INTRODUCTION TO NETWORK SECURITY l.Tahani Aljehani.

Slides:



Advertisements
Similar presentations
Computer Network Management
Advertisements

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Prepared by Dr.
Today’s Agenda  Syllabus CS2336: Computer Science II.
General information CSE 230 : Introduction to Software Engineering
Csc111 :Programming with Java First semester H.
Course Introduction Computer Science Department CS141:Computer Programming 1 Fall 2014 Dr. Hamid Al-Hamadi.
CENG 213 Data Structures Department of Computer Engineering Middle East Technical University Fall 2014 CENG 213 Data Structures 1.
CSCI 1301 Principles of Computer Science I
CS 453 Introduction to Data and computer communications Syllabus Vinod Kulathumani West Virginia University.
Lecture 1 Overview.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Is422- Course Overview Prepared by L. Nouf Almujally 1.
Network Security CS nd Term Course Syllabus Cairo University Faculty of Computers and Information.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
ITMS3101: Digital Media Introduction and Overview Eng. Mohanned M. Dawoud Software Engineering University of Palestine.
TMK 264: COMPUTER SECURITY OVERVIEW. No SUBJECT DETAIL 1.Subject NameComputer Security 2.CodeTMK StatusCore 4.Credit Hour3 5.SemesterSemester 4,
SKU3033 / SKF3033 NETWORK & SYSTEM ADMINISTRATOR.
Computer Network Management Course
Course Overview Prepared by L. Nouf Almujally 1. Course Objectives Fundamental concepts of database systems, in particular, relational database systems.
Prepared by Dr. Samia Chelloug Princess Nora Bint Abdulrahman University College of computer and information sciences Networks.
GEOGRAPHY Remote Sensing & Digital Image Processing T/Th 1:00 - 2:50 Location:
SCHILLER INTERNATIONAL UNIVERSITY
Welcome! CSI 4118: Computer Networks and Protocols (3,0,0) Professor: Dr. Robert L. Probert Office: SITE 5098 Phone: x6709
 Name: Eddren Law Yi Feng  Office: CFGS, TA   Website: metalab.uniten.edu.my/~eddren.
Bilgisayar Donanımı Introduction Nizamettin AYDIN
CSC 111 COURSE ORIENTATION. Course name and Credit houres  CSC 111 – Computer Programming-I  Credit hours:  3 hours lecture  1 hour tutorial  2 hours.
AN INTRODUCTION TO JAVA LANGUAGE CT Credit Hours : (3 Lecture, 2 Lab)
Computer Programming -1- C++ CSC 1101 Computer Programming -1- C++
Internet and Intranet Fundamentals William R. Mussatto.
Course Overview 1 FCM 710 Architecture of Secure Operating Systems Prof. Shamik Sengupta Office 4210 N
Mohammad Alauthman 1/22/20162 This 3-credit first course for computer science & IT majors, which provides students the basic understanding.
Internet Engineering Course Outline. Internet Engineering Course; Sharif University of Technology Aims and Contents To attain necessary skills for handling.
CEN 137 Computer Literature and Skills INTERNATIONAL BURCH UNIVERSITY DEPARTMENT of INFORMATION TECHNOLOGIES Dr. A. Turan Özcerit
1 NES554: Computer Networks Defense Course Overview.
DR MUZAMMIL BIN JUSOH CAMPUS PAUH PUTRA, SCHOOL OF COMPUTER & COMMUNICATION ENGINEERING, UNIVERSITI MALAYSIA PERLIS (UNIMAP)
In The Name of God. Parallel processing Course Evaluation  Final Exam is closed book( 14 Scores)  Research and Presentation, Quizzes (5 Scores)  No.
Database Advanced CS 421 TA. Amani Alghanayem For discuss and the lecture references:
MAT 279 Data Communication and the Internet Prof. Shamik Sengupta Office 4210 N Fall 2010.
Data Structures By Dr. Mehedi Masud ِAssociate Professor, Computer Science Dept. College of Computers and Information Systems Taif University 1.
Course Overview 1 MAT 279 Data Communication and the Internet Prof. Shamik Sengupta Office 4210 N
Operating Systems (CS 340 D) Dr. Abeer Mahmoud Princess Nora University Faculty of Computer & Information Systems Computer science Department.
CEN 621 Cryptography and Network Security Spring Term CEN 621 Cryptography and Network Security Spring Term INTERNATIONAL BURCH UNIVERSITY.
Welcome to SSE3044 Operating Systems!
CS 450/550 Operating Systems Loc & Time: MW 1:40pm-4:20pm, 101 ENG
CS1201: Programming Language 2
Course Information CSE 3213 – Fall 2011.
Data & Network Security
Course Guide CT 1501.
Computer Systems Organization
Introduction to radio frequency (RF) and wireless communications
BIL 104E Introduction to Scientific and Engineering Computing
CSC 111 Course orientation
Artificial Intelligence (CS 461D)
E-BUSINESS SYSTEMS DESIGN IS 232 T
INTERNATIONAL BURCH UNIVERSITY
Introduction to CPSC3125 Operating System
Introduction to the course
Lecture 1: Introduction
INTRODUCTION TO INFORMATION SYSTEMS AND TECHNOLOGY (NET 201)
Northern Michigan University MA161
Signals and Systems Chapter 0: Course Policies
GC 101 Programming Principles java
INFS 522 – Computer Systems Concepts
An Introduction to Java Language
An Introduction to Java Language
ITEC 202 Operating Systems
ITEC 202 Operating Systems
Introduction to Course
Introduction to the Java Language ​
Presentation transcript:

INTRODUCTION TO NETWORK SECURITY l.Tahani Aljehani

What is NW 536?  NW 536 is aim to introduce the basics of computer networks security to the students including the impact of network architecture on network security. It also defines the main elements of security which are: confidentiality, integrity, and availability.

Text Book  William Stallings "cryptography and network Security Principles and Practice”, Prentice Hall, The Fifth Edition.

Text Book2  Network Security Fundamentals – Eric Cole, Ronald L. Krutz, James Conley and Brian Reisman, W le y,2007

Course schedule

Grade AssignmentWeek Percentage of the grade to the final grade Exam#1#6 on Sun (1/12/1434) for( 9w1+9w3)15% Exam#2 #11 on Sun (21/1/1435) for( 9w1+9w3) 15% Homework, Quizzes, Research Will be decide 10% Lab10% Final Exam # 17 50% Bounce For those who attend on time and have good attitude

Course learning outcomes:  By the end of this course, the students should be able to: Understand basics of network security Cryptography Understand the effects of network architecture on its security Understand the effects of operating systems on the network security Security in internet Deal with firewalls and virtual private networks Secure different applications

Roles and policies  In case of any changes to the above schedule, you will be informed.  No late submissions at all.  Copying from another student will result in a ZERO mark for all involved students.  No make-up midterm at  Bad Attitude will affect your grade