NORTH CAROLINA STATE UNIVERSITY GRADUATE COURSE ACTION FORM
|
|
- Lynne Atkins
- 6 years ago
- Views:
Transcription
1 NORTH CAROLINA STATE UNIVERSITY GRADUATE COURSE ACTION FORM NOTE: Click once on shaded fields to type data. To check boxes, right click at box, click Properties, and click Checked under Default Values. DEPARTMENT/PROGRAM Computer Science COURSE PREFIX/NUMBER CSC/ECE 574 PREVIOUS PREFIX/NUMBER CSC 474/574 DATE OF LAST ACTION March 2002 COURSE TITLE Computer and Network Security ABBREVIATED TITLE COMP & NETWORK SEC SCHEDULING Fall Spring Summer Every Year Alt. Year Odd Alt. Year Even Other COURSE OFFERED BY DISTANCE EDUCATION ONLY ON CAMPUS ONLY BOTH ON CAMPUS AND BY DISTANCE EDUCATION CREDIT HOURS 3 CONTACT HOURS Lecture/Recitation 3 Seminar Laboratory Problem Studio Independent Study/Research Internship/Practicum/Field Work TYPE OF PROPOSAL New Course Drop Course Course Revision Dual-Level Course REVISION Content Prefix/Number Title Abbreviated Title Credit Hours Contact Hours Grading Method Pre-Corequisites Restrictive Statement Description Scheduling GRADING ABCDF S/U INSTRUCTOR (NAME/RANK) Peng Ning, Assistant Professor; Ting Yu, Assistant Professor Graduate Faculty Status Associate Full ANTICIPATED ENROLLMENT Per semester 60 Max.Section 60 Multiple sections Yes No PREREQUISITE(S) CSC 316 or equivalent and CSC 401 or CSC/ECE 570 or equivalent COREQUISITE(S) PRE/COREQUISITE FOR CSC 716, CSC 743, CSC/ECE 774 RESTRICTIVE STATEMENT CURRICULA/MINORS Required Qualified Elective MCS, MS, MSCN, Ph.D. PROPOSED EFFECTIVE DATE Spring 2006 APPROVED EFFECTIVE DATE CATALOG DESCRIPTION (limit to 80 words): Security policies, models, and mechanisms for secrecy, integrity, and availability. Basic cryptography and its applications; operating system models and mechanisms for mandatory and discretionary controls; introduction to database security; security in distributed systems; network security (firewalls, IPsec, and SSL); and control and prevention of viruses and other rogue programs. DOCUMENTATION AS REQUIRED Please number all document pages Course Justification Proposed Revision(s) with Justification Student Learning Objectives Enrollment for Last 5 Years New Resources Statement Consultation with other Departments Syllabus (Old and New) Explanation of differences in requirements of dual-level courses RECOMMENDED BY: Department Head/Director of Graduate Programs Date ENDORSED BY: Chair, College Graduate Studies Committee Date College Dean(s) Date APPROVED: Dean of the Graduate School Date
2 Documentation Required for Course Revision CSC/ECE 574 Information Systems & Network Security I. Proposed Revision with Justification A. Background Information security has become increasingly important as information systems in many of the world s organizations are switching from the paper to the electronic media. Industry, government agencies and various other organizations are having greater demand for well-trained engineers who are prepared to secure these organizations information systems. The Computer Science Department recognized this demand several years ago when it created and is currently offering two regular graduate level courses, CSC 574 Information Systems Security and CSC/ECE 774 Advanced Network Security, and two undergraduate level courses, CSC 405 Introduction to Computer Security and CSC 474 Information Systems Security (piggybacked with CSC 574). However, information security is a discipline that has been studied for several decades and has many more topics than can be covered in these courses. Many important topics were not covered in these current security courses because of the lack of faculty resources. With Dr. Jun Xu and Dr. Ting Yu joining the department in Fall 2003 and Dr. Khaled Harfoush starting to teach undergraduate level security courses, the Computer Science Department has an opportunity to offer more in information security education. The faculty currently teaching security courses (Harfoush, Ning, Xu, and Yu) propose to revise the present security courses and create two new security courses. The following gives a brief description of the proposed security courses including the revisions of the current courses. Undergraduate Level Security Courses CSC 405 Introduction to Computer Security This course mainly covers introductory information security techniques relevant to protecting computer systems, including access control, authentication, applied cryptography, multi-level security, physical security, etc. CSC 474 Network Security This course mainly covers topics relevant to protecting networks and distributed systems, including applied cryptography, authentication, key management, authentication in distributed systems, firewalls, IPsec, transport layer security, security, etc. Graduate Level Security Courses CSC/ECE 574 Computer and Network Security This course serves as the foundational information security course in the graduate program. It covers topics related to information systems and network security, including applied cryptography, authentication, access control, network and distributed security, malicious software, etc. CSC 716 Design of Secure and Reliable Systems The course covers advanced topics in computer system security and reliability. The course presents algorithms/techniques from both fields. The emphasis is on system level design issues, e.g., how systems fail, how algorithms can be compromised, how protocols can be attacked, and ultimately, 2
3 how application design, compiler, operating systems, and processor architectures can be enhanced to detect and mask attacks/failures. CSC 743 Secure Data Management This course covers advanced topics in data management security, including inference control, Rolebased access control, trust management, privacy policy enforcement in databases, query answering over encrypted databases, as well as anonymity and micro data release in decentralized data sharing. CSC/ECE 774 Advanced Network Security This course covers advanced topics in network security, including electronic payment systems, network intrusion detection and alert correlation, secure group communication, broadcast authentication, and security in mobile ad-hoc and sensor networks. B. Proposed Revision for CSC 574 Revise the course title Old title: Information Systems Security New title: Computer and Network Security Justification: After the course content is revised, CSC 574 will have substantial coverage of both computer and network security and that is why we propose to revise the course title accordingly. Revise the course prefix/number Old prefix/number: CSC 474/574 New prefix/number: CSC/ECE 574 Justification: In this course revision, we propose to revise CSC 474 and CSC 574 separately, considering the difference in undergraduate and graduate programs. Thus, CSC 474 and CSC 574 are no longer piggy-backed. Moreover, ECE Department has requested to cross-list CSC 574 as ECE courses to give ECE students more exposure to security courses. After consulting with the head of the Computer Science Department and the Computer Science DGP about the availability of resources, the proposing faculty decided to support ECE Department s request. Revise the