EPOKA UNIVERSITY
FACULTY OF ARCHITECTURE AND ENGINEERING
DEPARTMENT OF COMPUTER ENGINEERING
COURSE SYLLABUS
2021-2022 ACADEMIC YEAR
COURSE INFORMATIONCourse Title: NETWORK SECURITY |
Code | Course Type | Regular Semester | Theory | Practice | Lab | Credits | ECTS |
---|---|---|---|---|---|---|---|
CEN 462 | B | 1 | 3 | 2 | 0 | 4 | 7.5 |
Academic staff member responsible for the design of the course syllabus (name, surname, academic title/scientific degree, email address and signature) | NA |
Main Course Lecturer (name, surname, academic title/scientific degree, email address and signature) and Office Hours: | Dr. M. Maaruf Ali mali@epoka.edu.al , 17.00-18.00, Tuesday, Wednesday |
Second Course Lecturer(s) (name, surname, academic title/scientific degree, email address and signature) and Office Hours: | NA |
Teaching Assistant(s) and Office Hours: | NA |
Language: | English |
Compulsory/Elective: | Elective |
Study program: (the study for which this course is offered) | Master of Science in Computer Engineering (2 years) |
Classroom and Meeting Time: | A/005, 18.00-20.45, Tuesday |
Code of Ethics: |
Code of Ethics of EPOKA University Regulation of EPOKA University "On Student Discipline" |
Attendance Requirement: | |
Course Description: | Techniques for achieving security in multi-user computer systems and distributed computer systems: Basics of cryptography, network security applications and system security, conventional encryption and message confidentiality, public-key cryptography and message authentication, authentication applications. Electronic mail, IP, web. |
Course Objectives: | To present a survey on network security technology. It covers important network security tools and applications, including the major cryptographic algorithms and techniques, security protocols, digital signatures, message and user authentication techniques, cloud security, network access control, personal identity verification (PIV), mobile device security, S/MIME, IP Security, Kerberos, SSL/TLS, and X509v3. In addition, methods for countering hackers and viruses will be explored. Finally, fundamental security design principles, attack surfaces and attack trees, practical application of RSA, user authentication models and comprehensive email security will be discussed. |
BASIC CONCEPTS OF THE COURSE
|
1 | The OSI Security Architecture is the basis of this introductory on Network Security Essentials. |
2 | Stream Ciphers will be used to explain the concept of both symmetric and asymmetric encryption. |
3 | Establishing the identity of the sender will be explored by studying authentication algorithms. |
4 | Ensuring confidentiality is essential and the concepts to ensure this will be explained covering secure key distribution. |
5 | The use of Cloud Computing is ubiquitious and pervasive. Concepts dealing with securing network access and the cloud will be covered. |
6 | Web Security is paramount and the issues and solutions to address this will be covered. |
7 | Securing the air interface will be explored at a system level using WiFi access to explain wireless network security. |
8 | The various strategies used in electronic mail security will be explored covering PGP and DNSSEC. |
9 | Security at the various layers such as the IP and Network layer will be studied covering the basic concepts. |
10 | Finally legal and ethical issues will be explored. |
COURSE OUTLINE
|
Week | Topics |
1 | Introduction to Network Security |
2 | Symmetric Encryption and Message Confidentiality |
3 | Public Key Cryptography and Message Authentication |
4 | Key Distribution and User Authentication |
5 | Network Access Control and Cloud Security |
6 | Transport-Level Security |
7 | Wireless Network Security |
8 | Electronic Mail Security |
9 | IP Security |
10 | Malicious Software |
11 | Intruders |
12 | Firewalls |
13 | Network Management Security |
14 | Legal and Ethical Issues |
Prerequisite(s): | Programming in high level languages, basic mathematics |
Textbook(s): | William Stallings, Network Security Essentials: Applications and Standards, 6th Edition. 2016, Pearson. ISBN-13: 978-0134527338. |
