The University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus

Similar documents
The University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus

The University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus

Course Syllabus. Optical Mineralogy. Course Name:

Faculty of Science & Information Technology

On successful completion of this course students should:

Academic Course Description

Networks and Communications MS216 - Course Outline -

CUNY John Jay College of Criminal Justice MATH AND COMPUTER SCIENCE

Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017

Faculty of Sciences and Information Technology

City University of Hong Kong. Course Syllabus. offered by Department of Computer Science with effect from Semester B 2016/17

MLR Institute of Technology

University of Jordan Jordan University Business School (JUBS)

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

Course Name: Information and Computers Networks Security Course Code: IT423

UNIT OUTLINE. Network Engineering 304. Mr Iain Murray. Department of Electrical and Computer Engineering Curtin Engineering

University of Asia Pacific (UAP) Department of Electrical and Electronics Engineering (EEE) Course Outline

CPSC 4600 Biometrics and Cryptography Fall 2013, Section 0

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

City University of Hong Kong Course Syllabus. offered by Department of Computer Science with effect from Semester B 2017/18

Page 1 of 5. COMP C8034: Network Security. Language of Instruction: Credits: 5. Valid From: Semester /15 ( September 2014 )

FIT5044 Network security. Unit Guide. Semester 1, 2010

Syllabus CS 430 Introduction to Computer Security Winter 2016

10EC832: NETWORK SECURITY

University of Asia Pacific (UAP) Department of Computer Science and Engineering (CSE) Course Outline

ITT Technical Institute. ET385 Data and Network Communications Onsite Course SYLLABUS

ITT Technical Institute. ET3110 Networking and Communications Onsite and Online Course SYLLABUS

San José State University School/Department Computer Science 265: Cryptography and Computer Security, Fall 2017

Network Security

MORGAN STATE UNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING COURSE SYLLABUS FALL, 2015

Name of chapter & details.

IT443 Network Security Administration Spring Gabriel Ghinita University of Massachusetts at Boston

Division of Engineering, Computer Programming, and Technology

COURSE OUTLINE. Last Amendment Edition Procedure No. Lecturer /blog Room No. Phone No. / Name.

EEL DATA NETWORKS, SYSTEMS, AND SECURITY Fall 2016

Justification: IT/COMP 421 is now IT421. Adjustments made so both CS and IT majors have equivalent prereqs. Corrects error in course justification.

MORGANSTATEUNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING. EEGR510 Communications Networks Credits: 3 COURSE SYLLABUS

Introduction and Overview. Why CSCI 454/554?

SRI VENKATESWARA COLLEGE OF ENGINEERING

EE3315 Internet Technology EE3315 Internet Technology Overview Slide 1

NORTH CAROLINA STATE UNIVERSITY GRADUATE COURSE ACTION FORM

Course Syllabus - CNT 4703 Design and Implementation of Computer Communication Networks Fall 2011

TEACHING & ASSESSMENT (T & A) PLAN College of Economics Management and Information Systems Department of Information Systems

Introduction. Ahmet Burak Can Hacettepe University. Information Security

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

programming exercises.

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

Advisory: Students should have already taken MICROCOMPUTER APPLICATIONS II - 431

FIT3056 Secure and trusted software systems. Unit Guide. Semester 2, 2010

ITSY Information Technology Security Course Syllabus Spring 2018

Syllabus for CIT 442 Information System Security 3 Credit Hours Spring 2015

INTE-C5O44 - Internet

TEACHING & ASSESSMENT PLAN

SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY SCHOOL OF COMPUTING DEPARTMENT OF CSE COURSE PLAN. Tech park ( 7 th floor)

San José State University Department of Computer Science CS166, Information Security, Section 1, Fall, 2018

Course Name: Computer Networks-1 Course Code: IT222

ISM 324: Information Systems Security Spring 2014

KALASALINGAM UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING EVEN SEMESTER COURSE PLAN

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

Textbook Charles Petzold, Programming Windows, 5th edition, Microsoft Press. References - other textbooks or materials none

Course Intended Learning Outcomes (CILOs): Upon successful completion of this course, students should be able to:

M.D UNIVERSITY SCHEME OF STUDIES AND EXAMINATION M.TECH 2nd YEAR (COMPUTER SCIENCE & ENGINEERING) SEMESTER 3rd CBCS Scheme effective from

Monfort College of Business Semester Course Syllabus ( ) COURSE PREFIX/TITLE: BACS 382 TCP/IP Network Security Sem. Hrs. 3 Ed.