Catalog Description Justification: The content of the course is revised in this proposal and therefore we propose to revise the catalog description accordingly. Move the database security portion (except for the introductory content) from CSC 574 into CSC 743 Secure Data Management. Justification: With the creation of a separate course on secure data management, it is more appropriate to include database security topics in the new course. Move the discussion of classical network security techniques (firewalls, IP security, secure socket layer (SSL)) from CSC/ECE 774 (previous Network Security) into CSC 574. Justification: Issues such as firewalls, IP security, and SSL are potentially relevant to many computer science graduate students future jobs. It is more appropriate to cover these topics in a 500-level course so that the students could learn these topics at an earlier stage of their studies. CSC 774 has been revised to drop the above topics and add more advanced topics on group key management (for secure group communication), security in mobile ad-hoc networks, and security in sensor networks The revision of CSC/ECE 774 has been approved. 3
4 II. Student Learning Objectives See syllabus. III. Enrollment for Last Five Years CSC 574 has been offered since Fall The enrollment starting with that semester is: Fall 2002 Fall 2003 Spring 2004 Fall 2004 Spring IV. Consultation with Other Departments The Electrical and Computer Engineering Department initially requested cross-listing CSC/ECE 574, and the Computer Science Department has agreed. Both departments have consulted on this course and it has been approved by the departments joint networking committee that has responsibility for the course. There are no other relevant departments. V. Old and New Syllabus A. Instructors: New Syllabus Dr. Peng Ning, Office: 250 Venture III, Centennial Campus Phone: (919) URL: Dr. Ting Yu Office: 243 Venture III, Centennial Campus Phone: (919) URL: B. Course prerequisites or restrictive statements: CSC 316 or equivalent and CSC 401 or CSC/ECE 570 or equivalent. C. Student learning objectives: Upon successful completion of this course, students will be able to: - State the basic concepts in information security, including security policies, security models, and various security mechanisms. - Explain the basic number theory required for cryptographic applications as well as various cryptographic systems. - Manually compute using Fermat's theorem, Euler's theorem, Euclid's algorithm, extended Euclid's algorithm. - Manually encrypt/decrypt and sign/verify signatures for small messages using RSA, Diffie- Hellman, and DSA algorithms. - State the requirements and mechanisms for identification and authentication. - Explain and compare the various access control policies and models as well as the assurance of these models. - State the characteristics of typical security architectures, including multi-level security systems. - State the criteria of evaluating secure information systems, including evaluation of secure operating systems and secure network systems. - List the database security issues and solutions, including models, architectures, and mechanisms for database security. 4
5 - List network and distributed systems security issues and solutions, including authentication, key distribution, firewalls, and network security protocols. - Explain the network access control mechanisms, including the basic concepts of firewalls, packet filters, application gateways, and typical firewall configurations. - Design firewall configurations and rules to protect a given network. - Outline the protocols, i.e., AH and ESP protocols, for IP Security and the two modes for both protocols. - Explain in their own words the goals of IP Security protocols (AH and ESP), the - Use combinations of IP security protocols to achieve a given security goal (e.g., source authentication, content authentication, traffic confidentiality, etc.). - Explain SSL and TLS protocols. - Apply the above protocols to protect transport-layer communication. - State program security issues, including virus, worm, and logical bombs. - State the basic concepts and general techniques in security auditing and intrusion detection. - State the issues related to administration security, physical security, and program security. - Determine appropriate mechanisms for protecting information systems ranging from operating systems, to database management systems, and to applications. D. Textbooks: Charlie Kaufman, Radia Perlman, and Mike Speciner, Network Security: Private Communication in a Public World, 2nd Edition, Prentice Hall, 2002, ISBN: (Price: USD 54.99) Handouts 1. Sandhu, R.S. Lattice-based access control models, IEEE Computer, 26(11): 9 19, Nov Sandhu, R.S.; Coyne, E.J.; Feinstein, H.L.; Youman, C.E. Role-based access control models, IEEE Computer, 29(2): 38 47, Feb Peng Ning, Sushil Jajodia, Intrusion Detection Techniques, In H. Bidgoli (Ed.), The Internet Encyclopedia. John Wiley & Sons. ISBN: Dec E. Course Organization and Scope: (Assume each lecture takes 75 minutes. The following topics need 28 lectures. These will be adjusted based on the actual progress in a semester.) T1. Basic Security Concepts (1 lectures) o Confidentiality, integrity, availability o Security policies, security mechanisms, assurance T2. Cryptography and Its Applications (7 lectures) o Basic number theory o Secret key cryptosystems o Public key cryptosystems o Hash function o Key Management T3. Identification and Authentication (2 lectures) o Basic concepts of identification and authentication o Password authentication T4. Access Control (4 lectures) o Basic concepts of access control o Discretionary access control and mandatory access control o Lattice-based Models o Covert Channels o Role based Access Control 5
6 Mid-term Review: topics 1 4 (1 lecture) T5. Network and Distributed Systems Security (8 lectures) o Issues in network and distributed systems security o Kerberos o IPSEC o SSL o Firewalls and virtual private networks o Secure o Auditing and intrusion detection T6. Miscellaneous topics (4 lectures) o Assurance and Evaluation of Secure Information Systems (1 lectures) o TCSEC, TNI, CC, etc. o Introduction to Database Security (Security requirements in databases, Access control and authorization in databases, Inference control) o Multi-level security architecture o Program Security (Virus and other malicious software) o Administrating Security (Risk Analysis, Security Planning, Organizational Security Policies) o Physical Security and Beyond (Physical security, TEMPEST, legal and ethical issues in security, environmental issues) Final review: topics 1 6 (1 lecture) F. Schedule of reading assignments: Topic T1: Chapter 1. Topic T2: Chapters 2 7. Topic T3: Chapters Topic T4: Handouts H1 H2. Topic T5: Chapters 13 19, 23; Handout H3. Topic T6: TBD. G. Projected schedule of homework due dates, quizzes and exams: There are 5 homework assignments and 2 exams. Quizzes are given in the form of pop quizzes. Pop quizzes are adopted to encourage the students to study during the non-exam weeks. The results of pop quizzes are not counted in the final grade. Homework 1: topics T1 and T2, due by week 3 Homework 2: topics T2 and T3, due by week 6 Homework 3: topic T4, due by week 9 Homework 4: topic T5, due by week 11 Homework 5: topics T5 and T6, due by week 13 Mid-term exam: week 8 Research project report: due by week 15 Final exam: decided by the university. H. Grading: Assignments 15%, project 15%, midterm 35%, final 35%. The final grades are computed according to the following rules: o A+: >= 95% o A: >= 90% and < 95% o A-: >= 85% and < 90% o B+: >= 80% and < 85% 6
