0% found this document useful (0 votes)
3 views2 pages

SCS420_COURSE_OUTLINE

The course CSC420, titled Computer Network Security, aims to provide students with knowledge of preventive measures for securing computer and network infrastructure. By the end of the course, learners will understand the importance of network security, identify security threats, and apply cryptographic protocols. The course includes lectures, practical demonstrations, and assessments comprising examinations and continuous assessments.

Uploaded by

kyalomakau08
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views2 pages

SCS420_COURSE_OUTLINE

The course CSC420, titled Computer Network Security, aims to provide students with knowledge of preventive measures for securing computer and network infrastructure. By the end of the course, learners will understand the importance of network security, identify security threats, and apply cryptographic protocols. The course includes lectures, practical demonstrations, and assessments comprising examinations and continuous assessments.

Uploaded by

kyalomakau08
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

SOUTH EASTERN KENYA UNIVERSITY

COURSE OUTLINE

Department of Computer Science and Technology

Course code: CSC420 Course Title: Computer Network Security

Semester: Second Academic year: 2024/25


Course Purpose
The course aims to equip a learner with knowledge of physical and software preventive measures used to
secure computer and network infrastructure.

Expected Learning Outcomes


By the end of the course the learner should be able to:

1. Understand the need for security in a computer networked environment


2. Identify factors driving need for network security
3. Discuss and classify network security attacks
4. Compare public key and symmetric cryptosystems.
5. Use public-key primitives and their applications.
6. Describe cryptographic protocols and their properties.
7. Apply cryptographic primitives and protocols in network management applications.

Week/ Date Lecture Topic Remarks


1 Introduction to Networking
2 Fundamentals of Computer Security
3 Symmetric Cipher
4 Number Theory
5 CAT 1
6 Hash Functions
7 Key Management
8 Digital Signatures
9 CAT 2
10 Network Access Control
11 Disaster Recovery Plan
12 E-commerce Security
13 Examination

Knowledge Transforms
Mode of delivery
Lectures, directed reading, practical demonstrations of communication services, and programming.

Instructional Material and/or Equipment


Journal review papers
Course Assessment
Assignments, tutorials, tests, presentations and written examinations.

Assessment Type Weighting (%)


Examination 70
Continuous Assessment 30( CAT1=15,CAT=15)
Total 100

Recommended reference material

1. Forouzan, Behrouz A., and Debdeep Mukhopadhyay. Cryptography and network security (Sie).
McGraw-Hill Education, 2011.
2. Stallings, William. Cryptography and network security: principles and practice. Upper Saddle River:
Pearson, 2017.
3. http://users.abo.fi/ipetre/crypto/

Knowledge Transforms

You might also like