NORTH CAROLINA STATE UNIVERSITY GRADUATE COURSE ACTION FORM

Size: px
Start display at page:

Download "NORTH CAROLINA STATE UNIVERSITY GRADUATE COURSE ACTION FORM"

Transcription

1 NORTH CAROLINA STATE UNIVERSITY GRADUATE COURSE ACTION FORM NOTE: Click once on shaded fields to type data. To check boxes, right click at box, click Properties, and click Checked under Default Values. DEPARTMENT/PROGRAM Computer Science COURSE PREFIX/NUMBER CSC/ECE 574 PREVIOUS PREFIX/NUMBER CSC 474/574 DATE OF LAST ACTION March 2002 COURSE TITLE Computer and Network Security ABBREVIATED TITLE COMP & NETWORK SEC SCHEDULING Fall Spring Summer Every Year Alt. Year Odd Alt. Year Even Other COURSE OFFERED BY DISTANCE EDUCATION ONLY ON CAMPUS ONLY BOTH ON CAMPUS AND BY DISTANCE EDUCATION CREDIT HOURS 3 CONTACT HOURS Lecture/Recitation 3 Seminar Laboratory Problem Studio Independent Study/Research Internship/Practicum/Field Work TYPE OF PROPOSAL New Course Drop Course Course Revision Dual-Level Course REVISION Content Prefix/Number Title Abbreviated Title Credit Hours Contact Hours Grading Method Pre-Corequisites Restrictive Statement Description Scheduling GRADING ABCDF S/U INSTRUCTOR (NAME/RANK) Peng Ning, Assistant Professor; Ting Yu, Assistant Professor Graduate Faculty Status Associate Full ANTICIPATED ENROLLMENT Per semester 60 Max.Section 60 Multiple sections Yes No PREREQUISITE(S) CSC 316 or equivalent and CSC 401 or CSC/ECE 570 or equivalent COREQUISITE(S) PRE/COREQUISITE FOR CSC 716, CSC 743, CSC/ECE 774 RESTRICTIVE STATEMENT CURRICULA/MINORS Required Qualified Elective MCS, MS, MSCN, Ph.D. PROPOSED EFFECTIVE DATE Spring 2006 APPROVED EFFECTIVE DATE CATALOG DESCRIPTION (limit to 80 words): Security policies, models, and mechanisms for secrecy, integrity, and availability. Basic cryptography and its applications; operating system models and mechanisms for mandatory and discretionary controls; introduction to database security; security in distributed systems; network security (firewalls, IPsec, and SSL); and control and prevention of viruses and other rogue programs. DOCUMENTATION AS REQUIRED Please number all document pages Course Justification Proposed Revision(s) with Justification Student Learning Objectives Enrollment for Last 5 Years New Resources Statement Consultation with other Departments Syllabus (Old and New) Explanation of differences in requirements of dual-level courses RECOMMENDED BY: Department Head/Director of Graduate Programs Date ENDORSED BY: Chair, College Graduate Studies Committee Date College Dean(s) Date APPROVED: Dean of the Graduate School Date

2 Documentation Required for Course Revision CSC/ECE 574 Information Systems & Network Security I. Proposed Revision with Justification A. Background Information security has become increasingly important as information systems in many of the world s organizations are switching from the paper to the electronic media. Industry, government agencies and various other organizations are having greater demand for well-trained engineers who are prepared to secure these organizations information systems. The Computer Science Department recognized this demand several years ago when it created and is currently offering two regular graduate level courses, CSC 574 Information Systems Security and CSC/ECE 774 Advanced Network Security, and two undergraduate level courses, CSC 405 Introduction to Computer Security and CSC 474 Information Systems Security (piggybacked with CSC 574). However, information security is a discipline that has been studied for several decades and has many more topics than can be covered in these courses. Many important topics were not covered in these current security courses because of the lack of faculty resources. With Dr. Jun Xu and Dr. Ting Yu joining the department in Fall 2003 and Dr. Khaled Harfoush starting to teach undergraduate level security courses, the Computer Science Department has an opportunity to offer more in information security education. The faculty currently teaching security courses (Harfoush, Ning, Xu, and Yu) propose to revise the present security courses and create two new security courses. The following gives a brief description of the proposed security courses including the revisions of the current courses. Undergraduate Level Security Courses CSC 405 Introduction to Computer Security This course mainly covers introductory information security techniques relevant to protecting computer systems, including access control, authentication, applied cryptography, multi-level security, physical security, etc. CSC 474 Network Security This course mainly covers topics relevant to protecting networks and distributed systems, including applied cryptography, authentication, key management, authentication in distributed systems, firewalls, IPsec, transport layer security, security, etc. Graduate Level Security Courses CSC/ECE 574 Computer and Network Security This course serves as the foundational information security course in the graduate program. It covers topics related to information systems and network security, including applied cryptography, authentication, access control, network and distributed security, malicious software, etc. CSC 716 Design of Secure and Reliable Systems The course covers advanced topics in computer system security and reliability. The course presents algorithms/techniques from both fields. The emphasis is on system level design issues, e.g., how systems fail, how algorithms can be compromised, how protocols can be attacked, and ultimately, 2

3 how application design, compiler, operating systems, and processor architectures can be enhanced to detect and mask attacks/failures. CSC 743 Secure Data Management This course covers advanced topics in data management security, including inference control, Rolebased access control, trust management, privacy policy enforcement in databases, query answering over encrypted databases, as well as anonymity and micro data release in decentralized data sharing. CSC/ECE 774 Advanced Network Security This course covers advanced topics in network security, including electronic payment systems, network intrusion detection and alert correlation, secure group communication, broadcast authentication, and security in mobile ad-hoc and sensor networks. B. Proposed Revision for CSC 574 Revise the course title Old title: Information Systems Security New title: Computer and Network Security Justification: After the course content is revised, CSC 574 will have substantial coverage of both computer and network security and that is why we propose to revise the course title accordingly. Revise the course prefix/number Old prefix/number: CSC 474/574 New prefix/number: CSC/ECE 574 Justification: In this course revision, we propose to revise CSC 474 and CSC 574 separately, considering the difference in undergraduate and graduate programs. Thus, CSC 474 and CSC 574 are no longer piggy-backed. Moreover, ECE Department has requested to cross-list CSC 574 as ECE courses to give ECE students more exposure to security courses. After consulting with the head of the Computer Science Department and the Computer Science DGP about the availability of resources, the proposing faculty decided to support ECE Department s request. Revise the Catalog Description Justification: The content of the course is revised in this proposal and therefore we propose to revise the catalog description accordingly. Move the database security portion (except for the introductory content) from CSC 574 into CSC 743 Secure Data Management. Justification: With the creation of a separate course on secure data management, it is more appropriate to include database security topics in the new course. Move the discussion of classical network security techniques (firewalls, IP security, secure socket layer (SSL)) from CSC/ECE 774 (previous Network Security) into CSC 574. Justification: Issues such as firewalls, IP security, and SSL are potentially relevant to many computer science graduate students future jobs. It is more appropriate to cover these topics in a 500-level course so that the students could learn these topics at an earlier stage of their studies. CSC 774 has been revised to drop the above topics and add more advanced topics on group key management (for secure group communication), security in mobile ad-hoc networks, and security in sensor networks The revision of CSC/ECE 774 has been approved. 3