Additional Literature: | William Stallings, Cryptography and Network Security: Principles and Practice 8th Edition, 2020, Pearson. ISBN-13: 978-0135764213. |
Laboratory Work: | |
Computer Usage: | |
Others: | No |
COURSE LEARNING OUTCOMES
|
1 | To learn the main concepts of network security. |
2 | To know the principles of symmetric cryptographic algorithms. |
3 | To learn and understand how public key (asymmetric) cryptographic algorithms function. |
4 | To understand message authentication, user authentication and key distribution. |
5 | To understand the importance of network access control and cloud security. |
6 | To know how security is implemented at the Transport Layer. |
7 | To comprehend the specific requirements of implementing and ensuring wireless network security. |
8 | To know the processes needed to secure electronic mail. |
9 | To know the mechanisms used for implementing IP Security. |
10 | To learn, recognise and employ the tools needed to proctect against malicious software and intruders using e.g. firewalls. |
COURSE CONTRIBUTION TO... PROGRAM COMPETENCIES
(Blank : no contribution, 1: least contribution ... 5: highest contribution) |
No | Program Competencies | Cont. |
Master of Science in Computer Engineering (2 years) Program | ||
1 | Engineering graduates with sufficient theoretical and practical background for a successful profession and with application skills of fundamental scientific knowledge in the engineering practice. | 5 |
2 | Engineering graduates with skills and professional background in describing, formulating, modeling and analyzing the engineering problem, with a consideration for appropriate analytical solutions in all necessary situations | 5 |
3 | Engineering graduates with the necessary technical, academic and practical knowledge and application confidence in the design and assessment of machines or mechanical systems or industrial processes with considerations of productivity, feasibility and environmental and social aspects. | 5 |
4 | Engineering graduates with the practice of selecting and using appropriate technical and engineering tools in engineering problems, and ability of effective usage of information science technologies. | 5 |
5 | Ability of designing and conducting experiments, conduction data acquisition and analysis and making conclusions. | 5 |
6 | Ability of identifying the potential resources for information or knowledge regarding a given engineering issue. | 5 |
7 | The abilities and performance to participate multi-disciplinary groups together with the effective oral and official communication skills and personal confidence. | 5 |
8 | Ability for effective oral and official communication skills in foreign language. | 5 |
9 | Engineering graduates with motivation to life-long learning and having known significance of continuous education beyond undergraduate studies for science and technology. | 5 |
10 | Engineering graduates with well-structured responsibilities in profession and ethics. | 5 |
11 | Engineering graduates who are aware of the importance of safety and healthiness in the project management, workshop environment as well as related legal issues. | 5 |
12 | Consciousness for the results and effects of engineering solutions on the society and universe, awareness for the developmental considerations with contemporary problems of humanity. | 5 |
COURSE EVALUATION METHOD
|
Method | Quantity | Percentage |
Midterm Exam(s) |
1
|
30
|
Project |
1
|
30
|
Final Exam |
1
|
40
|
Attendance |
0
|
|
Total Percent: | 100% |
ECTS (ALLOCATED BASED ON STUDENT WORKLOAD)
|
Activities | Quantity | Duration(Hours) | Total Workload(Hours) |
Course Duration (Including the exam week: 16x Total course hours) | 16 | 3 | 48 |
Hours for off-the-classroom study (Pre-study, practice) | 16 | 3 | 48 |
Mid-terms | 1 | 3 | 3 |
Assignments | 5 | 17.1 | 85.5 |
Final examination | 1 | 3 | 3 |
Other | 0 | ||
Total Work Load:
|
187.5 | ||
Total Work Load/25(h):
|
7.5 | ||
ECTS Credit of the Course:
|
7.5 |
CONCLUDING REMARKS BY THE COURSE LECTURER
|
This course provides a comprehensive overview of the main concepts to appreciate the requirements of ensuring network security. |