7 o B: >= 75% and < 80% o B-: >= 70% and < 75% o C+: >= 66% and < 70% o C: >= 63% and < 66% o C-: >= 60% and < 63% o D+: >= 56% and < 60% o D: >= 53% and < 56% o D-: >= 50% and < 53% o F: < 50%. I. Policies on incomplete grade and late assignments: Homework and project deadlines will be enforced. Late homework will be accepted with a 10% reduction in grade for each class period they are late by. However, once a homework assignment is discussed in class or the solution is posted, submissions will no longer be accepted. All assignments must be turned in before the start of class on the due date. J. Policies on absences (excused and unexcused) and scheduling makeup work: The university policy on absences will be enforced. See the university policy at the following URL. The students are responsible for discussing makeup exams if they miss exams due to excused absence. The instructor will choose a mutually agreed date and time for the makeup exam. Late submission of homework assignments due to excused absences is not subject to the policies on late assignments. K. Academic integrity: The university, college, and department policies against academic dishonesty will be strictly enforced. You may obtain copies of the NCSU Code of Student Conduct from the Office of Student Conduct, or from the following URL. The instructor expects honesty in the completion of test and assignments. It is the understanding and expectation of instructor that the student's signature on any test or assignment means that the student neither gave nor received unauthorized aid. L. NC State policy on working with students with disabilities: Reasonable accommodations will be made for students with verifiable disabilities. In order to take advantage of available accommodations, students must register with Disability Service for Students at 1900 Student Health Center, Campus Box 7509, For more information on NC State s policy on working with students with disabilities, please see M. Laboratory Safety or Risk Assumption: Not Applicable. N. Pass-through Charges: Not applicable. O. Statement on transportation: Students have to provide their transportation for all class related trips. 7
8 Old Syllabus 1. Instructor: Dr. Peng Ning, Office: 453 EGRC, Centennial Campus Phone: (919) URL: Office hours: Tuesdays and Thursdays, 3:00 pm 4:00 pm 2. Course Objectives: Students will be able to : 1. State the basic concepts in information security, including security policies, security models, and various security mechanisms. 2. Explain the basic number theory required for cryptographic applications as well as various cryptographic systems. 3. Manually compute using Fermat's theorem, Euler's theorem, Euclid's algorithm, extended Euclid's algorithm. 4. Manually encrypt/decrypt and sign/verify signatures for small messages using RSA, Diffie- Hellman, and DSA algorithms. 5. State the requirements and mechanisms for identification and authentication. 6. Explain and compare the various access control policies and models as well as the assurance of these models. 7. State the characteristics of typical security architectures, including multi-level security systems. 8. State the criteria of evaluating secure information systems, including evaluation of secure operating systems and secure network systems. 9. List the database security issues and solutions, including models, architectures, and mechanisms for database security. 10. List network and distributed systems security issues and solutions, including authentication, key distribution, firewalls, and network security protocols. 11. State program security issues, including virus, worm, and logical bombs. 12. State the basic concepts and general techniques in security auditing and intrusion detection. 13. State the issues related to administration security, physical security, and program security. 14. Determine appropriate mechanisms for protecting information systems ranging from operating systems, to database management systems, and to applications. 3. Textbooks: Charles P. Pfleeger. Security in Computing, 2/e. Prentice-Hall, Englewood Cliffs, NJ, (List price at amazon.com: $67.00) Marshall D. Abrams, Sushil Jajodia, and Harold J. Podell, eds. Information Security: An Integrated Collection of Essays. IEEE Computer Society Press, This book can be freely accessed at Handouts (All handouts are accessible on-line) 1. Sandhu, R.S. Lattice-based access control models, IEEE Computer, 26(11): 9 19, Nov Sandhu, R.S.; Coyne, E.J.; Feinstein, H.L.; Youman, C.E. Role-based access control models, IEEE Computer, 29(2): 38 47, Feb Brewer, D.F.C.; Nash, M.J. The Chinese Wall Security Policy, In Proceedings of IEEE Symposium on Security and Privacy, pages , E. Bertino, P. Samarati, and S. Jajodia, An extended authorization model for relational databases, IEEE Trans. on Knowledge and Data Engineering, 9(1):85-101, N. R. Adam and J. C. Wortmann. Security-control methods for statistical databases: A comparative study. ACM Computing Surveys, 21(4): , December
9 6. B. Mukherjee, L.T. Heberlein, and K.N. Levitt. Network Intrusion Detection, IEEE Network, 8(3): 26-41, May RSA Data Security Inc., RSA Laboratories' Frequently Asked Questions About Today's Cryptography, Version 4.1, Accessible at 4. Course Organization and Scope: (Assume each lecture takes 75 minutes. The following topics need 30 lectures (or 15 weeks).) 1. Basic Security Concepts (1 lectures) o Confidentiality, integrity, availability o Security policies, security mechanisms, assurance 2. Cryptography and Its Applications (7 lectures) o Basic number theory o Secret key cryptosystems o Public key cryptosystems o Hash function 3. Identification and Authentication (2 lectures) o Basic concepts of identification and authentication o Password authentication 4. Access Control (5 lectures) o Basic concepts of access control o Discretionary access control and mandatory access control o Lattice-based Models o Covert Channels o Noninterference Models o Chinese Wall Security Policy o Role based Access Control Mid-term Review: topics 1-4 (1 lecture) 5. Basic Security Architecture and Multilevel Security (1 lecture) 6. Evaluation of Secure Information Systems (1 lecture) o TCSEC, TNI, CC, etc. 7. Database Security (3 lectures) o Security requirements in databases o Access control and authorization in databases. o Inference control 8. Network and Distributed Systems Security (4 lectures) o Issues in Network and Distributed Systems Security o Key Distribution Center (KDC) and Public Key Infrastructure (PKI) o Introduction to IPSEC, SSL, ISAKMP/Oakley, etc. o Introduction to Firewall, Virtual Private Network, Secure , etc. 9. Program Security (Virus and other malicious software) (1 lecture) 10. Auditing and Intrusion Detection (2 lecture) 11. Administrating Security (1 lecture) o Risk Analysis. o Security Planning. o Organizational Security Policies 12. Physical Security and Beyond (1 lecture) o Physical security, TEMPEST, legal and ethical issues in security, environmental issues, etc. 5. Schedule of Reading Assignments: If not specifically identified, the following chapters refer to those in the first textbook. We refer to the second textbook as Abrams et al. 9
