Principles and practices of the OSI and TCP/IP models of computer networks, with special emphasis on the security of these networks. Coverage of general issues of computer and data security. Introduction to the various layers of network protocols, including physical, data link, network, and transport layers, flow control, error checking, and congestion control. Computer system strengths and vulnerabilities, and protection techniques: Topics include applied cryptography, security threats, security management, operating systems, network firewall and security measures. Focus on secure programming techniques. Programming projects.
Note: Students are responsible to both be aware of and abide by prerequisites for ICS courses for which they enroll, and will be administratively dropped from a course if they have not met prerequisites.First day attendance is mandatory.
4 Undergraduate credits
Effective August 17, 2014 to present
- Describe the high-level functions of, and interactions between, the protocol layers of network protocol stacks.
- Explain the purpose and workings of the link, network, and transport layers in network protocol stacks, including the IP, TCP, and UDP protocols.
- Evaluate the reliability and performance implications of different link, network, and transport layer protocols and solve quantitative problems involving these protocols.
- Compare and contrast the protocols used in wireless and mobile networking with those used in traditional fixed-infrastructure networking.
- Describe the goals of computer security to preserve confidentiality, integrity, and availability (CIA) of computer systems, and understand the threats to these goals.
- Evaluate the role of cryptography in meeting threats to the CIA goals.
- Evaluate the roles of operating system and network security measures in meeting threat to the CIA goals.
- Introduce secure programming techniques to implement security measures.
|01||Networks and Security||Rabieh, Khaled El-Shekeil, Ibrahim Ali||Books||Course details|
|01||Networks and Security||Tandon, Rohit||Books||Course details|
|01||Networks and Security||Chetty, Damodar Kumar S||Books||Course details|
|50||Networks and Security||El-Shekeil, Ibrahim Ali||Books||Course details|