Download presentation
Presentation is loading. Please wait.
Published byMia Richins Modified over 9 years ago
1
1 Computer Engineering Department Islamic University of Gaza ECOM 5347 Network Security Undergraduate Course Fall 2014-2015 Prof. Mohammad A. Mikki Room I215 Tel. Ext. 2876 email: mmikki@iugaza.edu.ps Skype id: mohammad.mikki Homepage: http://site.iugaza.edu.ps/mmikki/
2
Lecture 1 Syllabus
3
3 Mohammad A. Mikki Professor of Computer Engineering ECE Department, Faculty of Engineering Instructor
4
Where to find me 4 My Office:IT bldg: Room I215 Office Hours: TBA and by appointment My Email: mmikki@iugaza.edu.ps My homepage:http://site.iugaza.edu.ps/mmikki/ Skype id: mohammad.mikki Tel.: +970-8-2860700 Ext. 2876
5
Teaching Assistants Section 101: Eng. Mohammed Alokshiya Email: mm-oksh@hotmail.com Section 201: Eng. Israa El Jamal Email: eng.israa.1991@gmail.com 5
6
Course Information Course Code: ECOM 5347 Course Name: Network Security (Undergraduate Course) Number of credits: 3 6
7
Course Description Principles of practical computer security to enable students to defend themselves against malicious threats. Topics include firewalls, anti-virus, cryptography basics and its application, network technologies and their vulnerabilities. 7
8
Course Objectives All students, and most of the general population, use computers and computer-based systems everyday, and entrust those systems with life- critical and cost-critical functions. In spite of the high level of trust placed in computer-based systems, even advanced computer users have little awareness of their exposure to security threats. The general lack of understanding of basic computer security concepts leads to increased risk and costs involved in using computers. This course will introduce computer security basics in a practical way and give students the understanding that they need to protect themselves, and their data, from malicious attack. Students will learn about the mechanisms behind most computer attacks and they will learn about standard defense tools including firewalls and anti-virus programs. The course will provide a practical introduction to a broad range of computer security topics. 8
9
Course Outcomes At completion of the course, students should be able to: Explain common security threats, including malware. Analyze security vulnerabilities in computer systems. Apply authentication and cryptography to secure computer systems. Use open source tools to improve system security. Understand the fundamentals of network security. 9
10
Course Website http://moodle.iugaza.edu.ps Please check this webpage at least once a week for lecture notes, homework assignments, solutions, useful links, supplementary material, announcements 10
11
Class Information Class location, days and time Sec. 101: SMW 10:00 am – 11:00 am Room K413 Sec. 201: SMW 11:00 am – 12:00 noon Room X 11
12
Required Textbook and Material Michael T. Goodrich and Roberto Tamassia, Introduction to Computer Security, Addison- Wesley, 1 edition (October 25, 2010) ISBN-10: 0321512944 ISBN-13: 978-0321512949 12
13
Class Expectations Class participation – Your input is needed for good discussion Keep up with reading material 13
14
Working Schedule 14 WeekSlidesWork Due 1 Ch.1 : Introduction Ch01-Introduction.pptx 2 Ch.3: Operating Systems Security Ch03-OS.pptx Ch03-FilesystemSecurity-slides 1-14.pptx (pages 114-129) Ch03-FilesystemSecurity-slides15-28.pptx (Section 3.2-3.3) Quiz1 on Ch.1 3 Ch03-OSSec.pptx (Section 3.2-3.3) ApplicationSecurity.pptx (Section 3.4) Ch03-BufferOverflow.pptx (Section 3.4) 4Ch.4: Malware Ch04-Malware-slides1-23.pptx (Sections 4.1-4.3.2) Ch04-Malware-slides 24-41.pptx Quiz2 on Ch. 3
15
Working Schedule 15 WeekSlidesWork Due 5 Ch.5: Network Security I Ch05-NetworkModelsARP.pptx Ch05-NetworksTCP-IP.pptx Quiz3 on Ch.4 6 Ch05-NetworksTCP-IP-part C.pptx 7 Ch.6: Network Security II Ch06-NetworksDNS Ch06-Firewalls.pptx Quiz4 on Ch.5 8 (Beginning of midterms) Ch.7: Web Security Ch07-Web.pptx Ch07-Web-slides 45-72.pptx Quiz5 on Ch.6 9Ch07-Web-slides 73-89.pptx Midterm Exam
16
Working Schedule 16 WeekSlidesWork Due 10 Ch.8: Cryptography Ch08-CryptoConcepts-slides 1-28.pptx Ch08-CryptoConcepts-slides 29- 50.pptx Quiz6 on Ch.7 11 Ch08-CryptoConcepts-slides 51- 57.pptx Ch08-DataIntegrity.pptx 12Ch.10: Distributed Applications Security Ch10-Database Ch10-DRM Ch10-PaymentSystems Ch10-SpamCybercrime Quiz7 on Ch.8 13 Quiz8 on Ch.10 14 Beginning of final exams
17
Grading Scheme Quizzes10% 10 Lab experiments (Teaching Assistant) 20% Attendance, class participation, moodle chat and forums 10% Midterm Exam20% Final exam40% 17
18
Research Report (Not required for the undergraduate students) Select a research topic in network security Select 3-5 recent papers on the topic Summarize these papers in a 10-15 page report Submit an intermediate report by 8 th week of the semester Submit a final report by 13 th week of the semester Make a 15 minutes presentation in front of the class in weeks 14 and 15 18
19
Quizzes 8 quizzes Quizzes are given after completion of each textbook chapter. 19
20
Lab 20 There will be a total of 5 laboratory experiments that will cover the current tools used in computer and network security. The TA will assist in conducting these experiments
21
21 any questions
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.