10 Topic 1: Chapter 1; essay 2 in Abrams et al. Topic 2: Chapters 2, 3, and 4; chapter 15 in Abrams et al. Topic 3: Chapters 6.5, 6.6; handout 3; Chapters and in handout 7. Topic 4: Chapter 6.3; handouts 1 and 2. Topic 5: Chapter 7. Topic 6: Essays 6 and 12 in Abrams et al. Topic 7: Chapter 8, handouts 4 and 5. Topic 8: Chapter 9. Topic 9: Chapter 5. Topic 10: Handout 6. Topic 11: Chapter 10. Topic 12: Chapter Schedule of homework due dates, quizzes and exams: There are six homework assignments and two exams. Quizzes are given in the form of pop quizzes. Pop quizzes are adopted to encourage the students to study during the non-exam weeks. The results of pop quizzes are not counted in the final grade. Homework 1: topics 1 and 2, due by week 3 Homework 2: topics 2 and 3, due by week 6 Homework 3: topic 4, due by week 9 Homework 4: topics 5 and 6, due by week 11 Homework 5: topics 7 and 8, due by week 13 Homework 6: topics 9, 10, and 11, due by week 15 Mid-term exam: week 8 Research project report: due by week 15 Final exam: decided by the university. 7. Grading: Assignments 30%, project 20%, midterm 25%, final 25%. The final grades are computed according to the following rules: o A+: >= 95% o A: >= 90% and < 95% o A-: >= 85% and < 90% o B+: >=80% and < 85% o B: >= 75% and < 80% o B-: >= 70% and < 75% o C+: >=65% and < 70% o C: >=60% and < 65% o C-: >=55% and < 60% o F: < 55%. 8. Policies on late assignments: Homework and project deadlines will be hard. Late homework will be accepted with a 10% reduction in grade for each class period they are late by. However, once a homework assignment is discussed in class, submissions will no longer be accepted. All assignments must be turned in before the start of class on the due date. 9. Policies on absences (excused and unexcused) and scheduling makeup work: The university policy on absences will be enforced. See the university policy at the following URL. The students are responsible for discussing makeup exams if they miss exams due to excused absence. The instructor will choose a mutually agreed date and time for the makeup exam. 10
11 Late submission of homework assignments due to excused absences is not subject to the policies on late assignments. 10. Course prerequisites: CSC 401, CSC Academic integrity: The university, college, and department policies against academic dishonesty will be strictly enforced. You may obtain copies of the NCSU Code of Student Conduct from the Office of Student Conduct, or from the following URL NC State policy on working with students with disabilities: Reasonable accommodations will be made for students with verifiable disabilities. In order to take advantage of available accommodations, students must register with Disability Service for Students at 1900 Student Health Center, Campus Box 7509, For more information on NC State s policy on working with students with disabilities, please see Laboratory Safety or Risk Assumption: Not Applicable. 14. Pass-through Charges: Not applicable. 11
CSC 774 Network Security
CSC 774 Network Security Syllabus 1. Instructor: Dr. Peng Ning, Office: 250 Venture III, Centennial Campus Phone: (919) 513-4457 Email: pning@ncsu.edu URL: http://www.csc.ncsu.edu/faculty/ning Office hours:
More informationFaculty of Science & Information Technology
Faculty of Science & Information Technology Department: Computer Science COURSE SYLLABUS Short Description Student s Copy One copy of this course syllabus is provided to each student registered in this
More informationThe University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus
The University of Jordan Accreditation & Quality Assurance Center COURSE Syllabus 1 Course title Computer Security 2 Course number 1901463 Credit hours (theory, practical) 3 3 Contact hours (theory, practical)
More informationSan José State University School/Department Computer Science 265: Cryptography and Computer Security, Fall 2017
Course and Contact Information Instructor: Auston Davis Office Location: MacQuarrie Hall 217 Telephone: 650-454-6044 Email: Office Hours: Class Days/Time: auston.davis@sjsu.edu (preferred) Mon 6pm 7pm
More informationAIT 682: Network and Systems Security. Instructor: Dr. Kun Sun
AIT 682: Network and Systems Security Instructor: Dr. Kun Sun About Instructor Dr. Kun Sun, Associate Professor of Information Sciences and Technology http://csis.gmu.edu/ksun/ Phone: (703) 993-1715 Email:
More informationNetwork Security
44-555 Network Security Instructor: Scott Bell Office: 2220 Colden Hall Email: sbell@nwmissouri.edu Phone: (660) 562-1699 Description: An introduction to the fundamentals of network security, including
More informationAcademic Course Description
BEC012 - CRYPTOGRAPHY AND NETWORK SECURITY Academic Course Description BHARATH UNIVERSITY Faculty of Engineering and Technology Department of Electronics and Communication Engineering BEC012 Cryptography
More informationJustification: IT/COMP 421 is now IT421. Adjustments made so both CS and IT majors have equivalent prereqs. Corrects error in course justification.
CALIFORNIA STATE UNIVERSITY CHANNEL ISLANDS COURSE MODIFICATION PROPOSAL Courses must be submitted by October 15, 2013, and finalized by the end of the fall semester to make the next catalog (2014-15)
More informationIT443 Network Security Administration Spring Gabriel Ghinita University of Massachusetts at Boston
IT443 Network Security Administration Spring 2018 Gabriel Ghinita University of Massachusetts at Boston Contact Information Instructor: Dr. Gabriel Ghinita Email: Gabriel.Ghinita@umb.edu (preferred contact)
More informationSyllabus CS 430 Introduction to Computer Security Winter 2016
Syllabus CS 430 Introduction to Computer Security Winter 2016 Meeting Times Instructor TA Textbooks Lect: 3:00-3:50 M, Tu, Wed, Th, HB 106 Lab: 3:00-3:50 M, HB 203 Dr. Razvan Andonie, HB 214-E, Office
More informationMORGAN STATE UNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING COURSE SYLLABUS FALL, 2015
MORGAN STATE UNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING COURSE SYLLABUS FALL, 2015 CATALOG DESCRIPTION ONLINE EEGR.483 INTRODUCTION TO SECURITY MANAGEMENT CREDITS: 3 THIS COURSE IS A
More informationFIT5044 Network security. Unit Guide. Semester 1, 2010
FIT5044 Network security Unit Guide Semester 1, 2010 The information contained in this unit guide is correct at time of publication. The University has the right to change any of the elements contained
More informationNORTH CAROLINA STATE UNIVERSITY GRADUATE COURSE ACTION FORM
NORTH CAROLINA STATE UNIVERSITY GRADUATE COURSE ACTION FORM NOTE: Click once on shaded fields to type data. To check boxes, right click at box, click Properties, and click Checked under Default Values.