4 II. Student Learning Objectives See syllabus. III. Enrollment for Last Five Years CSC 574 has been offered since Fall The enrollment starting with that semester is: Fall 2002 Fall 2003 Spring 2004 Fall 2004 Spring IV. Consultation with Other Departments The Electrical and Computer Engineering Department initially requested cross-listing CSC/ECE 574, and the Computer Science Department has agreed. Both departments have consulted on this course and it has been approved by the departments joint networking committee that has responsibility for the course. There are no other relevant departments. V. Old and New Syllabus A. Instructors: New Syllabus Dr. Peng Ning, Office: 250 Venture III, Centennial Campus Phone: (919) URL: Dr. Ting Yu Office: 243 Venture III, Centennial Campus Phone: (919) URL: B. Course prerequisites or restrictive statements: CSC 316 or equivalent and CSC 401 or CSC/ECE 570 or equivalent. C. Student learning objectives: Upon successful completion of this course, students will be able to: - State the basic concepts in information security, including security policies, security models, and various security mechanisms. - Explain the basic number theory required for cryptographic applications as well as various cryptographic systems. - Manually compute using Fermat's theorem, Euler's theorem, Euclid's algorithm, extended Euclid's algorithm. - Manually encrypt/decrypt and sign/verify signatures for small messages using RSA, Diffie- Hellman, and DSA algorithms. - State the requirements and mechanisms for identification and authentication. - Explain and compare the various access control policies and models as well as the assurance of these models. - State the characteristics of typical security architectures, including multi-level security systems. - State the criteria of evaluating secure information systems, including evaluation of secure operating systems and secure network systems. - List the database security issues and solutions, including models, architectures, and mechanisms for database security. 4

5 - List network and distributed systems security issues and solutions, including authentication, key distribution, firewalls, and network security protocols. - Explain the network access control mechanisms, including the basic concepts of firewalls, packet filters, application gateways, and typical firewall configurations. - Design firewall configurations and rules to protect a given network. - Outline the protocols, i.e., AH and ESP protocols, for IP Security and the two modes for both protocols. - Explain in their own words the goals of IP Security protocols (AH and ESP), the - Use combinations of IP security protocols to achieve a given security goal (e.g., source authentication, content authentication, traffic confidentiality, etc.). - Explain SSL and TLS protocols. - Apply the above protocols to protect transport-layer communication. - State program security issues, including virus, worm, and logical bombs. - State the basic concepts and general techniques in security auditing and intrusion detection. - State the issues related to administration security, physical security, and program security. - Determine appropriate mechanisms for protecting information systems ranging from operating systems, to database management systems, and to applications. D. Textbooks: Charlie Kaufman, Radia Perlman, and Mike Speciner, Network Security: Private Communication in a Public World, 2nd Edition, Prentice Hall, 2002, ISBN: (Price: USD 54.99) Handouts 1. Sandhu, R.S. Lattice-based access control models, IEEE Computer, 26(11): 9 19, Nov Sandhu, R.S.; Coyne, E.J.; Feinstein, H.L.; Youman, C.E. Role-based access control models, IEEE Computer, 29(2): 38 47, Feb Peng Ning, Sushil Jajodia, Intrusion Detection Techniques, In H. Bidgoli (Ed.), The Internet Encyclopedia. John Wiley & Sons. ISBN: Dec E. Course Organization and Scope: (Assume each lecture takes 75 minutes. The following topics need 28 lectures. These will be adjusted based on the actual progress in a semester.) T1. Basic Security Concepts (1 lectures) o Confidentiality, integrity, availability o Security policies, security mechanisms, assurance T2. Cryptography and Its Applications (7 lectures) o Basic number theory o Secret key cryptosystems o Public key cryptosystems o Hash function o Key Management T3. Identification and Authentication (2 lectures) o Basic concepts of identification and authentication o Password authentication T4. Access Control (4 lectures) o Basic concepts of access control o Discretionary access control and mandatory access control o Lattice-based Models o Covert Channels o Role based Access Control 5

6 Mid-term Review: topics 1 4 (1 lecture) T5. Network and Distributed Systems Security (8 lectures) o Issues in network and distributed systems security o Kerberos o IPSEC o SSL o Firewalls and virtual private networks o Secure o Auditing and intrusion detection T6. Miscellaneous topics (4 lectures) o Assurance and Evaluation of Secure Information Systems (1 lectures) o TCSEC, TNI, CC, etc. o Introduction to Database Security (Security requirements in databases, Access control and authorization in databases, Inference control) o Multi-level security architecture o Program Security (Virus and other malicious software) o Administrating Security (Risk Analysis, Security Planning, Organizational Security Policies) o Physical Security and Beyond (Physical security, TEMPEST, legal and ethical issues in security, environmental issues) Final review: topics 1 6 (1 lecture) F. Schedule of reading assignments: Topic T1: Chapter 1. Topic T2: Chapters 2 7. Topic T3: Chapters Topic T4: Handouts H1 H2. Topic T5: Chapters 13 19, 23; Handout H3. Topic T6: TBD. G. Projected schedule of homework due dates, quizzes and exams: There are 5 homework assignments and 2 exams. Quizzes are given in the form of pop quizzes. Pop quizzes are adopted to encourage the students to study during the non-exam weeks. The results of pop quizzes are not counted in the final grade. Homework 1: topics T1 and T2, due by week 3 Homework 2: topics T2 and T3, due by week 6 Homework 3: topic T4, due by week 9 Homework 4: topic T5, due by week 11 Homework 5: topics T5 and T6, due by week 13 Mid-term exam: week 8 Research project report: due by week 15 Final exam: decided by the university. H. Grading: Assignments 15%, project 15%, midterm 35%, final 35%. The final grades are computed according to the following rules: o A+: >= 95% o A: >= 90% and < 95% o A-: >= 85% and < 90% o B+: >= 80% and < 85% 6

7 o B: >= 75% and < 80% o B-: >= 70% and < 75% o C+: >= 66% and < 70% o C: >= 63% and < 66% o C-: >= 60% and < 63% o D+: >= 56% and < 60% o D: >= 53% and < 56% o D-: >= 50% and < 53% o F: < 50%. I. Policies on incomplete grade and late assignments: Homework and project deadlines will be enforced. Late homework will be accepted with a 10% reduction in grade for each class period they are late by. However, once a homework assignment is discussed in class or the solution is posted, submissions will no longer be accepted. All assignments must be turned in before the start of class on the due date. J. Policies on absences (excused and unexcused) and scheduling makeup work: The university policy on absences will be enforced. See the university policy at the following URL. The students are responsible for discussing makeup exams if they miss exams due to excused absence. The instructor will choose a mutually agreed date and time for the makeup exam. Late submission of homework assignments due to excused absences is not subject to the policies on late assignments. K. Academic integrity: The university, college, and department policies against academic dishonesty will be strictly enforced. You may obtain copies of the NCSU Code of Student Conduct from the Office of Student Conduct, or from the following URL. The instructor expects honesty in the completion of test and assignments. It is the understanding and expectation of instructor that the student's signature on any test or assignment means that the student neither gave nor received unauthorized aid. L. NC State policy on working with students with disabilities: Reasonable accommodations will be made for students with verifiable disabilities. In order to take advantage of available accommodations, students must register with Disability Service for Students at 1900 Student Health Center, Campus Box 7509, For more information on NC State s policy on working with students with disabilities, please see M. Laboratory Safety or Risk Assumption: Not Applicable. N. Pass-through Charges: Not applicable. O. Statement on transportation: Students have to provide their transportation for all class related trips. 7

