Course Objective
To develop an understanding of information assurance as practiced in computer operating systems, distributed systems,
networks and representative applications. Develop a basic understanding of cryptography, how it has evolved, and some
key encryption techniques used today. Develop an understanding of security policies (such as authentication, integrity
and confidentiality), as well as protocols to implement such policies in the form of message exchanges.
Course Outcome
After completion of this course, the student shall be able to:
1. Describe computer and network security fundamental concepts and principles.
2. Describe the inner-workings of popular encryption algorithms, digital signatures, certificates and anti-cracking
techniques.
3. Demonstrate the ability to select among available network security technology and protocols such as IDS, IPS,
firewalls, VPNs etc.
4. Describe Operating system security models E.g. UNIX, LINUX WINDOWS security and methods for web
application and database security.
5. Identify ethical, professional responsibilities, risks and liabilities in computer and network environment, and
best practices to write a security policy.