EPOKA UNIVERSITY
FACULTY OF ARCHITECTURE AND ENGINEERING
DEPARTMENT OF COMPUTER ENGINEERING
COURSE SYLLABUS
COURSE INFORMATIONCourse Title: INFORMATION SECURITY AND COMPUTER FORENSICS |
Code | Course Type | Regular Semester | Theory | Practice | Lab | Credits | ECTS |
---|---|---|---|---|---|---|---|
CEN 531 | B | 99 | 3 | 2 | 0 | 4 | 7.5 |
Language: | English |
Compulsory/Elective: | Elective |
Classroom and Meeting Time: | |
Course Description: | This is a graduate level course in Information Security and Computer Forensics. The course covers the theoretical, conceptual, methodological, and practical foundations of information security and assurance, with emphases on fundamentals of information security such as: access control, security architecture and design, physical security, application security, Operations security, Penetration testing, Security and Risk Management, and digital forensics, etc. |
Course Objectives: | This is a graduate level course in Information Security and Computer Forensics. The course covers the theoretical, conceptual, methodological, and practical foundations of information security and assurance, with emphases on fundamentals of information security such as: access control, security architecture and design, physical security, application security, Operations security, Penetration testing, Security and Risk Management, and digital forensics, etc. |
COURSE OUTLINE
|
Week | Topics |
1 | Overview of Information Security and Risk management |
2 | Security management |
3 | Penetration Testing |
4 | Security Policy |
5 | Foot Printing and Scanning |
6 | Security Architecture design |
7 | Overview of Social Engineering |
8 | Midterm |
9 | Overview of Digital Forensics |
10 | Computer Forensics |
11 | Network Forensics |
12 | Mobile Forensics |
13 | Packet Sniffer and Analyzer |
14 | Introduction to Packet Analysis (HTTP, Email, IM, FTP) |
Prerequisite(s): | |
Textbook: | “Information Security handbooks: A guide for Managers” Bowen,P.Hash, J. and Wilson. (BHW) (Oct-2006) |
Other References: | |
Laboratory Work: | Yes |
Computer Usage: | Yes |
Others: | No |
COURSE LEARNING OUTCOMES
|
1 | To understand the basics of Information Security |
2 | To know the legal, ethical and professional issues in Information Security |
3 | To know the aspects of risk management and to become aware of various standards in this area |
4 | To know the technological aspects of Information Security |
5 | Apply the criminal and civil law to computer criminality |
6 | Understand how viruses, logic bombs and hacking are used by criminals |
COURSE CONTRIBUTION TO... PROGRAM COMPETENCIES
(Blank : no contribution, 1: least contribution ... 5: highest contribution) |
No | Program Competencies | Cont. |
Professional Master in Computer Engineering Program |
COURSE EVALUATION METHOD
|
Method | Quantity | Percentage |
Midterm Exam(s) |
1
|
40
|
Quiz |
2
|
10
|
Final Exam |
1
|
40
|
Total Percent: | 100% |
ECTS (ALLOCATED BASED ON STUDENT WORKLOAD)
|
Activities | Quantity | Duration(Hours) | Total Workload(Hours) |
Course Duration (Including the exam week: 16x Total course hours) | 16 | 5 | 80 |
Hours for off-the-classroom study (Pre-study, practice) | 16 | 5 | 80 |
Mid-terms | 1 | 12 | 12 |
Assignments | 0 | ||
Final examination | 1 | 15.5 | 15.5 |
Other | 0 | ||
Total Work Load:
|
187.5 | ||
Total Work Load/25(h):
|
7.5 | ||
ECTS Credit of the Course:
|
7.5 |