8 Old Syllabus 1. Instructor: Dr. Peng Ning, Office: 453 EGRC, Centennial Campus Phone: (919) URL: Office hours: Tuesdays and Thursdays, 3:00 pm 4:00 pm 2. Course Objectives: Students will be able to : 1. State the basic concepts in information security, including security policies, security models, and various security mechanisms. 2. Explain the basic number theory required for cryptographic applications as well as various cryptographic systems. 3. Manually compute using Fermat's theorem, Euler's theorem, Euclid's algorithm, extended Euclid's algorithm. 4. Manually encrypt/decrypt and sign/verify signatures for small messages using RSA, Diffie- Hellman, and DSA algorithms. 5. State the requirements and mechanisms for identification and authentication. 6. Explain and compare the various access control policies and models as well as the assurance of these models. 7. State the characteristics of typical security architectures, including multi-level security systems. 8. State the criteria of evaluating secure information systems, including evaluation of secure operating systems and secure network systems. 9. List the database security issues and solutions, including models, architectures, and mechanisms for database security. 10. List network and distributed systems security issues and solutions, including authentication, key distribution, firewalls, and network security protocols. 11. State program security issues, including virus, worm, and logical bombs. 12. State the basic concepts and general techniques in security auditing and intrusion detection. 13. State the issues related to administration security, physical security, and program security. 14. Determine appropriate mechanisms for protecting information systems ranging from operating systems, to database management systems, and to applications. 3. Textbooks: Charles P. Pfleeger. Security in Computing, 2/e. Prentice-Hall, Englewood Cliffs, NJ, (List price at amazon.com: $67.00) Marshall D. Abrams, Sushil Jajodia, and Harold J. Podell, eds. Information Security: An Integrated Collection of Essays. IEEE Computer Society Press, This book can be freely accessed at Handouts (All handouts are accessible on-line) 1. Sandhu, R.S. Lattice-based access control models, IEEE Computer, 26(11): 9 19, Nov Sandhu, R.S.; Coyne, E.J.; Feinstein, H.L.; Youman, C.E. Role-based access control models, IEEE Computer, 29(2): 38 47, Feb Brewer, D.F.C.; Nash, M.J. The Chinese Wall Security Policy, In Proceedings of IEEE Symposium on Security and Privacy, pages , E. Bertino, P. Samarati, and S. Jajodia, An extended authorization model for relational databases, IEEE Trans. on Knowledge and Data Engineering, 9(1):85-101, N. R. Adam and J. C. Wortmann. Security-control methods for statistical databases: A comparative study. ACM Computing Surveys, 21(4): , December

9 6. B. Mukherjee, L.T. Heberlein, and K.N. Levitt. Network Intrusion Detection, IEEE Network, 8(3): 26-41, May RSA Data Security Inc., RSA Laboratories' Frequently Asked Questions About Today's Cryptography, Version 4.1, Accessible at 4. Course Organization and Scope: (Assume each lecture takes 75 minutes. The following topics need 30 lectures (or 15 weeks).) 1. Basic Security Concepts (1 lectures) o Confidentiality, integrity, availability o Security policies, security mechanisms, assurance 2. Cryptography and Its Applications (7 lectures) o Basic number theory o Secret key cryptosystems o Public key cryptosystems o Hash function 3. Identification and Authentication (2 lectures) o Basic concepts of identification and authentication o Password authentication 4. Access Control (5 lectures) o Basic concepts of access control o Discretionary access control and mandatory access control o Lattice-based Models o Covert Channels o Noninterference Models o Chinese Wall Security Policy o Role based Access Control Mid-term Review: topics 1-4 (1 lecture) 5. Basic Security Architecture and Multilevel Security (1 lecture) 6. Evaluation of Secure Information Systems (1 lecture) o TCSEC, TNI, CC, etc. 7. Database Security (3 lectures) o Security requirements in databases o Access control and authorization in databases. o Inference control 8. Network and Distributed Systems Security (4 lectures) o Issues in Network and Distributed Systems Security o Key Distribution Center (KDC) and Public Key Infrastructure (PKI) o Introduction to IPSEC, SSL, ISAKMP/Oakley, etc. o Introduction to Firewall, Virtual Private Network, Secure , etc. 9. Program Security (Virus and other malicious software) (1 lecture) 10. Auditing and Intrusion Detection (2 lecture) 11. Administrating Security (1 lecture) o Risk Analysis. o Security Planning. o Organizational Security Policies 12. Physical Security and Beyond (1 lecture) o Physical security, TEMPEST, legal and ethical issues in security, environmental issues, etc. 5. Schedule of Reading Assignments: If not specifically identified, the following chapters refer to those in the first textbook. We refer to the second textbook as Abrams et al. 9

10 Topic 1: Chapter 1; essay 2 in Abrams et al. Topic 2: Chapters 2, 3, and 4; chapter 15 in Abrams et al. Topic 3: Chapters 6.5, 6.6; handout 3; Chapters and in handout 7. Topic 4: Chapter 6.3; handouts 1 and 2. Topic 5: Chapter 7. Topic 6: Essays 6 and 12 in Abrams et al. Topic 7: Chapter 8, handouts 4 and 5. Topic 8: Chapter 9. Topic 9: Chapter 5. Topic 10: Handout 6. Topic 11: Chapter 10. Topic 12: Chapter Schedule of homework due dates, quizzes and exams: There are six homework assignments and two exams. Quizzes are given in the form of pop quizzes. Pop quizzes are adopted to encourage the students to study during the non-exam weeks. The results of pop quizzes are not counted in the final grade. Homework 1: topics 1 and 2, due by week 3 Homework 2: topics 2 and 3, due by week 6 Homework 3: topic 4, due by week 9 Homework 4: topics 5 and 6, due by week 11 Homework 5: topics 7 and 8, due by week 13 Homework 6: topics 9, 10, and 11, due by week 15 Mid-term exam: week 8 Research project report: due by week 15 Final exam: decided by the university. 7. Grading: Assignments 30%, project 20%, midterm 25%, final 25%. The final grades are computed according to the following rules: o A+: >= 95% o A: >= 90% and < 95% o A-: >= 85% and < 90% o B+: >=80% and < 85% o B: >= 75% and < 80% o B-: >= 70% and < 75% o C+: >=65% and < 70% o C: >=60% and < 65% o C-: >=55% and < 60% o F: < 55%. 8. Policies on late assignments: Homework and project deadlines will be hard. Late homework will be accepted with a 10% reduction in grade for each class period they are late by. However, once a homework assignment is discussed in class, submissions will no longer be accepted. All assignments must be turned in before the start of class on the due date. 9. Policies on absences (excused and unexcused) and scheduling makeup work: The university policy on absences will be enforced. See the university policy at the following URL. The students are responsible for discussing makeup exams if they miss exams due to excused absence. The instructor will choose a mutually agreed date and time for the makeup exam. 10

11 Late submission of homework assignments due to excused absences is not subject to the policies on late assignments. 10. Course prerequisites: CSC 401, CSC Academic integrity: The university, college, and department policies against academic dishonesty will be strictly enforced. You may obtain copies of the NCSU Code of Student Conduct from the Office of Student Conduct, or from the following URL NC State policy on working with students with disabilities: Reasonable accommodations will be made for students with verifiable disabilities. In order to take advantage of available accommodations, students must register with Disability Service for Students at 1900 Student Health Center, Campus Box 7509, For more information on NC State s policy on working with students with disabilities, please see Laboratory Safety or Risk Assumption: Not Applicable. 14. Pass-through Charges: Not applicable. 11

