Cryptography and Network Security: Sultan Qaboos University Course Outline PROGRAM: B.Sc. in Computer Science
Cryptography and Network Security: Sultan Qaboos University Course Outline PROGRAM: B.Sc. in Computer Science
COURSE OUTLINE
This course focuses on the essentials of Network Security. Topics include Security Models and requirements,
Symmetric Key and message confidentiality, Public Key Cryptography and Message Authentication, Key
Managements, Electronic Mail Security (PGP), IP Security, Web and e-commerce Security, Firewalls, and
Malicious Software.
Page | 1
References:
1. Pfleeger, Security in Computing, 4 Ed.,Prentice-Hall, Englewood Cliffs, NJ,.
2. Kaufman, Perlman & Speciner, Network Security,
17. Matching Course Objectives with Program Outcomes and SQU Graduate Attributes
SQU Graduate Attributes
A. SQU graduates should be able to: B. SQU graduates possess C. SQU graduates should
1. apply the knowledge and skills 1. interpersonal communication skills and relish good citizenship
relevant to the specialization alignment with culture of international qualities, be conscious of
2. communicate effectively and use labour market to assist them in practical their national identity
information and communication life and in living successfully skills and and be socially
technologies 2. motivation for independent learning and responsible, engage in
3. critically analyze complex community affairs and
engagement in lifelong learning and
information and present it in simple be mindful of
research work ethics and positive values,
clear manner 3. contemporary issues.
and intellectual independence and
4. autonomy teamwork skills and display
potential leadership qualities
Page | 2
16. Student Responsibilities
It is the student’s responsibility to know and comply with all University Academic Regulations relevant to participation in
this course. These regulations specifically include attendance requirement and students` academic code of conduct.
For attendance, it is the student’s responsibility to be punctual and to attend all classes.
Students are expected to perform their work with honesty and avoid any academic misconduct, which is defined as the use
of any dishonest or deceitful means to gain some academic advantage or benefit. This can take many forms, including but
not limited to, the following: copying, plagiarism, collusion and forging documents. For full details, please refer to the
Undergraduate Academic Regulations and to the Student Academic Misconduct Policy.
Additionally, this course requires that you:
1. Late submission of assignments faces a penalty of 20% per day
2. Students involved in copying will be severely penalized. Term Paper is going to be checked for originality by
using Turnitin.
3. A zero mark will be assigned the first time a student is caught involved in copying and his/her name will be added to a
watch list maintained by the Head of Department. Further repeated involvement in copying will cause the student to get an
F grade in that course. This is in line with the university academic regulations (see pages 36-37 of the 2005 edition of the
university academic regulations booklet)
Item Date In Due Date Weights
Homework 1 (W3) SUN (W5) TUE 7%
Homework 2 (W5) SUN (W7) TUE 7%
Midterm Exam (W9) TUE 25%
Homework 3 (W10) SUN (W12) TUE 7%
Project/Term paper
(Report & presentation) (W7) (W15) 14%
Final Exam 16/05/2020 15:00-18:00 40%
SO1: Analyze a complex computing problem and apply principles of computing and other relevant disciplines to identify
possible solutions.
SO2: Design a computing-based solution to meet a given set of requirements.
SO3: Implement a computing based solution for a given design.
SO4: Evaluate a computing-based solution against a given set of computing requirements.
SO5: Communicate effectively orally and in writing in a variety of professional contexts.
SO6: Recognize professional responsibilities and understand legal and ethical principles.
SO7: Make informed judgments in computing practice based on legal and ethical principles.
SO8: Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline.
SO9: Apply computer science theory and software development fundamentals to produce computing-based solutions.
Page | 3
COURSE INFORMATION
Course Code COMP5507 Course Title Cryptography and Network Security
Semester/ Year Spring 2019 Section(s) 10/11
Day, Time, and Place SUN, 12:00–13:50, D18
TUES, 12:00–13:50, LAB19A
Tentative Schedule
12 Web Security SSH AND Web Security: Web security requirements, Secure Socket Layer HW3, Final
(SSL), Transport Layer Security (TLS) Exam
Page | 4
13 Firewall Firewalls: Introduction, Configuration, Access Control, Personal firewall Final Exam
14 Malicious Software Intruders and Malicious Software: IDS, Virus and threats, Virus Final Exam
countermeasures
15 Term Paper Presentations Term Paper
Page | 5