Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 Computer Engineering Department Islamic University of Gaza ECOM 5347 Network Security Undergraduate Course Fall 2013 Prof. Mohammad A. Mikki Room I215.

Similar presentations


Presentation on theme: "1 Computer Engineering Department Islamic University of Gaza ECOM 5347 Network Security Undergraduate Course Fall 2013 Prof. Mohammad A. Mikki Room I215."— Presentation transcript:

1 1 Computer Engineering Department Islamic University of Gaza ECOM 5347 Network Security Undergraduate Course Fall 2013 Prof. Mohammad A. Mikki Room I215 Tel. Ext. 2876 email: mmikki@iugaza.edu.ps Skype id: mohammad.mikki Homepage: http://site.iugaza.edu.ps/mmikki/

2 Lecture 1 Syllabus

3 3 Mohammad A. Mikki Professor of Computer Engineering ECE Department, Faculty of Engineering Instructor

4 Where to find me 4  My Office:IT bldg: Room I215  Office Hours: TBA and by appointment  My Email: mmikki@iugaza.edu.ps  My homepage:http://site.iugaza.edu.ps/mmikki/  Skype id: mohammad.mikki  Tel.: +970-8-2860700 Ext. 2876  Fax: +970-8-2860800

5 TA Eng. Jihad El-Dahdouh 5

6 Course Information  Course Code: ECOM 5347  Course Name: Network Security (Undergraduate Course)  Number of credits: 3 6

7 Course Description  Principles of practical computer security to enable students to defend themselves against malicious threats. Firewalls, anti- virus, secure setup of a wireless access point. Cryptography basics and its application. Embedded devices and related security issues. Network technologies and their vulnerabilities. 7

8 Course Objectives All students, and most of the general population, use computers and computer-based systems everyday, and entrust those systems with life- critical and cost-critical functions. In spite of the high level of trust placed in computer-based systems, even advanced computer users have little awareness of their exposure to security threats. The general lack of understanding of basic computer security concepts leads to increased risk and costs involved in using computers. This course will introduce computer security basics in a practical way and give students the understanding that they need to protect themselves, and their data, from malicious attack. Students will learn about the mechanisms behind most computer attacks and they will learn about standard defense tools including firewalls and anti-virus programs. The course will provide a practical introduction to a broad range of computer security topics. 8

9 Course Outcomes At completion of the course students should be able to:  Explain common security threats, including malware.  Analyze security vulnerabilities in computer systems.  Apply authentication and cryptography to secure computer systems.  Use open source tools to improve system security.  Understand the fundamentals of network security.  Describe the processes of auditing and incident response.  Understand ethical and legal considerations encountered when working in information security. 9

10 Course Website http://moodle.iugaza.edu.ps  please check this webpage at least once a week for lecture notes, homework assignments, solutions, useful links, supplementary material, announcements 10

11 Class Information  Class location, days and time Sec. 101: SMW 8:00 am – 9:00 am K513 Sec. 201: SMW 9:00 am – 10:00 am L508 11

12 Required Textbook and Material Michael T. Goodrich and Roberto Tamassia, Introduction to Computer Security, Addison- Wesley, 1 edition (October 25, 2010) ISBN-10: 0321512944 ISBN-13: 978-0321512949 12

13 Required Textbook (TOC) Table of Content 13

14 Lecture Etiquette Be on time (if you are late enter the class quiet) Cell phones off or muted Interrupt for questions – there is no dumb question 14

15 Key to Success  Attendance –Pay attention to lectures –Ask questions  Effort –Read extra material on your own. Wealth of information available (library books, online articles, research papers)  Consistency –Keep up with the class pace 15

16 Class Expectations  Class participation – Your input is needed for good discussion  Keep up with reading material  Follow academic integrity code 16

17 Working Schedule 17 WeekSlidesWork Due 1 Sat. 07.Sep.2013 Ch.1 : Introduction  Ch01-Introduction.pptx 2 Sat. 14.Sep.2013 Ch.3: Operating Systems Security  Ch03-OS.pptx  Ch03-FilesystemSecurity-slides 1-14.pptx (pages 114-129)  Ch03-FilesystemSecurity-slides15-28.pptx (Section 3.2-3.3)  Quiz1 on Ch.1 3 Sat. 21.Sep.2013  Ch03-OSSec.pptx (Section 3.2-3.3)  ApplicationSecurity.pptx (Section 3.4)  Ch03-BufferOverflow.pptx (Section 3.4)  Lab1 4 Sat. 28.Sep.2013 Ch.4: Malware  Ch04-Malware-slides1-23.pptx (Sections 4.1- 4.3.2)  Ch04-Malware-slides 24-41.pptx  Quiz2 on Ch. 3  Lab2

18 Working Schedule 18 WeekSlidesWork Due 5 Sat. 5.Oct.2013 Ch.5: Network Security I  Ch05-NetworkModelsARP.pptx  Ch05-NetworksTCP-IP.pptx  Quiz3 on Ch.4  Lab3 6 Sat. 12.Oct.2013 Ch05-NetworksTCP-IP-part C.pptx  Lab4 7 Sat. 19.Oct.2013 Ch.6: Network Security II  Ch06-NetworksDNS  Ch06-Firewalls.pptx  Quiz4 on Ch.5  Lab5 8 Sat. 26.Oct.2013 (Beginning of midterms) Ch.7: Web Security  Ch07-Web.pptx  Ch07-Web-slides 45-72.pptx  Quiz5 on Ch.6  Lab6 9 Tuesday 2.Nov.2013 Ch07-Web-slides 73-89.pptx  Midterm Exam  Lab7

19 Working Schedule 19 WeekSlidesWork Due 10 Sat. 9.Nov.2013 Ch.8: Cryptography  Ch08-CryptoConcepts-slides 1-28.pptx  Ch08-CryptoConcepts-slides 29-50.pptx  Quiz6 on Ch.7  Lab8 11 Sat. 16.Nov.2013  Ch08-CryptoConcepts-slides 51-57.pptx  Ch08-DataIntegrity.pptx  Lab9 12 Sat. 23.Nov.2013 Ch.10: Distributed Applications Security  Ch10-Database  Ch10-DRM  Ch10-PaymentSystems  Ch10-SpamCybercrime  Quiz7 on Ch.8  Lab10 (Last Lab) 13 Sat. 30.Nov.2013  Quiz8 on Ch.10  Paper presentations 14 Sat. 7.Dec.2013  Paper presentations Sat. 28.Dec.2013 Beginning of final exams

20 Grading Scheme Quizzes10% 10 Lab experiments20% Attendance, class participation, moodle chat and forums 10% Paper presentations10% Midterm Exam20% Final exam30% 20

21 Research Report (Not required for the undergraduate students) Select a research topic in network security Select 3-5 recent papers on the topic Summarize these papers in a 10-15 page report Submit an intermediate report by 8 th week of the semester Submit a final report by 13 th week of the semester Make a 15 minutes presentation in front of the class in weeks 14 and 15 21

22 Quizzes  8 quizzes  Quizzes are given after completion of each textbook chapter. 22

23 Lab 23  There will be a total of 10 laboratory experiments that will cover the current tools used in computer and network security.  The TA will assist in conducting these exps

24 24 any questions


Download ppt "1 Computer Engineering Department Islamic University of Gaza ECOM 5347 Network Security Undergraduate Course Fall 2013 Prof. Mohammad A. Mikki Room I215."

Similar presentations


Ads by Google