CSC 774 Network Security

CSC 774 Network Security CSC 774 Network Security Syllabus 1. Instructor: Dr. Peng Ning, Office: 250 Venture III, Centennial Campus Phone: (919) 513-4457 Email: pning@ncsu.edu URL: http://www.csc.ncsu.edu/faculty/ning Office hours:

More information

Faculty of Science & Information Technology

Faculty of Science & Information Technology Faculty of Science & Information Technology Department: Computer Science COURSE SYLLABUS Short Description Student s Copy One copy of this course syllabus is provided to each student registered in this

More information

The University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus

The University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus The University of Jordan Accreditation & Quality Assurance Center COURSE Syllabus 1 Course title Computer Security 2 Course number 1901463 Credit hours (theory, practical) 3 3 Contact hours (theory, practical)

More information

San José State University School/Department Computer Science 265: Cryptography and Computer Security, Fall 2017

San José State University School/Department Computer Science 265: Cryptography and Computer Security, Fall 2017 Course and Contact Information Instructor: Auston Davis Office Location: MacQuarrie Hall 217 Telephone: 650-454-6044 Email: Office Hours: Class Days/Time: auston.davis@sjsu.edu (preferred) Mon 6pm 7pm

More information

AIT 682: Network and Systems Security. Instructor: Dr. Kun Sun

AIT 682: Network and Systems Security. Instructor: Dr. Kun Sun AIT 682: Network and Systems Security Instructor: Dr. Kun Sun About Instructor Dr. Kun Sun, Associate Professor of Information Sciences and Technology http://csis.gmu.edu/ksun/ Phone: (703) 993-1715 Email:

More information

Network Security

Network Security 44-555 Network Security Instructor: Scott Bell Office: 2220 Colden Hall Email: sbell@nwmissouri.edu Phone: (660) 562-1699 Description: An introduction to the fundamentals of network security, including

More information

Academic Course Description

Academic Course Description BEC012 - CRYPTOGRAPHY AND NETWORK SECURITY Academic Course Description BHARATH UNIVERSITY Faculty of Engineering and Technology Department of Electronics and Communication Engineering BEC012 Cryptography

More information

Justification: IT/COMP 421 is now IT421. Adjustments made so both CS and IT majors have equivalent prereqs. Corrects error in course justification.

Justification: IT/COMP 421 is now IT421. Adjustments made so both CS and IT majors have equivalent prereqs. Corrects error in course justification. CALIFORNIA STATE UNIVERSITY CHANNEL ISLANDS COURSE MODIFICATION PROPOSAL Courses must be submitted by October 15, 2013, and finalized by the end of the fall semester to make the next catalog (2014-15)

More information

IT443 Network Security Administration Spring Gabriel Ghinita University of Massachusetts at Boston

IT443 Network Security Administration Spring Gabriel Ghinita University of Massachusetts at Boston IT443 Network Security Administration Spring 2018 Gabriel Ghinita University of Massachusetts at Boston Contact Information Instructor: Dr. Gabriel Ghinita Email: Gabriel.Ghinita@umb.edu (preferred contact)

More information

Syllabus CS 430 Introduction to Computer Security Winter 2016

Syllabus CS 430 Introduction to Computer Security Winter 2016 Syllabus CS 430 Introduction to Computer Security Winter 2016 Meeting Times Instructor TA Textbooks Lect: 3:00-3:50 M, Tu, Wed, Th, HB 106 Lab: 3:00-3:50 M, HB 203 Dr. Razvan Andonie, HB 214-E, Office

More information

MORGAN STATE UNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING COURSE SYLLABUS FALL, 2015

MORGAN STATE UNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING COURSE SYLLABUS FALL, 2015 MORGAN STATE UNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING COURSE SYLLABUS FALL, 2015 CATALOG DESCRIPTION ONLINE EEGR.483 INTRODUCTION TO SECURITY MANAGEMENT CREDITS: 3 THIS COURSE IS A

More information

FIT5044 Network security. Unit Guide. Semester 1, 2010

FIT5044 Network security. Unit Guide. Semester 1, 2010 FIT5044 Network security Unit Guide Semester 1, 2010 The information contained in this unit guide is correct at time of publication. The University has the right to change any of the elements contained

More information

NORTH CAROLINA STATE UNIVERSITY GRADUATE COURSE ACTION FORM

NORTH CAROLINA STATE UNIVERSITY GRADUATE COURSE ACTION FORM NORTH CAROLINA STATE UNIVERSITY GRADUATE COURSE ACTION FORM NOTE: Click once on shaded fields to type data. To check boxes, right click at box, click Properties, and click Checked under Default Values.

More information

Introduction and Overview. Why CSCI 454/554?

Introduction and Overview. Why CSCI 454/554? Introduction and Overview CSCI 454/554 Why CSCI 454/554? Get Credits and Graduate Security is important More job opportunities More research funds 1 Workload Five homework assignments Two exams (open book

More information

CS 134: Elements of Cryptography and Computer + Network Security Winter sconce.ics.uci.edu/134-w16/ CS 134 Background

CS 134: Elements of Cryptography and Computer + Network Security Winter sconce.ics.uci.edu/134-w16/ CS 134 Background CS 134: Elements of Cryptography and Computer + Network Security Winter 2016 sconce.ics.uci.edu/134-w16/ 1 CS 134 Background 11:00-12:20 @ SSL 290 Discussions section as needed (must register!) Senior-level

More information

CHAIR Jr, r7~. cou EGE FACULTY CHAIR (if \G,Jl ~ ~k amica~ pc{ 2.-0 I ; <-0 l "?J Approved,G. 'S u,\? Approved. Approved

CHAIR Jr, r7~. cou EGE FACULTY CHAIR (if \G,Jl ~ ~k amica~ pc{ 2.-0 I ; <-0 l ?J Approved,G. 'S u,\? Approved. Approved 2013-2014 LONG SIGNATURE SHEET Proposal Number: SIS 10-07-13 _ ~f/; UNC CHARIDITE Proposal Title: Establish a graduate level course: Cloud Data Storage.:1T1.5 6' ~ 7AJ "1-11$ 8')(.0 Originating Department:

More information

The University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus

The University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus The University of Jordan Accreditation & Quality Assurance Center COURSE Syllabus 1 Course title Introduction to Web Pages Development 2 Course number 807413 Credit hours (theory, practical) 3 3 Contact

More information

MLR Institute of Technology

MLR Institute of Technology MLR Institute of Technology Laxma Reddy Avenue, Dundigal, Quthbullapur (M), Hyderabad 500 043 Phone Nos: 08418 204066 / 204088, Fax: 08418 204088 COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION Course

More information

ITSY Information Technology Security Course Syllabus Spring 2018

ITSY Information Technology Security Course Syllabus Spring 2018 ITSY 1342 - Information Technology Security Course Syllabus Spring 2018 Instructor Course Reference Number (CRN) Course Description: Name: Fidelis Ngang Tel: 713-718-5552 Office: Spring Branch, Room 900L

More information

COURSE OUTLINE. Last Amendment Edition Procedure No. Lecturer /blog Room No. Phone No. / Name.

