This course introduces students to the basic principles and practices of computer and information security. Focus will be on the software, operating system and network security techniques with detailed analysis of real-world examples. Topics include cryptography, authentication, software and operating system security (e.g., buffer overflow), Internet vulnerability (DoS attacks, viruses/worms, etc.), intrusion detection systems, firewalls, VPN, Web and wireless security.
Intended learning outcomes
Knowledge and understanding
Introducing the student to information security and its importance to institutions and the main elements and means to achieve information security
The student describes the basics of security such as checking access, controlling access, and identifying malicious programs
Student's number of challenges in information security such as denial of service attack and intrusion detection
The student learns about information and software security policies, software and information systems
mental skills
The student distinguishes the main elements of information security and the means to achieve them
The student distinguishes the basics of security, such as checking and controlling access, and identifying malicious programs
The student distinguishes challenges as a denial of service attack and intrusion detection equivalent in protection
The student analyzes information security policies, security policies, software, and information systems
Practical skills and professionalism
The student distinguishes the main elements of information security and the means leading to achieving them
The student distinguishes the basics of security, such as checking and controlling access, and identifying malicious programs
The requester performs the main settings of the firewall to counteract programs, programs, and malware
General and transferable skills
Inventory the main elements of information security and modern methods and techniques to deal with them
information in a particular work environment
Understanding information security policies, network and software security policies, and information systems security