COMP 5370, Computer and Network Security Credit hours: 3 lecture ... [PDF]

Instructor or Course Coordinator: Dr. Tony Skjellum. Required Textbook. Matt Bishop, Computer Security: Art and Science,

23 downloads 23 Views 80KB Size

Recommend Stories


Computer security Lecture 07
Keep your face always toward the sunshine - and shadows will fall behind you. Walt Whitman

Spring 2009 Lecture Hours: 3 Lab Hours
Don't ruin a good today by thinking about a bad yesterday. Let it go. Anonymous

computer network security
If you want to go quickly, go alone. If you want to go far, go together. African proverb

3 hours lecture + 3 hours lab per wee
Life isn't about getting and having, it's about giving and being. Kevin Kruse

LABORATORY COURSES—all 1 credit hour* LECTURE COURSES—all 3 credit hours
When you talk, you are only repeating what you already know. But if you listen, you may learn something

[PDF] Cryptography and Network Security
Never let your sense of morals prevent you from doing what is right. Isaac Asimov

Guide to Computer Network Security (Computer Communications and Networks)
Ask yourself: When I'm in physical or emotional pain, what are some of the best things I can do for

[PDF] Cryptography and Network Security
Be grateful for whoever comes, because each has been sent as a guide from beyond. Rumi

PDF Cryptography and Network Security
Just as there is no loss of basic energy in the universe, so no thought or action is without its effects,

Computer Science (COMP-SCI)
The greatest of richness is the richness of the soul. Prophet Muhammad (Peace be upon him)

Idea Transcript


COMP 5370, Computer and Network Security Credit hours: 3 lecture Contact hours: 3 lecture Catalog Description: Fundamentals of computer security. Access Control. Authentication. Digital signatures and watermarks. Modeling and performance assessment. Viruses and worms. Identification of avenues for compromising systems. Prerequisites: COMP 3270 Corequisites: None Selected Elective Course (CSCI, SWEN, WIRS) Instructor or Course Coordinator: Dr. Tony Skjellum Required Textbook Matt Bishop, Computer Security: Art and Science, 2003 Course Outcomes The student will be able to •   recognize potential risks and threats to computer operations and communications. •   understand Federal rules and regulations affecting computer security, including legal ramifications, FOIA, and policies. •   understand security issues unique to wireless communications. •   have a working knowledge of relevant cryptographic techniques. •   have a critical understanding of computer security with an emphasis on “end-to-end” vulnerabilities. Topics Covered •   Introduction (2 hours) •   Internet Standards & RFCs (3 hours) •   Conventional Encryption (3 hours) •   Public Key Cryptography (3 hours) •   OS Security Vulnerabilities (3 hours) •   Network Security Administration (3 hours) •   Malicious Software (4 hours) •   Network Authentication (4 hours) •   Email Security (3 hours) •   Software Vulnerability (4 hours) •   Web Security (4 hours) •   Java Security (3 hours) •   IPSEC (1 hour) •   IPSEC/VPNs (1 hour) •   Firewalls (2 hours)

•   Designated Approving Authority and Information Systems Security Officer (1 hour) •   Exams (1 hour) Course Requirements •   Homework assignments (40%) •   Exams (60%) Syllabus prepared: Spring 2016

Smile Life

When life gives you a hundred reasons to cry, show life that you have a thousand reasons to smile

Get in touch

© Copyright 2015 - 2024 PDFFOX.COM - All rights reserved.