COURSE OUTLINE. Last Amendment Edition Procedure No. Lecturer  /blog Room No. Phone No. /  Name. FACULTY OF COMPUTING Page 1 of 6 COURSE 0 PRE-REQUISITE none EQUIVALENCE CONTACT HOURS 4 Lecturer e-mail/blog Room No. Phone No. 1. Dr. Siti Hajar Othman hajar@utm.my / www.comp.utm.my/hajar 347-04, N8

More information

INFS 2150 (Section A) Fall 2018

INFS 2150 (Section A) Fall 2018 INFS 2150 (Section A) Fall 2018 Introduction to Web Development Class meets TUE & THU: 12:30am-1:45pm: in Wheatley 114 Instructor: Peter Y. Wu Office: Wheatley 309 Office Hours: Tuesday 9:00 am-12:00 noon;

More information

10EC832: NETWORK SECURITY

10EC832: NETWORK SECURITY 10EC832: NETWORK SECURITY Objective: In this electronic age, security and privacy are two of the issues whose importance cannot be stressed enough. How do we ensure the systems we use are resistant to

More information

SRI VENKATESWARA COLLEGE OF ENGINEERING

SRI VENKATESWARA COLLEGE OF ENGINEERING COURSE DELIVERY PLAN - THEORY Page 1 of 6 Department of Information Technology B.E/B.Tech :IT/CS Regulation:2013 LP: CS6701 Rev. No: 01 Date: 30.06.2017 Sub. Code / Sub. Name : CS6701 CRYPTOGRAPHY & NETWORK

More information

New Undergraduate Course Proposal Form

New Undergraduate Course Proposal Form View New Course Proposal New Undergraduate Course Proposal Form 1. Department and Contact Information Tracking Number Date & Time Submitted 946 2010-12-02 17:49:08 Department Information Systems and Decision

More information

CSCI 4250/6250 Fall 2013 Computer and Network Security. Instructor: Prof. Roberto Perdisci

CSCI 4250/6250 Fall 2013 Computer and Network Security. Instructor: Prof. Roberto Perdisci CSCI 4250/6250 Fall 2013 Computer and Network Security Instructor: Prof. Roberto Perdisci perdisci@cs.uga.edu CSCI 4250/6250 What is the purpose of this course? Combined Undergrad/Graduate Intro to Computer

More information

San José State University Department of Computer Science CS166, Information Security, Section 1, Fall, 2018

San José State University Department of Computer Science CS166, Information Security, Section 1, Fall, 2018 Course and Contact Information Instructor: Office Location: San José State University Department of Computer Science CS166, Information Security, Section 1, Fall, 2018 Fabio Di Troia DH282 Telephone: 408-924-7171

More information

GET 433 Course Syllabus Spring 2017

GET 433 Course Syllabus Spring 2017 Instructor: Doug Taber Telephone: 315-558-2359 Email: pdtaber@syr.edu Office: Hinds Hall 239 Location: Hinds 013 Day: Tues / Thurs Time: 8 AM to 9:20 AM Office Hours: TBA Course Overview GET 433 Enterprise

More information

Rochester Institute of Technology Golisano College of Computing and Information Sciences Department of Information Sciences and Technologies

Rochester Institute of Technology Golisano College of Computing and Information Sciences Department of Information Sciences and Technologies Rochester Institute of Technology Golisano College of Computing and Information Sciences Department of Information Sciences and Technologies 4002-360.01 ~ Introduction to Database & Data Modeling ~ Spring

More information

ISM 324: Information Systems Security Spring 2014

ISM 324: Information Systems Security Spring 2014 ISM 324: Information Systems Security Spring 2014 Instructor: Co-Instructor: Office: E-Mail: Phone: Office Hours: Jeffrey Wall Hamid Nemati 392 Bryan Building jdwall2@uncg.edu (email is the preferred method

More information

Department of Computer & Information Sciences. CSCI-342: Introduction to Information Security Syllabus

Department of Computer & Information Sciences. CSCI-342: Introduction to Information Security Syllabus Department of Computer & Information Sciences CSCI-342: Introduction to Information Security Syllabus Course Description This course provides an introduction to the various basic technical and administrative

More information

City University of Hong Kong. Course Syllabus. offered by Department of Computer Science with effect from Semester B 2016/17

City University of Hong Kong. Course Syllabus. offered by Department of Computer Science with effect from Semester B 2016/17 City University of Hong Kong offered by Department of Computer Science with effect from Semester B 2016/17 Part I Course Overview Course Title: Information Security for ecommerce Course Code: CS5285 Course

More information

Division of Engineering, Computer Programming, and Technology

Division of Engineering, Computer Programming, and Technology 1 of 10 8/27/2017, 6:42 PM Jump to Today Edit Division of Engineering, Computer Programming, and Technology Department of Network Engineering Technology National Center of Academic Excellence in Information

More information

BOSTON UNIVERSITY Metropolitan College MET CS342 Data Structures with Java Dr. V.Shtern (Fall 2011) Course Syllabus

BOSTON UNIVERSITY Metropolitan College MET CS342 Data Structures with Java Dr. V.Shtern (Fall 2011) Course Syllabus BOSTON UNIVERSITY Metropolitan College MET CS342 Data Structures with Java Dr. V.Shtern (Fall 2011) Course Syllabus 1. Course Objectives Welcome to MET CS342 Data Structures with Java. The intent of this

More information

Instructor: Eric Rettke Phone: (every few days)

Instructor: Eric Rettke Phone: (every few days) Instructor: Eric Rettke Phone: 818 364-7775 email: rettkeeg@lamission.edu (every few days) Fall 2016 Computer Science 411 - Principles of Cyber Security 1 Please keep a copy of the syllabus handy for the

More information

Del Mar College Master Course Syllabus. UNIX System Administration Course Number: ITSC1358

Del Mar College Master Course Syllabus. UNIX System Administration Course Number: ITSC1358 Del Mar College Master Course Syllabus UNIX System Administration Course Number: ITSC1358 College Year: 2010 Professor Name: David Hattox Semester: Fall Office Location: VB124 Phone Contact: 698-1112 DMC

More information

Syllabus for CIT 442 Information System Security 3 Credit Hours Spring 2015

Syllabus for CIT 442 Information System Security 3 Credit Hours Spring 2015 Syllabus for CIT 442 Information System Security 3 Credit Hours Spring 2015 I. COURSE DESCRIPTION An overview of information system security to include managing security, protecting information technology

More information

BRAZOSPORT COLLEGE LAKE JACKSON, TEXAS SYLLABUS. ITNW 2313: NETWORKING HARDWARE Online Course Version COMPUTER TECHNOLOGY DEPARTMENT

BRAZOSPORT COLLEGE LAKE JACKSON, TEXAS SYLLABUS. ITNW 2313: NETWORKING HARDWARE Online Course Version COMPUTER TECHNOLOGY DEPARTMENT BRAZOSPORT COLLEGE LAKE JACKSON, TEXAS SYLLABUS ITNW 2313: NETWORKING HARDWARE Online Course Version COMPUTER TECHNOLOGY DEPARTMENT CATALOG DESCRIPTION ITNW 2313 Networking Hardware. CIP 1109010007 Maintain

More information

Oklahoma State University Spears School of Business Department of Management Information Systems

Oklahoma State University Spears School of Business Department of Management Information Systems Oklahoma State University Spears School of Business Department of Management Information Systems Information Assurance Management TCOM 5223 Wednesday 4:30 PM 7:10 PM (Central Time) Location: Tulsa North

More information

CSci 4211: Data Communications and Computer Networks. Time: Monday and Wednesday 1 pm to 2:15 pm Location: Vincent Hall 16 Spring 2016, 3 Credits