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous)

SI - Computer Security

ECONOMICS 5317: CONTEMPORARY GOVERNMENT AND BUSINESS RELATIONS

INSTITUTE OF AERONAUTICAL ENGINEERING Dundigal, Hyderabad

Academic Course Description

Instructor: Eric Rettke Phone: (every few days)

Department of Computer & Information Sciences. CSCI-342: Introduction to Information Security Syllabus

Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP,

CS 134: Elements of Cryptography and Computer + Network Security Winter sconce.ics.uci.edu/134-w16/ CS 134 Background

New Undergraduate Course Proposal Form

Network Security and Cryptography. December Sample Exam Marking Scheme

MORGANSTATEUNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING. EEGR410 Introduction to Networks. Credits: 3 COURSE SYLLABUS

Part A: Course Outline

Course and Contact Information. Course Description. Course Objectives

Computer Networks IT321

Philadelphia University Faculty of Information Technology Department of Computer Science --- Semester, 2007/2008. Course Syllabus

Introduction to information Security

ISATI 231: Windows Client (4 credits) Spring 2018 Mon, Tue, Wed, Thu, 13:10-14:40, MTB 105

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads

Oklahoma State University Oklahoma City ITD 1113: Windows Expert User Syllabus Fall, 2014

ITSY 1342 Information Technology Security Spring 2017

Philadelphia University FACULTY OF ADMINISTRATIVE & FINANCIAL SCIENCES Department of Accounting 0000 Semester

CPSC 5157G Computer Networks

A & B Section. Day. A Mrs. Krishnaveni S 1204 UB

CSCO 120 CCNA Internetworking Fundamentals Spring 2018

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

Course and Contact Information. Course Description. Course Objectives

AIT 682: Network and Systems Security

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline Introduction to Networks [CISCO 1] ISS 111

KALASALINGAM UNIVERSITY

SUMMARY OF INFORMATION ON EACH COURSE

Introduction To Data Processing COMP 153 Business Administration Program/Administrative Studies. Course Outline

Introduction to Network Security Missouri S&T University CPE 5420 Exam 2 Logistics

COURSE NUMBER: ISS 214 COURSE NAME: Connecting Networks - Cisco 4 SEMESTER CREDIT HOURS: 4.

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

ASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Technology. on Technology. IT PH.D. Program.

Course Syllabus: CompTIA A+ Hardware

Transcription:

The University of Jordan Accreditation & Quality Assurance Center COURSE Syllabus

1 Course title Computer Security 2 Course number 1901463 Credit hours (theory, practical) 3 3 Contact hours (theory, practical) 3 4 Prerequisites/corequisites Computer Networks (1901361) 5 Program title Computer Science 6 Program code 1901 7 Awarding institution The University of Jordan 8 Faculty King Abdullah II School for Information Technology 9 Department Computer Science Department 10 Level of course Third year 11 Year of study and semester (s) 1 Semester 12 Final Qualification Bachelor 13 Other department (s) involved in teaching the course 14 Language of Instruction English 15 Date of production/revision February 2015 16 Required/ Elective Elective 16. Course Coordinator: Office numbers: 114 Office hours, Sunday, Tuesday and Thursday from: 12:00-14:00 Phone numbers: 22575 email addresses: a.omari@ju.edu.jo Computer Information Systems and Business Information Technology 17. Other instructors: You may contact me at any time using social media, like Facebook and email contacts The course have some shareware programs, it is the student responsibility to use the tools according to the package instructions and limitations Every student is expected to completely adhere to the assignments and project strict deadlines, absolutely no exceptions will be given. No makeup exams will be given. University Regulations should be respected 18. Course Description: As stated in the approved study plan. This course explains Security protocols, authentication protocols, data integrity, digital signatures, intrusion detection, key management and distribution, viruses and other malicious codes, information flow, mobile code and agent security. Cryptographic algorithms: Secret Key Encryption (DES), Public Key Encryption (RSA), Message Digest Algorithm (MD5); Attacks and countermeasures: Packet sniffing, Spoofing and denial of service; Application layer security: HTTPS, secure email; Transport layer security: TLS, SSL; Network layer security: IP security 1

