Effective August 17, 2014 to present
- Describe the high-level functions of, and interactions between, the protocol layers of network protocol stacks.
- Explain the purpose and workings of the link, network, and transport layers in network protocol stacks, including the IP, TCP, and UDP protocols.
- Evaluate the reliability and performance implications of different link, network, and transport layer protocols and solve quantitative problems involving these protocols.
- Compare and contrast the protocols used in wireless and mobile networking with those used in traditional fixed-infrastructure networking.
- Describe the goals of computer security to preserve confidentiality, integrity, and availability (CIA) of computer systems, and understand the threats to these goals.
- Evaluate the role of cryptography in meeting threats to the CIA goals.
- Evaluate the roles of operating system and network security measures in meeting threat to the CIA goals.
- Introduce secure programming techniques to implement security measures.
|01||Networks and Security||El-Shekeil, Ibrahim Ali Rabieh, Khaled||Books||Course details|
|01||Networks and Security||Tandon, Rohit||Books||Course details|
|01||Networks and Security||Staff, Staff||Books||Course details|
|50||Networks and Security||El-Shekeil, Ibrahim Ali||Books||Course details|