CSci 4211: Data Communications and Computer Networks. Time: Monday and Wednesday 1 pm to 2:15 pm Location: Vincent Hall 16 Spring 2016, 3 Credits CSci 4211: Data Communications and Computer Networks Time: Monday and Wednesday 1 pm to 2:15 pm Location: Vincent Hall 16 Spring 2016, 3 Credits 1 Instructor David Hung-Chang Du Email: du@cs.umn.edu Office:

More information

MWF 9:00-9:50AM & 12:00-12:50PM (ET)

MWF 9:00-9:50AM & 12:00-12:50PM (ET) Department of Mathematics and Computer Science Adelphi University Fall 2013 0145-443-001 Database Management Systems Dr. R. M. Siegfried 214 Post Hall (516)877-4482 siegfrie@adelphi.edu Office Hours Course

More information

Computer Science Technology Department

Computer Science Technology Department Computer Science Technology Department Houston Community College Department Phone Number: ab Houston Community College ITMT 1370 Windows Client Operating System - Windows 10 Course Syllabus Summer 2017

More information

CSci 4211: Introduction to Computer Networks. Time: Monday and Wednesday 2:30 to 3:45 pm Location: Smith Hall 231 Fall 2018, 3 Credits

CSci 4211: Introduction to Computer Networks. Time: Monday and Wednesday 2:30 to 3:45 pm Location: Smith Hall 231 Fall 2018, 3 Credits CSci 4211: Introduction to Computer Networks Time: Monday and Wednesday 2:30 to 3:45 pm Location: Smith Hall 231 Fall 2018, 3 Credits 1 Instructor David Hung-Chang Du Email: du@cs.umn.edu Office: Keller

More information

IST359 - INTRODUCTION TO DATABASE MANAGEMENT SYSTEMS

IST359 - INTRODUCTION TO DATABASE MANAGEMENT SYSTEMS IST359 - INTRODUCTION TO DATABASE MANAGEMENT SYSTEMS 1. COURSE DETAILS Revised: 08/14/2013 COURSE (SECTION): IST359 (M003) TERM: Fall 2013 INSTRUCTOR: Deborah Nosky FINAL EXAM: Tuesday April 30th OFFICE:

More information

INFORMATION SESSION. MS Software Engineering, specialization in Cybersecurity

INFORMATION SESSION. MS Software Engineering, specialization in Cybersecurity INFORMATION SESSION MS Software Engineering, specialization in Cybersecurity Presenter Afifa Hamad Program Specialist Graduate & Extended Studies Charles W. Davidson College of Engineering San Jose State

More information

The Linux Command Line: A Complete Introduction, 1 st ed., by William E. Shotts, Jr., No Starch Press, 2012.

The Linux Command Line: A Complete Introduction, 1 st ed., by William E. Shotts, Jr., No Starch Press, 2012. Department of Mathematics and Computer Science Adelphi University Fall 2018 0145-275-001 Operating Systems Practicum Dr. R. M. Siegfried 407 Science (516)877-4482 http://home.adelphi.edu/~siegfried/cs271

More information

San José State University Computer Science Department CS49J, Section 3, Programming in Java, Fall 2015

San José State University Computer Science Department CS49J, Section 3, Programming in Java, Fall 2015 Course and Contact Information San José State University Computer Science Department CS49J, Section 3, Programming in Java, Fall 2015 Instructor: Aikaterini Potika Office Location: MacQuarrie Hall 215

More information

Philadelphia University Faculty of Information Technology Department of Computer Science --- Semester, 2007/2008. Course Syllabus

Philadelphia University Faculty of Information Technology Department of Computer Science --- Semester, 2007/2008. Course Syllabus Philadelphia University Faculty of Information Technology Department of Computer Science --- Semester, 2007/2008 Course Syllabus Course Title: Advanced Databases Course Level: 4 Lecture Time: Course code:

More information

SUMMARY OF INFORMATION ON EACH COURSE

SUMMARY OF INFORMATION ON EACH COURSE 1. Name of Course Applied Cryptography 2. Course Code TAC 3121 3. Status of Course Specialisation Core for B.IT Security Technology [Applies to (cohort) ] 4. MQF Level/Stage Note : Certificate MQF Level

More information

San José State University Computer Science Department CS157A: Introduction to Database Management Systems Sections 5 and 6, Fall 2015

San José State University Computer Science Department CS157A: Introduction to Database Management Systems Sections 5 and 6, Fall 2015 San José State University Computer Science Department CS157A: Introduction to Database Management Systems Sections 5 and 6, Fall 2015 Course and Contact Information Instructor: Ron Gutman Office Location:

More information

Representative Syllabus

Representative Syllabus PREPARING COMPETENT AND RESPONSIBLE BUSINESS LEADERS THE UNIVERSITY OF AKRON COLLEGE OF BUSINESS ADMINISTRATION DEPARTMENT OF FINANCE SYLLABUS Fall, 2012 CORPORATE FINANCIAL MANAGEMENT 6400:310 001 BCCE

More information

FORM I: SUMMARY PAGE FOR PROPOSAL # CSCI

FORM I: SUMMARY PAGE FOR PROPOSAL # CSCI FORM I: SUMMARY PAGE FOR PROPOSAL # CSCI102010-08 1. Title: CISM 3325: Data Communications and Computer Networks 2. Submitting College: COST 3. Department(s) Generating the Proposal: Engineering Technology

More information

San José State University Department of Computer Science CS 166 / SE 166, Information Security, Section 4, spring, 2017

San José State University Department of Computer Science CS 166 / SE 166, Information Security, Section 4, spring, 2017 San José State University Department of Computer Science CS 166 / SE 166, Information Security, Section 4, spring, 2017 Course and Contact Information Instructor: Prakash Atawale Office Location: DH 282

More information

A & B Section. Day. A Mrs. Krishnaveni S 1204 UB

A & B Section. Day. A Mrs. Krishnaveni S 1204 UB SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF SOFTWARE ENGINEERING COURSE PLAN Course Code : SE1102 Course Title : NETWORKS SECURITY Semester : IV Course Time : FEB MAY 2016 Day A

More information

CSCI 201L Syllabus Principles of Software Development Spring 2018

CSCI 201L Syllabus Principles of Software Development Spring 2018 L Syllabus Principles of Software Development Spring 2018 Instructor: Jeffrey Miller, Ph.D. Email: jeffrey.miller@usc.edu Web Page: http://www-scf.usc.edu/~csci201 Office: SAL 342 Phone: 213-740-7129 Lectures:

More information

Computer Science Technology Department

Computer Science Technology Department Computer Science Technology Department Houston Community College Department Phone Number: ab Houston Community College ITSC 1309 Integrated Software Applications I Course Syllabus Instructor Course Reference

More information

Kris Gaj Research and teaching interests: ECE 646 Cryptography and Computer Network Security. Course web page: Contact: ECE 646

Kris Gaj Research and teaching interests: ECE 646 Cryptography and Computer Network Security. Course web page: Contact: ECE 646 646 and Computer Network Security Course web page: web page Courses 646 Kris Gaj Research and teaching interests: cryptography network security computer arithmetic FPGA & ASIC design and testing Contact:

More information

Introduction. Ahmet Burak Can Hacettepe University. Information Security

Introduction. Ahmet Burak Can Hacettepe University. Information Security Introduction Ahmet Burak Can Hacettepe University abc@hacettepe.edu.tr Information Security 1 Books Textbook: Network Security: Private Communication in a Public World, 2nd Edition. C. Kaufman, R. Perlman,

