Computer Security Course Syllabus 1 Computer Security Lecturer : H.Ben Othmen.

Slides:



Advertisements
Similar presentations
1 MSc EEM118 Research Dissertation CITE, UEL Cryptography and Network Security Dr David Xiao
Advertisements

Computer Science Department
CSTA K-12 Computer Science Standards (rev 2011)
Assessment Report Computer Science School of Science and Mathematics Kad Lakshmanan Chair Sandeep R. Mitra Assessment Coordinator.
Assessment of Undergraduate Programs Neeraj Mittal Department of Computer Science The University of Texas at Dallas.
KAU Engineering College Engineering Management IE 257 INTRODUCTION Dr. Mohammed Balubaid.
Computer Science Department Program Improvement Plan December 3, 2004.
Computer Engineering Department
ITBP103: Principles of Information Technology W0-01: Introduction to IT.
ABET The Complete Report on Your Course. ABET OUTCOME CHECKLIST.
CSC 111 Course orientation
“Network Security” Introduction. My Introduction Obaid Ullah Owais Khan Obaid Ullah Owais Khan B.E (I.T) – Hamdard University(2003), Karachi B.E (I.T)
Mohammad Alshayeb 19 May Agenda Update on Computer Science Program Assessment/Accreditation Work Update on Software Engineering Program Assessment/Accreditation.
1 CSE 651: Introduction to Network Security Steve Lai Spring 2010.
ABET Accreditation Board for Engineering and Technology
Capstone Design Project (CDP) Civil Engineering Department First Semester 1431/1432 H 10/14/20091 King Saud University, Civil Engineering Department.
Assessment College of Engineering A Key for Accreditation February 11, 2009.
Computer Network Fundamentals CNT4007C
ABET’s coming to Rose! Your involvement Monday, Nov 5, 2012.
Overview of the Department’s ABET Criterion 3 Assessment Process.
Computer Networks CEN 5501C Spring, 2008 Ye Xia (Pronounced as “Yeh Siah”)
Introduction to Information Security J. H. Wang Sep. 15, 2014.
CSE ACCREDITATION REVIEW BY CAC & EAC UC Irvine October 2, 2013.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Industrial Engineering
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
MANUFACTURING PROCESSES I IE 351 Lecture 1 Introduction to: »Class Operation, »Course Coverage, »Skill Expectations.
Criteria for Accrediting Engineering Programs Effective for Evaluations during the Accreditation Cycle.
The Balance Between Theoretical and Practical Work Within Electrical and Computer Engineering Courses Dr. Bahawodin Baha March Development Partnerships.
Introduction to Information Security J. H. Wang Sep. 10, 2013.
Supporting ABET Assessment and Continuous Improvement for Engineering Programs William E. Kelly Professor of Civil Engineering The Catholic University.
Design of a Typical Course s c h o o l s o f e n g I n e e r I n g S. D. Rajan Professor of Civil Engineering Professor of Aerospace and Mechanical Engineering.
CSC 111 COURSE ORIENTATION. Course name and Credit houres  CSC 111 – Computer Programming-I  Credit hours:  3 hours lecture  1 hour tutorial  2 hours.
Introduction & Overview Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific Institute of Information.
CEN ABET Mini- Retreat March 4, CEN ABET Mini-Retreat Agenda: –State of the Assessments –Discussion on loop closings. –CSE Program Objectives/Outcomes.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
HU113_Assignment31 HU113: Technical Report Writing Prof. Abdelsamie Moet Teaching Assistant: Mrs. Rana El-Gohary Fall 2012/13 Pharos University in Alexandria.
CEN Faculty MeetingMarch 31, ABET Accreditation Brief history. –1980’s: faculty qualifications sufficed. –1990s: quality of courses, materials, and.
Course File seminar NCAAA SSR Preparation (3rd dec 2015)
CISE IAB MeetingOctober 15, ABET Accreditation Brief history. –1980’s: faculty qualifications sufficed. –1990s: quality of courses, materials, and.
First week. Catalog Description This course explores basic cultural, social, legal, and ethical issues inherent in the discipline of computing. Students.
Preparing for ABET visit Prof. Dr. Lerzan Özkale Management Engineering Head of Department November 2010.
Computer Networks CNT5106C
ENGINEERING ANALYSIS. WHAT IS ENGINEERING ANALYSIS? ABET Required Program Outcomes: (a) an ability to apply knowledge of mathematics, science, and engineering.
1 Assessment of Undergraduate Programs Neeraj Mittal Department of Computer Science The University of Texas at Dallas (UTD) January 22, 2016.
COURSE OUTLINE AZHAR HAMID IAS2143 DATABASE SYSTEM UniselFaculty of Computer Science and Information Technology.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
1.  This course covers the mathematical foundations of computer science and engineering. It provides an introduction to elementary concepts in mathematics.
EXPERT SYSTEM WEEK 1. C ATALOG D ESCRIPTION Knowledge Acquisition techniques, Knowledge representation, Analysis and Design of an ES, Reasoning strategies,
University of Utah Program Goals and Objectives Program Goals and Objectives Constituents U of U, COE, ASCE, IAB Constituents U of U, COE, ASCE, IAB Strategic.
Advanced Database Course Syllabus 1 Advanced Database System Lecturer : H.Ben Othmen.
Engineering programs must demonstrate that their graduates have the following: Accreditation Board for Engineering and Technology (ABET) ETP 2005.
Elec/Comp 526 Spring 2015 High Performance Computer Architecture Instructor Peter Varman DH 2022 (Duncan Hall) rice.edux3990 Office Hours Tue/Thu.
CEN 621 Cryptography and Network Security Spring Term CEN 621 Cryptography and Network Security Spring Term INTERNATIONAL BURCH UNIVERSITY.
GCSE Computer Science Content Overview
Using core competencies in curriculum design
OUTCOME BASED EDUCATION
Software Engineering (1)
Introduction to Information Security
Introduction to Information Security
College of Computer Science OBE Implementation on Curriculum Revisions
A Level Computing AQA (7517)
CSC 111 Course orientation
Neeraj Mittal September 29, 2017
Department of Computer Science The University of Texas at Dallas
Information Technology (IT)
Introduction to the course
Development of ABET Syllabus
Five-Year Undergraduate Enrollments
Overview of BSSE at Rose-Hulman Institute of Technology
Presentation transcript:

Computer Security Course Syllabus 1 Computer Security Lecturer : H.Ben Othmen

Major Topics  Major Topics Covered in the Course (14 week) 2 Computer Security TopicWeek Overview of computer security services1 Passive and active attacks2 Cryptographic public and symmetric keys: DES, AES, RSA3-7 El-Gamal cryptosystem8 Digital signatures and message authentication protocols9-10 Transport layer security, SSL protocol, MAC scheme11-12 Wireless security protocols, WPA, WEP13 Viruses, and Internet attacks14

Major Topics  Weekly Hours  3 x 50 mins lectures  Textbook/References  Network Security Essentials, Fourth Edition, William Stallings, 2011 Additional materials will be distributed during the course.  Assessment Methods  Project (home work): 20  Mid term exam: 20  Quiz:  Final exam: 40 3 Computer Security

CLOs  Course Learning Outcomes (CLOs)  Appreciate the need for computer security and computer protection, including the tradeoffs between different security and protection methods  Able to apply concepts of public keys, private keys, cryptosystem, authentication, digital signatures to secure simple systems.  Implement some network security protocols such as SSL, MAC, and wireless security, WEP, WAP, and computer viruses, and Internet attacks, and utilize them in real applications to secure Internet traffic. 4 Computer Security

Relationship between CLOs and Student Outcomes 5 Computer Security Student Outcomes – Mapped to CLOs CLOs(a)(b)(c)(d)(e)(f)(g)(h)(i)(j)(k) CLO 1 CLO 2 CLO 3

Relationship of Course to ABET Student Outcomes a. an ability to apply knowledge of mathematics, computing, science, and engineering appropriate to the discipline Students apply knowledge of computer security, design to a project, and use this topic for other subjects. Students will realize the importance of security and protection for data and information. b. an ability to analyze a problem, and identify and define the computing requirements appropriate to its solution --- c. an ability to design, implement and evaluate a computer-based system, process, component or program to meet desired --- d. an ability to function effectively on teams to accomplish a common goal e. an understanding of professional, ethical, legal and social issues and responsibilities f. an ability to communicate effectively Computer Security

Relationship between CLOs and Student Outcomes g. an ability to analyze the local and global impact of computing on individuals, organizations and society, including ethical, legal, security and global policy issues Students will be able to analyze the impact of security on organizations and individuals h. a recognition of the need for, and an ability to engage continuing professional development --- i.an ability to use the current techniques, skills, and tools necessary for computing practice. Reports and projects use current computing and modeling/design tools. 7 Computer Security

Relationship between CLOs and Student Outcomes j.an ability to apply mathematical foundations, algorithmic principles, and computer science theory in the modeling and design of computer based systems in a way that demonstrates comprehension of the tradeoffs involved in design choices. k.an ability to apply design and development principles in the construction of software systems of varying complexity 8 Computer Security

 Course Instructor : L.Hafiza Ben Othmen 9 Computer Security