OPERATIONS Certification Program This highly specialized and concentrated Program is ideally suited to following individuals who: Are fresh University
More informationPRINCE GEORGE'S COMMUNITY COLLEGE OFFICE OF INSTRUCTION MASTER COURSE SYLLABUS
PRINCE GEORGE'S COMMUNITY COLLEGE OFFICE OF INSTRUCTION MASTER COURSE SYLLABUS CIS 101 Computer Literacy Michael Burt 12/19/2006 Course Designator and Title Prepared by Date Barry Bugg ` Dr. Aaron Stucker
More informationPELLISSIPPI STATE COMMUNITY COLLEGE MASTER SYLLABUS WINDOWS PROFESSIONAL CSIT 2700
PELLISSIPPI STATE COMMUNITY COLLEGE MASTER SYLLABUS WINDOWS PROFESSIONAL CSIT 2700 Class Hours: 3.0 Credit Hours: 4.0 Laboratory Hours: 3.0 Revised: Spring 2010 Catalog Course Description: The course covers
More informationITT Technical Institute. NT2740 Advanced Networking Devices Onsite and Online Course SYLLABUS
ITT Technical Institute NT2740 Advanced Networking Devices Onsite and Online Course SYLLABUS Credit hours: 3 Contact/Instructional hours: 40 (20 Theory Hours, 20 Lab Hours) Prerequisite(s) and/or Corequisite(s):
More informationCourse Curriculum for Master Degree in Network Engineering and Security
Course Curriculum for Master Degree in Network Engineering and Security The Master Degree in Network Engineering and Security is awarded by the Faculty of Graduate Studies at Jordan University of Science
More informationThe GenCyber Program. By Chris Ralph
The GenCyber Program By Chris Ralph The Mission of GenCyber Provide a cybersecurity camp experience for students and teachers at the K-12 level. The primary goal of the program is to increase interest
More informationDescriptions for CIS Classes (Fall 2017)
Descriptions for CIS Classes (Fall 2017) Major Core Courses 1. CIS 1015. INTRODUCTION TO COMPUTER INFORMATION SYSTEMS. (3-3-0). This course provides students an introductory overview to basic computer
More information