Course Objective

To develop an understanding of information assurance as practiced in computer operating systems, distributed systems,

networks and representative applications. Develop a basic understanding of cryptography, how it has evolved, and some

key encryption techniques used today. Develop an understanding of security policies (such as authentication, integrity

and confidentiality), as well as protocols to implement such policies in the form of message exchanges.

Course Outcome

After completion of this course, the student shall be able to:

1. Describe computer and network security fundamental concepts and principles.

2. Describe the inner-workings of popular encryption algorithms, digital signatures, certificates and anti-cracking

techniques.

3. Demonstrate the ability to select among available network security technology and protocols such as IDS, IPS,

firewalls, VPNs etc.

4. Describe Operating system security models E.g. UNIX, LINUX WINDOWS security and methods for web

application and database security.

5. Identify ethical, professional responsibilities, risks and liabilities in computer and network environment, and

best practices to write a security policy.