More information

IT 341 Fall 2017 Syllabus. Department of Information Sciences and Technology Volgenau School of Engineering George Mason University

IT 341 Fall 2017 Syllabus. Department of Information Sciences and Technology Volgenau School of Engineering George Mason University Department of Information Sciences and Technology Volgenau School of Engineering George Mason University Fall 2017 IT 341 Data Communications and Networking Principles Syllabus (Revised 08/14/2017) Section

More information

CS 241 Data Organization using C

CS 241 Data Organization using C CS 241 Data Organization using C Fall 2018 Instructor Name: Dr. Marie Vasek Contact: Private message me on the course Piazza page. Office: Farris 2120 Office Hours: Tuesday 2-4pm and Thursday 9:30-11am

More information

CASPER COLLEGE COURSE SYLLABUS MSFT 1600 Managing Microsoft Exchange Server 2003 Semester/Year: Fall 2007

CASPER COLLEGE COURSE SYLLABUS MSFT 1600 Managing Microsoft Exchange Server 2003 Semester/Year: Fall 2007 CASPER COLLEGE COURSE SYLLABUS MSFT 1600 Managing Microsoft Exchange Server 2003 Semester/Year: Fall 2007 Lecture Hours: 2 Lab Hours: 2 Credit Hours: 3 Class Time: Saturday 8:30 AM - 12:00 PM Room: BU

More information

San José State University Department of Computer Science CS049J, Programming in Java, Section 2, Fall, 2016

San José State University Department of Computer Science CS049J, Programming in Java, Section 2, Fall, 2016 Course and Contact Information San José State University Department of Computer Science CS049J, Programming in Java, Section 2, Fall, 2016 Instructor: Office Location: Fabio Di Troia DH282 Telephone: Email:

More information

TEACHING & ASSESSMENT (T & A) PLAN College of Economics Management and Information Systems Department of Information Systems

TEACHING & ASSESSMENT (T & A) PLAN College of Economics Management and Information Systems Department of Information Systems 1 UoN/AA-003/FORM-QTLMS/V2/2017 TEACHING & ASSESSMENT (T & A) PLAN College of Economics Management and Information Systems Department of Information Systems Semester: Summer 2017 Academic Year 2016-17

More information

ECE 646 Cryptography and Computer Network Security. Kris Gaj Research and teaching interests:

ECE 646 Cryptography and Computer Network Security. Kris Gaj Research and teaching interests: 646 Cryptography and Computer Network Security Course web page: Google Kris Gaj 646 Kris Gaj Research and teaching interests: cryptography network security computer arithmetic FPGA & ASIC design and testing

More information

ECE 646 Cryptography and Computer Network Security. Course web page: Kris Gaj Research and teaching interests: Contact: ECE web page Courses ECE 646

ECE 646 Cryptography and Computer Network Security. Course web page: Kris Gaj Research and teaching interests: Contact: ECE web page Courses ECE 646 646 Cryptography and Computer Network Security Course web page: web page Courses 646 Kris Gaj Research and teaching interests: cryptography network security computer arithmetic FPGA & ASIC design and testing

More information

Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017

Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017 Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017 ITD 3443 Network Security Students will provide Cyber Defense while understanding Cyber Threats. Their attack types

More information

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, yderabad - 500 043 COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Course Code Regulation Course Structure Course Coordinator

More information

University of Jordan Jordan University Business School (JUBS)

University of Jordan Jordan University Business School (JUBS) 1. Department Name: Accounting 2. Program Name: MA and MBA 3. Program Code 2 4. Course Code and Title: 1602726 Advanced Auditing 5. Course credits: 3 6. Pre-requisites: 7. Course Instructor/ Coordinator

More information

Networks and Communications MS216 - Course Outline -

Networks and Communications MS216 - Course Outline - Networks and Communications MS216 - Course Outline - Objective Lecturer Times Overall Learning Outcomes Format Programme(s) The objective of this course is to develop in students an understanding of the

More information

New Undergraduate Course Proposal Form

New Undergraduate Course Proposal Form New Undergraduate Course Proposal Form 1. Department and Contact Information Tracking Number Date & Time Submitted 790 2009-02-13 14:13:42 Department College Budget Account Number Computer Science & Engieering

More information

College of San Mateo Course Outline

College of San Mateo Course Outline College of San Mateo Course Outline New Course Update/No change Course Revision (Minor) Course Revision (Major) Date: 1/26/12 Department: CIS Number: 420 Course Title: Project Management Professional Certificate

More information

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education COURSE OF STUDY 2017-2018 (C)ITM 820 Information Systems Security and Privacy

More information

X Prefix/suffix Course Learning Outcomes

X Prefix/suffix Course Learning Outcomes CALIFORNIA STATE UNIVERSITY CHANNEL ISLANDS COURSE MODIFICATION PROPOSAL Courses must be submitted by October 15, 2011, and finalized by the end of the fall semester to make the next catalog (2012-13)

More information

Syllabus Revised 08/21/17

Syllabus Revised 08/21/17 Department of Information Sciences and Technology Volgenau School of Engineering George Mason University Fall 2017 IT 445 Advanced Networking Principles II Syllabus Revised 08/21/17 Instructor: Pouyan

More information

CSC 562: Graduate Introduction to Game Engine Design

CSC 562: Graduate Introduction to Game Engine Design CSC 562: Graduate Introduction to Game Engine Design In Workflow 1. 14CSC GR Director of Curriculum (rouskas@ncsu.edu) 2. COE CC Coordinator GR (rfillin@ncsu.edu) 3. COE CC Chair GR (reeves@ncsu.edu; rfillin@ncsu.edu;

More information

CPSC 5157G Computer Networks

CPSC 5157G Computer Networks CPSC 5157G Computer Networks Instructor Dr. Jianhua Yang Center for Commerce and Technology 28 (706) 565 3520 e mail: yang_jianhua@colstate.edu website: http://csc.colstate.edu/yang/ Office Hours (Fall

More information

San Jose State University College of Science Department of Computer Science CS151, Object-Oriented Design, Sections 1,2 and 3, Spring 2017

San Jose State University College of Science Department of Computer Science CS151, Object-Oriented Design, Sections 1,2 and 3, Spring 2017 San Jose State University College of Science Department of Computer Science CS151, Object-Oriented Design, Sections 1,2 and 3, Spring 2017 Course and Contact Information Instructor: Dr. Kim Office Location:

More information

Advanced Topics in Database Systems Spring 2016

Advanced Topics in Database Systems Spring 2016 44-560 Advanced Topics in Database Systems Spring 2016 Course Description Advanced topics in database systems, including database administration, distributed databases, and data warehousing. Hands-on experience

More information

ECONOMICS 5317: CONTEMPORARY GOVERNMENT AND BUSINESS RELATIONS

ECONOMICS 5317: CONTEMPORARY GOVERNMENT AND BUSINESS RELATIONS 1 ECONOMICS 5317: CONTEMPORARY GOVERNMENT AND BUSINESS RELATIONS Fall 2011, MWF 9:05-9:55, HCB 408 INSTRUCTOR: David VanHoose OFFICE HOURS: OFFICE: 339 Hankamer MWF 8:00-9:00 & 12:15-1:15; OFFICE PHONE:

More information

IT150 - IT Systems Security +

IT150 - IT Systems Security + IT150 - IT Systems Security + Document Type: Proposal Type: Requester(s): College: Origination Approved: District Master Course Outline Revision Robert A Bunge North 04/11/2017-11:28 AM BASIC INFORMATION