More informationIntroduction and Overview. Why CSCI 454/554?
Introduction and Overview CSCI 454/554 Why CSCI 454/554? Get Credits and Graduate Security is important More job opportunities More research funds 1 Workload Five homework assignments Two exams (open book
More informationCS 134: Elements of Cryptography and Computer + Network Security Winter sconce.ics.uci.edu/134-w16/ CS 134 Background
CS 134: Elements of Cryptography and Computer + Network Security Winter 2016 sconce.ics.uci.edu/134-w16/ 1 CS 134 Background 11:00-12:20 @ SSL 290 Discussions section as needed (must register!) Senior-level
More informationCHAIR Jr, r7~. cou EGE FACULTY CHAIR (if \G,Jl ~ ~k amica~ pc{ 2.-0 I ; <-0 l "?J Approved,G. 'S u,\? Approved. Approved
2013-2014 LONG SIGNATURE SHEET Proposal Number: SIS 10-07-13 _ ~f/; UNC CHARIDITE Proposal Title: Establish a graduate level course: Cloud Data Storage.:1T1.5 6' ~ 7AJ "1-11$ 8')(.0 Originating Department:
More informationThe University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus
The University of Jordan Accreditation & Quality Assurance Center COURSE Syllabus 1 Course title Introduction to Web Pages Development 2 Course number 807413 Credit hours (theory, practical) 3 3 Contact
More informationMLR Institute of Technology
MLR Institute of Technology Laxma Reddy Avenue, Dundigal, Quthbullapur (M), Hyderabad 500 043 Phone Nos: 08418 204066 / 204088, Fax: 08418 204088 COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION Course
More informationITSY Information Technology Security Course Syllabus Spring 2018
ITSY 1342 - Information Technology Security Course Syllabus Spring 2018 Instructor Course Reference Number (CRN) Course Description: Name: Fidelis Ngang Tel: 713-718-5552 Office: Spring Branch, Room 900L
More informationCOURSE OUTLINE. Last Amendment Edition Procedure No. Lecturer /blog Room No. Phone No. / Name.
FACULTY OF COMPUTING Page 1 of 6 COURSE 0 PRE-REQUISITE none EQUIVALENCE CONTACT HOURS 4 Lecturer e-mail/blog Room No. Phone No. 1. Dr. Siti Hajar Othman hajar@utm.my / www.comp.utm.my/hajar 347-04, N8
More informationINFS 2150 (Section A) Fall 2018
INFS 2150 (Section A) Fall 2018 Introduction to Web Development Class meets TUE & THU: 12:30am-1:45pm: in Wheatley 114 Instructor: Peter Y. Wu Office: Wheatley 309 Office Hours: Tuesday 9:00 am-12:00 noon;
More information10EC832: NETWORK SECURITY
10EC832: NETWORK SECURITY Objective: In this electronic age, security and privacy are two of the issues whose importance cannot be stressed enough. How do we ensure the systems we use are resistant to
More informationSRI VENKATESWARA COLLEGE OF ENGINEERING
COURSE DELIVERY PLAN - THEORY Page 1 of 6 Department of Information Technology B.E/B.Tech :IT/CS Regulation:2013 LP: CS6701 Rev. No: 01 Date: 30.06.2017 Sub. Code / Sub. Name : CS6701 CRYPTOGRAPHY & NETWORK
More informationNew Undergraduate Course Proposal Form
View New Course Proposal New Undergraduate Course Proposal Form 1. Department and Contact Information Tracking Number Date & Time Submitted 946 2010-12-02 17:49:08 Department Information Systems and Decision
More informationCSCI 4250/6250 Fall 2013 Computer and Network Security. Instructor: Prof. Roberto Perdisci
CSCI 4250/6250 Fall 2013 Computer and Network Security Instructor: Prof. Roberto Perdisci perdisci@cs.uga.edu CSCI 4250/6250 What is the purpose of this course? Combined Undergrad/Graduate Intro to Computer
More informationSan José State University Department of Computer Science CS166, Information Security, Section 1, Fall, 2018
Course and Contact Information Instructor: Office Location: San José State University Department of Computer Science CS166, Information Security, Section 1, Fall, 2018 Fabio Di Troia DH282 Telephone: 408-924-7171
More informationGET 433 Course Syllabus Spring 2017
Instructor: Doug Taber Telephone: 315-558-2359 Email: pdtaber@syr.edu Office: Hinds Hall 239 Location: Hinds 013 Day: Tues / Thurs Time: 8 AM to 9:20 AM Office Hours: TBA Course Overview GET 433 Enterprise
More informationRochester Institute of Technology Golisano College of Computing and Information Sciences Department of Information Sciences and Technologies
Rochester Institute of Technology Golisano College of Computing and Information Sciences Department of Information Sciences and Technologies 4002-360.01 ~ Introduction to Database & Data Modeling ~ Spring
More informationISM 324: Information Systems Security Spring 2014
ISM 324: Information Systems Security Spring 2014 Instructor: Co-Instructor: Office: E-Mail: Phone: Office Hours: Jeffrey Wall Hamid Nemati 392 Bryan Building jdwall2@uncg.edu (email is the preferred method
More informationDepartment of Computer & Information Sciences. CSCI-342: Introduction to Information Security Syllabus
Department of Computer & Information Sciences CSCI-342: Introduction to Information Security Syllabus Course Description This course provides an introduction to the various basic technical and administrative
More informationCity University of Hong Kong. Course Syllabus. offered by Department of Computer Science with effect from Semester B 2016/17
City University of Hong Kong offered by Department of Computer Science with effect from Semester B 2016/17 Part I Course Overview Course Title: Information Security for ecommerce Course Code: CS5285 Course
More informationDivision of Engineering, Computer Programming, and Technology
1 of 10 8/27/2017, 6:42 PM Jump to Today Edit Division of Engineering, Computer Programming, and Technology Department of Network Engineering Technology National Center of Academic Excellence in Information
More informationBOSTON UNIVERSITY Metropolitan College MET CS342 Data Structures with Java Dr. V.Shtern (Fall 2011) Course Syllabus
BOSTON UNIVERSITY Metropolitan College MET CS342 Data Structures with Java Dr. V.Shtern (Fall 2011) Course Syllabus 1. Course Objectives Welcome to MET CS342 Data Structures with Java. The intent of this
More informationInstructor: Eric Rettke Phone: (every few days)
Instructor: Eric Rettke Phone: 818 364-7775 email: rettkeeg@lamission.edu (every few days) Fall 2016 Computer Science 411 - Principles of Cyber Security 1 Please keep a copy of the syllabus handy for the
More informationDel Mar College Master Course Syllabus. UNIX System Administration Course Number: ITSC1358
Del Mar College Master Course Syllabus UNIX System Administration Course Number: ITSC1358 College Year: 2010 Professor Name: David Hattox Semester: Fall Office Location: VB124 Phone Contact: 698-1112 DMC
