SCS412 Course Content
SCS412 Course Content
Credit Hours: 3 Pre-requisite: SIT104: Computer Network Fundamentals Purpose of the Course
The purpose of this course is to expose the learner to methods of detecting, preventing, and controlling
unauthorized use of computer systems and their implementations.
ii. Analyze different cryptographic techniques, access control, and authentication strategies.
iii. Employ strategies that prevent information systems from internal and external attacks.
iv. Create information security policies to secure files and print resources
Course Content
Introduction: Background; definitions; OSI security Architecture; Aspects of security; Attack types;
Security Services (X.800); Model for network security; Network Security: Why information security;
Areas of Security; Security as a process; Attacks, Services and Mechanisms; Security goals and Network
Models; Information security Policies: Definitions of information security policy; types of information
security policies; SETA and social engineering; Access control: Definitions and types of access control
models; describe physical and logical access control strategies; Symmetric Ciphers: A review of
symmetric ciphers; classical/conventional cryptography; mono-alphabetic ciphers; polyalphabetic
ciphers; stream ciphers and their cryptanalysis; product ciphers and their cryptanalysis; steganography;
Modern Cryptography: block ciphers; data encryption standard (DES); strengths, weaknesses, differential
& linear cryptanalysis, data encryption standard (DES), modes of operation; Advanced Encryption
Standard (AES); Asymmetric Ciphers: Public Key Infrastructure (PKI); principles of public-key
cryptography; RSA algorithm; RSA implementation and security; Key Management: Introduction to key
management; Distribution of public keys; Public Key Certificates; Distribution of Secret keys; Deffie
Hellman Key exchange; Message Authentication: hash functions; number theory; digital signatures;
Digital Signatures and Authentication Protocols: Digital signatures; Authentication protocols; Digital
Signature Standard (DSS); X.509 Standard and applications.
Instructional Methods
Lectures, Individualized learning, Practical Exercises, Group Based Learning, projects, case studies,
practical demonstrations, simulation sessions.
ii. Musa, Sarhan M. Dulles, Virginia. (2018). Network Security and Cryptography: Fundamental Principles
and Applications. Mercury Learning & Information.
iii. Lek, K., & Rajapakse, N. (2012). Cryptography: Protocols, Design, and Applications. Nova Science
Publishers, Inc.
iv. William Stallings (2017). Cryptography and Network Security Principles and Practice. Pearsons
Education Limited.
i. Du, W. (2019). Computer & Internet Security: A Hands-on Approach 2nd Edition. Wenliang Du ISBN-13:
978-1733003933
ii. John R. Vacca. (2014). Cyber Security and IT Infrastructure Protection. Syngress