More information

Course Title: Network+/Networking Fundamentals. Course Section: CNS-101-I1. FORMAT: Online

Course Title: Network+/Networking Fundamentals. Course Section: CNS-101-I1. FORMAT: Online Course Title: Network+/Networking Fundamentals Course Section: CNS-101-I1 FORMAT: Online TIME FRAME: Start Date: 15 January 2018 End Date: 06 May 2018 CREDITS: 4 INSTRUCTOR: Carlos J. Garcia Office Hours:

More information

ESET 369 Embedded Systems Software, Fall 2017

ESET 369 Embedded Systems Software, Fall 2017 ESET 369 Embedded Systems Software, Fall 2017 Syllabus Contact Information: Professor: Dr. Byul Hur Office: Fermier 008A Telephone: (979) 845-5195 FAX: E-mail: byulmail@tamu.edu Web: rftestgroup.tamu.edu

More information

City University of Hong Kong. Course Syllabus. offered by Department of Information Systems with effect from Semester A 2017 / 2018

City University of Hong Kong. Course Syllabus. offered by Department of Information Systems with effect from Semester A 2017 / 2018 City University of Hong Kong offered by Department of Information Systems with effect from Semester A 2017 / 2018 Part I Course Overview Course Title: Information Systems Infrastructure and Security Management

More information

FIT3056 Secure and trusted software systems. Unit Guide. Semester 2, 2010

FIT3056 Secure and trusted software systems. Unit Guide. Semester 2, 2010 FIT3056 Secure and trusted software systems Unit Guide Semester 2, 2010 The information contained in this unit guide is correct at time of publication. The University has the right to change any of the

More information

SE 4472a: Information Security

SE 4472a: Information Security Western University Faculty of Engineering Department of Electrical and Computer Engineering SE 4472a: Information Security Course Outline 2014-15 Description: This course provides an introduction to the

More information

San José State University Department of Computer Science CS-174, Server-side Web Programming, Section 2, Spring 2018

San José State University Department of Computer Science CS-174, Server-side Web Programming, Section 2, Spring 2018 San José State University Department of Computer Science CS-174, Server-side Web Programming, Section 2, Spring 2018 Course and Contact Information Instructor: Office Location: Fabio Di Troia DH282 Telephone:

More information

Please consult the Department of Engineering about the Computer Engineering Emphasis.

Please consult the Department of Engineering about the Computer Engineering Emphasis. COMPUTER SCIENCE Computer science is a dynamically growing discipline. ABOUT THE PROGRAM The Department of Computer Science is committed to providing students with a program that includes the basic fundamentals

More information

Course and Contact Information. Course Description. Course Objectives

Course and Contact Information. Course Description. Course Objectives San Jose State University College of Science Department of Computer Science CS157A, Introduction to Database Management Systems, Sections 1 and 2, Fall2017 Course and Contact Information Instructor: Dr.

More information

South Portland, Maine Computer Information Security

South Portland, Maine Computer Information Security South Portland, Maine 04106 Computer Information Title: Fundamentals of Network Catalog Number: INSC 160 Credit Hours: 4 Total Contact Hours: 60 Lecture (or Lab): Lecture/Lab/on-line Instructor: Wendy

More information

City University of Hong Kong Course Syllabus. offered by Department of Computer Science with effect from Semester B 2017/18

City University of Hong Kong Course Syllabus. offered by Department of Computer Science with effect from Semester B 2017/18 City University of Hong Kong offered by Department of Computer Science with effect from Semester B 2017/18 Part I Course Overview Course Title: Internet Security and E-Commerce Protocols Course Code: CS4286

More information

programming exercises.

programming exercises. Dr. John P. Abraham Professor Office: Engineering Building Room 3.276 CSCI 6345 ADVANCED COMPUTER NETWORKS Syllabus for Spring 2014 Professor: Dr. John P. Abraham. Office: Engineering Building Room 3.276

More information

In this course, you need to use Pearson etext. Go to "Pearson etext and Video Notes".

In this course, you need to use Pearson etext. Go to Pearson etext and Video Notes. **Disclaimer** This syllabus is to be used as a guideline only. The information provided is a summary of topics to be covered in the class. Information contained in this document such as assignments, grading

More information

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline Introduction to Networks [CISCO 1] ISS 111

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline Introduction to Networks [CISCO 1] ISS 111 Cisco Systems Cisco Academy HARFORD COMMUNITY COLLEGE 40 Thomas Run Road Bel Air, MD 205 Course Outline Introduction to Networks [CISCO ] ISS COURSE NUMBER: ISS COURSE NAME: CCNA Introduction to Networks

More information

San Jose State University College of Science Department of Computer Science CS185C, NoSQL Database Systems, Section 1, Spring 2018

San Jose State University College of Science Department of Computer Science CS185C, NoSQL Database Systems, Section 1, Spring 2018 San Jose State University College of Science Department of Computer Science CS185C, NoSQL Database Systems, Section 1, Spring 2018 Course and Contact Information Instructor: Suneuy Kim Office Location:

More information

CS 134 Elements of Cryptography and Computer & Network Security WINTER 2018 Instructor: Gene Tsudik

CS 134 Elements of Cryptography and Computer & Network Security WINTER 2018 Instructor: Gene Tsudik CS 134 Elements of Cryptography and Computer & Network Security WINTER 2018 Instructor: Gene Tsudik http://sconce.ics.uci.edu/134-w18/ 1 Today Administrative Stuff Course Organization Course Topics Gentle

More information

Syllabus for CSC 455 Database Systems 3 Credit Hours Spring 2012

Syllabus for CSC 455 Database Systems 3 Credit Hours Spring 2012 Syllabus for CSC 455 Database Systems 3 Credit Hours Spring 2012 I. COURSE DESCRIPTION An introduction to the concepts and techniques encountered in database systems. Topics include data independence,

More information

N/A. Yes. Students are expected to review and understand all areas of the course outline.

N/A. Yes. Students are expected to review and understand all areas of the course outline. Course Outline School: Department: Course Title: Eng. Tech. & Applied Science Information and Communication Engineering Technology (ICET) Adv. Web Application Development Course Code: COMP 229 Course Hours/Credits:

More information

ab Houston Community College

ab Houston Community College Computer Science Technology Department ab Houston Community College ITNW 1313 Computer Virtualization Course Syllabus Instructor Course Reference Number (CRN) Course Description: Course Prerequisite(s)

More information

San Jose State University College of Science Department of Computer Science CS185C, Introduction to NoSQL databases, Spring 2017

San Jose State University College of Science Department of Computer Science CS185C, Introduction to NoSQL databases, Spring 2017 San Jose State University College of Science Department of Computer Science CS185C, Introduction to NoSQL databases, Spring 2017 Course and Contact Information Instructor: Dr. Kim Office Location: MacQuarrie

More information

Syllabus Revised 01/03/2018

Syllabus Revised 01/03/2018 Department of Information Sciences and Technology Volgenau School of Engineering George Mason University Spring 2018 IT 445 Advanced Networking Principles II Syllabus Revised 01/03/2018 Section DL1: Instructor:

More information

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector Acronyms 3DES AES AH ANSI CBC CESG CFB CMAC CRT DoS DEA DES DoS DSA DSS ECB ECC ECDSA ESP FIPS IAB IETF IP IPsec ISO ITU ITU-T Triple DES Advanced Encryption Standard Authentication Header American National

More information