More informationSyllabus for CIT 442 Information System Security 3 Credit Hours Spring 2015
Syllabus for CIT 442 Information System Security 3 Credit Hours Spring 2015 I. COURSE DESCRIPTION An overview of information system security to include managing security, protecting information technology
More informationBRAZOSPORT COLLEGE LAKE JACKSON, TEXAS SYLLABUS. ITNW 2313: NETWORKING HARDWARE Online Course Version COMPUTER TECHNOLOGY DEPARTMENT
BRAZOSPORT COLLEGE LAKE JACKSON, TEXAS SYLLABUS ITNW 2313: NETWORKING HARDWARE Online Course Version COMPUTER TECHNOLOGY DEPARTMENT CATALOG DESCRIPTION ITNW 2313 Networking Hardware. CIP 1109010007 Maintain
More informationOklahoma State University Spears School of Business Department of Management Information Systems
Oklahoma State University Spears School of Business Department of Management Information Systems Information Assurance Management TCOM 5223 Wednesday 4:30 PM 7:10 PM (Central Time) Location: Tulsa North
More informationCSci 4211: Data Communications and Computer Networks. Time: Monday and Wednesday 1 pm to 2:15 pm Location: Vincent Hall 16 Spring 2016, 3 Credits
CSci 4211: Data Communications and Computer Networks Time: Monday and Wednesday 1 pm to 2:15 pm Location: Vincent Hall 16 Spring 2016, 3 Credits 1 Instructor David Hung-Chang Du Email: du@cs.umn.edu Office:
More informationMWF 9:00-9:50AM & 12:00-12:50PM (ET)
Department of Mathematics and Computer Science Adelphi University Fall 2013 0145-443-001 Database Management Systems Dr. R. M. Siegfried 214 Post Hall (516)877-4482 siegfrie@adelphi.edu Office Hours Course
More informationComputer Science Technology Department
Computer Science Technology Department Houston Community College Department Phone Number: ab Houston Community College ITMT 1370 Windows Client Operating System - Windows 10 Course Syllabus Summer 2017
More informationCSci 4211: Introduction to Computer Networks. Time: Monday and Wednesday 2:30 to 3:45 pm Location: Smith Hall 231 Fall 2018, 3 Credits
CSci 4211: Introduction to Computer Networks Time: Monday and Wednesday 2:30 to 3:45 pm Location: Smith Hall 231 Fall 2018, 3 Credits 1 Instructor David Hung-Chang Du Email: du@cs.umn.edu Office: Keller
More informationIST359 - INTRODUCTION TO DATABASE MANAGEMENT SYSTEMS
IST359 - INTRODUCTION TO DATABASE MANAGEMENT SYSTEMS 1. COURSE DETAILS Revised: 08/14/2013 COURSE (SECTION): IST359 (M003) TERM: Fall 2013 INSTRUCTOR: Deborah Nosky FINAL EXAM: Tuesday April 30th OFFICE:
More informationINFORMATION SESSION. MS Software Engineering, specialization in Cybersecurity
INFORMATION SESSION MS Software Engineering, specialization in Cybersecurity Presenter Afifa Hamad Program Specialist Graduate & Extended Studies Charles W. Davidson College of Engineering San Jose State
More informationThe Linux Command Line: A Complete Introduction, 1 st ed., by William E. Shotts, Jr., No Starch Press, 2012.
Department of Mathematics and Computer Science Adelphi University Fall 2018 0145-275-001 Operating Systems Practicum Dr. R. M. Siegfried 407 Science (516)877-4482 http://home.adelphi.edu/~siegfried/cs271
More informationSan José State University Computer Science Department CS49J, Section 3, Programming in Java, Fall 2015
Course and Contact Information San José State University Computer Science Department CS49J, Section 3, Programming in Java, Fall 2015 Instructor: Aikaterini Potika Office Location: MacQuarrie Hall 215
More informationPhiladelphia University Faculty of Information Technology Department of Computer Science --- Semester, 2007/2008. Course Syllabus
Philadelphia University Faculty of Information Technology Department of Computer Science --- Semester, 2007/2008 Course Syllabus Course Title: Advanced Databases Course Level: 4 Lecture Time: Course code:
More informationSUMMARY OF INFORMATION ON EACH COURSE
1. Name of Course Applied Cryptography 2. Course Code TAC 3121 3. Status of Course Specialisation Core for B.IT Security Technology [Applies to (cohort) ] 4. MQF Level/Stage Note : Certificate MQF Level
More informationSan José State University Computer Science Department CS157A: Introduction to Database Management Systems Sections 5 and 6, Fall 2015
San José State University Computer Science Department CS157A: Introduction to Database Management Systems Sections 5 and 6, Fall 2015 Course and Contact Information Instructor: Ron Gutman Office Location:
More informationRepresentative Syllabus
PREPARING COMPETENT AND RESPONSIBLE BUSINESS LEADERS THE UNIVERSITY OF AKRON COLLEGE OF BUSINESS ADMINISTRATION DEPARTMENT OF FINANCE SYLLABUS Fall, 2012 CORPORATE FINANCIAL MANAGEMENT 6400:310 001 BCCE
More informationFORM I: SUMMARY PAGE FOR PROPOSAL # CSCI
FORM I: SUMMARY PAGE FOR PROPOSAL # CSCI102010-08 1. Title: CISM 3325: Data Communications and Computer Networks 2. Submitting College: COST 3. Department(s) Generating the Proposal: Engineering Technology
More informationSan José State University Department of Computer Science CS 166 / SE 166, Information Security, Section 4, spring, 2017
San José State University Department of Computer Science CS 166 / SE 166, Information Security, Section 4, spring, 2017 Course and Contact Information Instructor: Prakash Atawale Office Location: DH 282
More informationA & B Section. Day. A Mrs. Krishnaveni S 1204 UB
SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF SOFTWARE ENGINEERING COURSE PLAN Course Code : SE1102 Course Title : NETWORKS SECURITY Semester : IV Course Time : FEB MAY 2016 Day A
More informationCSCI 201L Syllabus Principles of Software Development Spring 2018
L Syllabus Principles of Software Development Spring 2018 Instructor: Jeffrey Miller, Ph.D. Email: jeffrey.miller@usc.edu Web Page: http://www-scf.usc.edu/~csci201 Office: SAL 342 Phone: 213-740-7129 Lectures:
More informationComputer Science Technology Department
Computer Science Technology Department Houston Community College Department Phone Number: ab Houston Community College ITSC 1309 Integrated Software Applications I Course Syllabus Instructor Course Reference
More informationKris Gaj Research and teaching interests: ECE 646 Cryptography and Computer Network Security. Course web page: Contact: ECE 646
646 and Computer Network Security Course web page: web page Courses 646 Kris Gaj Research and teaching interests: cryptography network security computer arithmetic FPGA & ASIC design and testing Contact:
More informationIntroduction. Ahmet Burak Can Hacettepe University. Information Security
Introduction Ahmet Burak Can Hacettepe University abc@hacettepe.edu.tr Information Security 1 Books Textbook: Network Security: Private Communication in a Public World, 2nd Edition. C. Kaufman, R. Perlman,
More informationIT 341 Fall 2017 Syllabus. Department of Information Sciences and Technology Volgenau School of Engineering George Mason University
Department of Information Sciences and Technology Volgenau School of Engineering George Mason University Fall 2017 IT 341 Data Communications and Networking Principles Syllabus (Revised 08/14/2017) Section
More informationCS 241 Data Organization using C
CS 241 Data Organization using C Fall 2018 Instructor Name: Dr. Marie Vasek Contact: Private message me on the course Piazza page. Office: Farris 2120 Office Hours: Tuesday 2-4pm and Thursday 9:30-11am
More informationCASPER COLLEGE COURSE SYLLABUS MSFT 1600 Managing Microsoft Exchange Server 2003 Semester/Year: Fall 2007
CASPER COLLEGE COURSE SYLLABUS MSFT 1600 Managing Microsoft Exchange Server 2003 Semester/Year: Fall 2007 Lecture Hours: 2 Lab Hours: 2 Credit Hours: 3 Class Time: Saturday 8:30 AM - 12:00 PM Room: BU
More informationSan José State University Department of Computer Science CS049J, Programming in Java, Section 2, Fall, 2016
Course and Contact Information San José State University Department of Computer Science CS049J, Programming in Java, Section 2, Fall, 2016 Instructor: Office Location: Fabio Di Troia DH282 Telephone: Email:
More informationTEACHING & ASSESSMENT (T & A) PLAN College of Economics Management and Information Systems Department of Information Systems
1 UoN/AA-003/FORM-QTLMS/V2/2017 TEACHING & ASSESSMENT (T & A) PLAN College of Economics Management and Information Systems Department of Information Systems Semester: Summer 2017 Academic Year 2016-17
More informationECE 646 Cryptography and Computer Network Security. Kris Gaj Research and teaching interests:
646 Cryptography and Computer Network Security Course web page: Google Kris Gaj 646 Kris Gaj Research and teaching interests: cryptography network security computer arithmetic FPGA & ASIC design and testing
More informationECE 646 Cryptography and Computer Network Security. Course web page: Kris Gaj Research and teaching interests: Contact: ECE web page Courses ECE 646
646 Cryptography and Computer Network Security Course web page: web page Courses 646 Kris Gaj Research and teaching interests: cryptography network security computer arithmetic FPGA & ASIC design and testing
More informationOklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017
Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017 ITD 3443 Network Security Students will provide Cyber Defense while understanding Cyber Threats. Their attack types
More informationINSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad
INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, yderabad - 500 043 COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Course Code Regulation Course Structure Course Coordinator
More informationUniversity of Jordan Jordan University Business School (JUBS)
1. Department Name: Accounting 2. Program Name: MA and MBA 3. Program Code 2 4. Course Code and Title: 1602726 Advanced Auditing 5. Course credits: 3 6. Pre-requisites: 7. Course Instructor/ Coordinator
More informationNetworks and Communications MS216 - Course Outline -
Networks and Communications MS216 - Course Outline - Objective Lecturer Times Overall Learning Outcomes Format Programme(s) The objective of this course is to develop in students an understanding of the
More informationNew Undergraduate Course Proposal Form
New Undergraduate Course Proposal Form 1. Department and Contact Information Tracking Number Date & Time Submitted 790 2009-02-13 14:13:42 Department College Budget Account Number Computer Science & Engieering
More informationCollege of San Mateo Course Outline
College of San Mateo Course Outline New Course Update/No change Course Revision (Minor) Course Revision (Major) Date: 1/26/12 Department: CIS Number: 420 Course Title: Project Management Professional Certificate
More informationRYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education
RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education COURSE OF STUDY 2017-2018 (C)ITM 820 Information Systems Security and Privacy
More informationX Prefix/suffix Course Learning Outcomes
CALIFORNIA STATE UNIVERSITY CHANNEL ISLANDS COURSE MODIFICATION PROPOSAL Courses must be submitted by October 15, 2011, and finalized by the end of the fall semester to make the next catalog (2012-13)
More informationSyllabus Revised 08/21/17
Department of Information Sciences and Technology Volgenau School of Engineering George Mason University Fall 2017 IT 445 Advanced Networking Principles II Syllabus Revised 08/21/17 Instructor: Pouyan
More informationCSC 562: Graduate Introduction to Game Engine Design
CSC 562: Graduate Introduction to Game Engine Design In Workflow 1. 14CSC GR Director of Curriculum (rouskas@ncsu.edu) 2. COE CC Coordinator GR (rfillin@ncsu.edu) 3. COE CC Chair GR (reeves@ncsu.edu; rfillin@ncsu.edu;
More informationCPSC 5157G Computer Networks
CPSC 5157G Computer Networks Instructor Dr. Jianhua Yang Center for Commerce and Technology 28 (706) 565 3520 e mail: yang_jianhua@colstate.edu website: http://csc.colstate.edu/yang/ Office Hours (Fall
More informationSan Jose State University College of Science Department of Computer Science CS151, Object-Oriented Design, Sections 1,2 and 3, Spring 2017
San Jose State University College of Science Department of Computer Science CS151, Object-Oriented Design, Sections 1,2 and 3, Spring 2017 Course and Contact Information Instructor: Dr. Kim Office Location:
More informationAdvanced Topics in Database Systems Spring 2016
44-560 Advanced Topics in Database Systems Spring 2016 Course Description Advanced topics in database systems, including database administration, distributed databases, and data warehousing. Hands-on experience
More informationECONOMICS 5317: CONTEMPORARY GOVERNMENT AND BUSINESS RELATIONS
1 ECONOMICS 5317: CONTEMPORARY GOVERNMENT AND BUSINESS RELATIONS Fall 2011, MWF 9:05-9:55, HCB 408 INSTRUCTOR: David VanHoose OFFICE HOURS: OFFICE: 339 Hankamer MWF 8:00-9:00 & 12:15-1:15; OFFICE PHONE:
More informationIT150 - IT Systems Security +