(IPSec), AH protocol, ESP protocol; access control and Firewalls: Filter-based firewalls, Proxybased firewalls; wireless networks security, security in IEEE 802.11, WEP protocol, EAP protocol. 19. Course aims and outcomes: A- Aims: Enable students to understand the computer methods of security and cryptography. Students learn introduction to computer security, aspects of security, threats and method of data protections, encryption and decryption methods, authentication systems, data integrity and digital signature. B- Intended Learning Outcomes (ILOs): Upon successful completion of this course students will be able to A- Knowledge and Understanding: Students should A1) Learn the basic concepts involved with computer security. A2) Understand the importance of having a secure network. A3) Understand the features of cryptographic systems. B- Intellectual skills: with the ability to B1) Analyze and compare the advantages/disadvantages of different security mechanisms and iden the set of security services they can provide. B2) Classify different types of security attacks B3) Design a new simple security protocol. B4) Identify the security protocols applied in different network layers. C- Subject specific skills with ability to C1) Work in different case studies to show how the objectives of different security requirements can achieved. C2) Implement practical security protocols using suitable programming languages. D- Transferable skills with ability to D1) Discuss and work in a group in order to design and write the specification of a new security prot D2) Work in groups in order to implement security programs that adhere to the specification of the n designed security protocol. D3) Work with other groups to make different implementations for the same security protocol specification and communicate successfully. D4) Present the final work (project) and make a demo. 20. Topic Outline and Schedule: Topic Week Instructor Achieved ILOs Evaluation Methods Reference Security 1 Dr Ahmad Al A,B and C Quizzes Text book Architecture Symmetric ciphers 2, 3,4 and 5 Dr Ahmad Al B and C Quizzes, Internet Public Key Cryptograph y and Hash Functions Network Security Applications 2 6,7 and 8 Dr Ahmad Al 9, 10 and 11 Dr Ahmad Al A, B and D Midterm Exam Quizzes and Homework B, C and D Quizzes and Homework Securing 12 and 13 Dr Ahmad Al B, C and D Quizzes,

Wireless LANs Operational Security 14 and 15 Dr Ahmad Al A, B, C and D Quizzes, 21. Teaching Methods and Assignments: Development of ILOs is promoted through the following teaching and learning methods: Class hands on practice Referring to the recent security tools and techniques Practical examples Security forums and news groups 22. Evaluation Methods and Course Requirements: Opportunities to demonstrate achievement of the ILOs are provided through the following assessment methods and requirements: Quizzes + Assignments + Class discussions + Class behavior & Attendance + project 20% Mid Exam: 30% Final Exam: 50% 23. Course Policies: A- Attendance policies: Is a must B- Absences from exams and handing in assignments on time: Exam absence and delayed assignments will not be accepted unless a valid reason is raised C- Health and safety procedures: Each student is fully responsible for his/her device protection D- Honesty policy regarding cheating, plagiarism, misbehavior: Pilgrims, copy rights, intellectual property, piracy are not allowed, the student who shows rules violations will fail in the course E- Grading policy: Every exam item has it is own mark, The final mark will be calculated as the average of students according to the normal distribution F- Available university services that support achievement in the course: http://elearning.ju.edu.jo/ User Name and Password are similar to the student's Internet account at the university 3

24. Required equipment: NA 25. References: A- Required book (s), assigned reading and audio-visuals: Cryptography and Network Security Principles and Practices, William Stallings, Pearson: Prentice Hall, Sixth Edition, 2013 B- Recommended books, materials, and media: Network Security Essentials Applications and Standards, William Stallings, Pearson Prentice Hall, Fourth Edition, 2010. Cryptography and Network Security, Behrouz A Forouzan, McGraw-Hill Science, F Edtion, 2007. Applied Cryptography: Protocols, Algorithms, and Source Code in C, Bruce Schneie Second Edition 1996. Practical Cryptography, Niels Ferguson and Bruce Schneier, Wiley, 2003. IEEE Security and Privacy magazine. ITU-T Recommendations X.800, X.805 and X.509. 26. Additional information: YouTube channels of the instructor is additional resources Name of Course Coordinator: -------------------Signature: ------------------------- Date: ------------------------- Head of curriculum committee/department: ------------------------- Signature: --------------------------------- Head of Department: ------------------------- Signature: --------------------------------- Head of curriculum committee/faculty: ------------------------- Signature: --------------------------------- Dean: ------------------------------------------- -Signature: --------------------------------- Copy to: Head of Department Assistant Dean for Quality Assurance Course File 4