0% found this document useful (0 votes)
5 views

SCS412 Course Content

Uploaded by

Michael Oselu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

SCS412 Course Content

Uploaded by

Michael Oselu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

SCS412: COMPUTER SECURITY AND CRYPTOGRAPHY

Credit Hours: 3 Pre-requisite: SIT104: Computer Network Fundamentals Purpose of the Course

The purpose of this course is to expose the learner to methods of detecting, preventing, and controlling
unauthorized use of computer systems and their implementations.

Expected Learning Outcomes

By the end of the course, the learner should be able to:

i. Demonstrate knowledge of information security threats.

ii. Analyze different cryptographic techniques, access control, and authentication strategies.

iii. Employ strategies that prevent information systems from internal and external attacks.

iv. Create information security policies to secure files and print resources

Course Content

Introduction: Background; definitions; OSI security Architecture; Aspects of security; Attack types;
Security Services (X.800); Model for network security; Network Security: Why information security;
Areas of Security; Security as a process; Attacks, Services and Mechanisms; Security goals and Network
Models; Information security Policies: Definitions of information security policy; types of information
security policies; SETA and social engineering; Access control: Definitions and types of access control
models; describe physical and logical access control strategies; Symmetric Ciphers: A review of
symmetric ciphers; classical/conventional cryptography; mono-alphabetic ciphers; polyalphabetic
ciphers; stream ciphers and their cryptanalysis; product ciphers and their cryptanalysis; steganography;
Modern Cryptography: block ciphers; data encryption standard (DES); strengths, weaknesses, differential
& linear cryptanalysis, data encryption standard (DES), modes of operation; Advanced Encryption
Standard (AES); Asymmetric Ciphers: Public Key Infrastructure (PKI); principles of public-key
cryptography; RSA algorithm; RSA implementation and security; Key Management: Introduction to key
management; Distribution of public keys; Public Key Certificates; Distribution of Secret keys; Deffie
Hellman Key exchange; Message Authentication: hash functions; number theory; digital signatures;
Digital Signatures and Authentication Protocols: Digital signatures; Authentication protocols; Digital
Signature Standard (DSS); X.509 Standard and applications.

Instructional Methods

Lectures, Individualized learning, Practical Exercises, Group Based Learning, projects, case studies,
practical demonstrations, simulation sessions.

Instructional Materials and/or Equipment

Videos, digital whiteboard, relevant software.


Course Assessment

Type of Assessment Continuous Weighting


Assessment Tests 30%

End Semester Examination 70%

Total Scores 100%

Core Reading Materials


i. S. R. Chauhan; S. Jangra. Dulles, Virginia (2020). Computer Security and Encryption: An Introduction.
Mercury Learning & Information.

ii. Musa, Sarhan M. Dulles, Virginia. (2018). Network Security and Cryptography: Fundamental Principles
and Applications. Mercury Learning & Information.

iii. Lek, K., & Rajapakse, N. (2012). Cryptography: Protocols, Design, and Applications. Nova Science
Publishers, Inc.

iv. William Stallings (2017). Cryptography and Network Security Principles and Practice. Pearsons
Education Limited.

Recommended Reading materials

i. Du, W. (2019). Computer & Internet Security: A Hands-on Approach 2nd Edition. Wenliang Du ISBN-13:
978-1733003933

ii. John R. Vacca. (2014). Cyber Security and IT Infrastructure Protection. Syngress

You might also like