The University of Jordan Accreditation & Quality Assurance Center COURSE Syllabus
1 Course title Computer Security 2 Course number 1901463 Credit hours (theory, practical) 3 3 Contact hours (theory, practical) 3 4 Prerequisites/corequisites Computer Networks (1901361) 5 Program title Computer Science 6 Program code 1901 7 Awarding institution The University of Jordan 8 Faculty King Abdullah II School for Information Technology 9 Department Computer Science Department 10 Level of course Third year 11 Year of study and semester (s) 1 Semester 12 Final Qualification Bachelor 13 Other department (s) involved in teaching the course 14 Language of Instruction English 15 Date of production/revision February 2015 16 Required/ Elective Elective 16. Course Coordinator: Office numbers: 114 Office hours, Sunday, Tuesday and Thursday from: 12:00-14:00 Phone numbers: 22575 email addresses: a.omari@ju.edu.jo Computer Information Systems and Business Information Technology 17. Other instructors: You may contact me at any time using social media, like Facebook and email contacts The course have some shareware programs, it is the student responsibility to use the tools according to the package instructions and limitations Every student is expected to completely adhere to the assignments and project strict deadlines, absolutely no exceptions will be given. No makeup exams will be given. University Regulations should be respected 18. Course Description: As stated in the approved study plan. This course explains Security protocols, authentication protocols, data integrity, digital signatures, intrusion detection, key management and distribution, viruses and other malicious codes, information flow, mobile code and agent security. Cryptographic algorithms: Secret Key Encryption (DES), Public Key Encryption (RSA), Message Digest Algorithm (MD5); Attacks and countermeasures: Packet sniffing, Spoofing and denial of service; Application layer security: HTTPS, secure email; Transport layer security: TLS, SSL; Network layer security: IP security 1
(IPSec), AH protocol, ESP protocol; access control and Firewalls: Filter-based firewalls, Proxybased firewalls; wireless networks security, security in IEEE 802.11, WEP protocol, EAP protocol. 19. Course aims and outcomes: A- Aims: Enable students to understand the computer methods of security and cryptography. Students learn introduction to computer security, aspects of security, threats and method of data protections, encryption and decryption methods, authentication systems, data integrity and digital signature. B- Intended Learning Outcomes (ILOs): Upon successful completion of this course students will be able to A- Knowledge and Understanding: Students should A1) Learn the basic concepts involved with computer security. A2) Understand the importance of having a secure network. A3) Understand the features of cryptographic systems. B- Intellectual skills: with the ability to B1) Analyze and compare the advantages/disadvantages of different security mechanisms and iden the set of security services they can provide. B2) Classify different types of security attacks B3) Design a new simple security protocol. B4) Identify the security protocols applied in different network layers. C- Subject specific skills with ability to C1) Work in different case studies to show how the objectives of different security requirements can achieved. C2) Implement practical security protocols using suitable programming languages. D- Transferable skills with ability to D1) Discuss and work in a group in order to design and write the specification of a new security prot D2) Work in groups in order to implement security programs that adhere to the specification of the n designed security protocol. D3) Work with other groups to make different implementations for the same security protocol specification and communicate successfully. D4) Present the final work (project) and make a demo. 20. Topic Outline and Schedule: Topic Week Instructor Achieved ILOs Evaluation Methods Reference Security 1 Dr Ahmad Al A,B and C Quizzes Text book Architecture Symmetric ciphers 2, 3,4 and 5 Dr Ahmad Al B and C Quizzes, Internet Public Key Cryptograph y and Hash Functions Network Security Applications 2 6,7 and 8 Dr Ahmad Al 9, 10 and 11 Dr Ahmad Al A, B and D Midterm Exam Quizzes and Homework B, C and D Quizzes and Homework Securing 12 and 13 Dr Ahmad Al B, C and D Quizzes,
Wireless LANs Operational Security 14 and 15 Dr Ahmad Al A, B, C and D Quizzes, 21. Teaching Methods and Assignments: Development of ILOs is promoted through the following teaching and learning methods: Class hands on practice Referring to the recent security tools and techniques Practical examples Security forums and news groups 22. Evaluation Methods and Course Requirements: Opportunities to demonstrate achievement of the ILOs are provided through the following assessment methods and requirements: Quizzes + Assignments + Class discussions + Class behavior & Attendance + project 20% Mid Exam: 30% Final Exam: 50% 23. Course Policies: A- Attendance policies: Is a must B- Absences from exams and handing in assignments on time: Exam absence and delayed assignments will not be accepted unless a valid reason is raised C- Health and safety procedures: Each student is fully responsible for his/her device protection D- Honesty policy regarding cheating, plagiarism, misbehavior: Pilgrims, copy rights, intellectual property, piracy are not allowed, the student who shows rules violations will fail in the course E- Grading policy: Every exam item has it is own mark, The final mark will be calculated as the average of students according to the normal distribution F- Available university services that support achievement in the course: http://elearning.ju.edu.jo/ User Name and Password are similar to the student's Internet account at the university 3
24. Required equipment: NA 25. References: A- Required book (s), assigned reading and audio-visuals: Cryptography and Network Security Principles and Practices, William Stallings, Pearson: Prentice Hall, Sixth Edition, 2013 B- Recommended books, materials, and media: Network Security Essentials Applications and Standards, William Stallings, Pearson Prentice Hall, Fourth Edition, 2010. Cryptography and Network Security, Behrouz A Forouzan, McGraw-Hill Science, F Edtion, 2007. Applied Cryptography: Protocols, Algorithms, and Source Code in C, Bruce Schneie Second Edition 1996. Practical Cryptography, Niels Ferguson and Bruce Schneier, Wiley, 2003. IEEE Security and Privacy magazine. ITU-T Recommendations X.800, X.805 and X.509. 26. Additional information: YouTube channels of the instructor is additional resources Name of Course Coordinator: -------------------Signature: ------------------------- Date: ------------------------- Head of curriculum committee/department: ------------------------- Signature: --------------------------------- Head of Department: ------------------------- Signature: --------------------------------- Head of curriculum committee/faculty: ------------------------- Signature: --------------------------------- Dean: ------------------------------------------- -Signature: --------------------------------- Copy to: Head of Department Assistant Dean for Quality Assurance Course File 4