IT150 - IT Systems Security + Document Type: Proposal Type: Requester(s): College: Origination Approved: District Master Course Outline Revision Robert A Bunge North 04/11/2017-11:28 AM BASIC INFORMATION
More informationCourse Title: Network+/Networking Fundamentals. Course Section: CNS-101-I1. FORMAT: Online
Course Title: Network+/Networking Fundamentals Course Section: CNS-101-I1 FORMAT: Online TIME FRAME: Start Date: 15 January 2018 End Date: 06 May 2018 CREDITS: 4 INSTRUCTOR: Carlos J. Garcia Office Hours:
More informationESET 369 Embedded Systems Software, Fall 2017
ESET 369 Embedded Systems Software, Fall 2017 Syllabus Contact Information: Professor: Dr. Byul Hur Office: Fermier 008A Telephone: (979) 845-5195 FAX: E-mail: byulmail@tamu.edu Web: rftestgroup.tamu.edu
More informationCity University of Hong Kong. Course Syllabus. offered by Department of Information Systems with effect from Semester A 2017 / 2018
City University of Hong Kong offered by Department of Information Systems with effect from Semester A 2017 / 2018 Part I Course Overview Course Title: Information Systems Infrastructure and Security Management
More informationFIT3056 Secure and trusted software systems. Unit Guide. Semester 2, 2010
FIT3056 Secure and trusted software systems Unit Guide Semester 2, 2010 The information contained in this unit guide is correct at time of publication. The University has the right to change any of the
More informationSE 4472a: Information Security
Western University Faculty of Engineering Department of Electrical and Computer Engineering SE 4472a: Information Security Course Outline 2014-15 Description: This course provides an introduction to the
More informationSan José State University Department of Computer Science CS-174, Server-side Web Programming, Section 2, Spring 2018
San José State University Department of Computer Science CS-174, Server-side Web Programming, Section 2, Spring 2018 Course and Contact Information Instructor: Office Location: Fabio Di Troia DH282 Telephone:
More informationPlease consult the Department of Engineering about the Computer Engineering Emphasis.
COMPUTER SCIENCE Computer science is a dynamically growing discipline. ABOUT THE PROGRAM The Department of Computer Science is committed to providing students with a program that includes the basic fundamentals
More informationCourse and Contact Information. Course Description. Course Objectives
San Jose State University College of Science Department of Computer Science CS157A, Introduction to Database Management Systems, Sections 1 and 2, Fall2017 Course and Contact Information Instructor: Dr.
More informationSouth Portland, Maine Computer Information Security
South Portland, Maine 04106 Computer Information Title: Fundamentals of Network Catalog Number: INSC 160 Credit Hours: 4 Total Contact Hours: 60 Lecture (or Lab): Lecture/Lab/on-line Instructor: Wendy
More informationCity University of Hong Kong Course Syllabus. offered by Department of Computer Science with effect from Semester B 2017/18
City University of Hong Kong offered by Department of Computer Science with effect from Semester B 2017/18 Part I Course Overview Course Title: Internet Security and E-Commerce Protocols Course Code: CS4286
More informationprogramming exercises.
Dr. John P. Abraham Professor Office: Engineering Building Room 3.276 CSCI 6345 ADVANCED COMPUTER NETWORKS Syllabus for Spring 2014 Professor: Dr. John P. Abraham. Office: Engineering Building Room 3.276
More informationIn this course, you need to use Pearson etext. Go to "Pearson etext and Video Notes".
**Disclaimer** This syllabus is to be used as a guideline only. The information provided is a summary of topics to be covered in the class. Information contained in this document such as assignments, grading
More informationHARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline Introduction to Networks [CISCO 1] ISS 111
Cisco Systems Cisco Academy HARFORD COMMUNITY COLLEGE 40 Thomas Run Road Bel Air, MD 205 Course Outline Introduction to Networks [CISCO ] ISS COURSE NUMBER: ISS COURSE NAME: CCNA Introduction to Networks
More informationSan Jose State University College of Science Department of Computer Science CS185C, NoSQL Database Systems, Section 1, Spring 2018
San Jose State University College of Science Department of Computer Science CS185C, NoSQL Database Systems, Section 1, Spring 2018 Course and Contact Information Instructor: Suneuy Kim Office Location:
More informationCS 134 Elements of Cryptography and Computer & Network Security WINTER 2018 Instructor: Gene Tsudik
CS 134 Elements of Cryptography and Computer & Network Security WINTER 2018 Instructor: Gene Tsudik http://sconce.ics.uci.edu/134-w18/ 1 Today Administrative Stuff Course Organization Course Topics Gentle
More informationSyllabus for CSC 455 Database Systems 3 Credit Hours Spring 2012
Syllabus for CSC 455 Database Systems 3 Credit Hours Spring 2012 I. COURSE DESCRIPTION An introduction to the concepts and techniques encountered in database systems. Topics include data independence,
More informationN/A. Yes. Students are expected to review and understand all areas of the course outline.
Course Outline School: Department: Course Title: Eng. Tech. & Applied Science Information and Communication Engineering Technology (ICET) Adv. Web Application Development Course Code: COMP 229 Course Hours/Credits:
More informationab Houston Community College
Computer Science Technology Department ab Houston Community College ITNW 1313 Computer Virtualization Course Syllabus Instructor Course Reference Number (CRN) Course Description: Course Prerequisite(s)
More informationSan Jose State University College of Science Department of Computer Science CS185C, Introduction to NoSQL databases, Spring 2017
San Jose State University College of Science Department of Computer Science CS185C, Introduction to NoSQL databases, Spring 2017 Course and Contact Information Instructor: Dr. Kim Office Location: MacQuarrie
More informationSyllabus Revised 01/03/2018
Department of Information Sciences and Technology Volgenau School of Engineering George Mason University Spring 2018 IT 445 Advanced Networking Principles II Syllabus Revised 01/03/2018 Section DL1: Instructor:
More informationAcronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector
Acronyms 3DES AES AH ANSI CBC CESG CFB CMAC CRT DoS DEA DES DoS DSA DSS ECB ECC ECDSA ESP FIPS IAB IETF IP IPsec ISO ITU ITU-T Triple DES Advanced Encryption Standard Authentication Header American National
More information