0% found this document useful (0 votes)
3 views

Course Outline

The document outlines the course structure for 'Computer Network Security' at Wollo University, detailing course objectives, outcomes, and content areas such as encryption mechanisms, authentication, and network security concepts. It includes information on lab sessions, prerequisites, assessment methods, and recommended textbooks. The course is compulsory for BSc. Electrical & Computer Engineering students and carries 5 ECTS credits.

Uploaded by

Abera birhanu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Course Outline

The document outlines the course structure for 'Computer Network Security' at Wollo University, detailing course objectives, outcomes, and content areas such as encryption mechanisms, authentication, and network security concepts. It includes information on lab sessions, prerequisites, assessment methods, and recommended textbooks. The course is compulsory for BSc. Electrical & Computer Engineering students and carries 5 ECTS credits.

Uploaded by

Abera birhanu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Computer and Network Security

Wollo University
School of Electrical, Computer and Biomedical Engineering; KIoT
Department of Electrical & Computer Engineering
Course Code ECEg5172
Course Title Computer Network Security
Degree Program BSc. Electrical & Computer Engineering
Module Name Computer Networks and Security
ECTS Credits 5
Contact hour per week 2 Lec., 1 Tut., 2 Lab.
Course Outcomes:
• Develop Concept of Security needed in Communication
of data through computers and networks along with
Various Possible Attacks
Course Objectives & • Understand Various Encryption mechanisms for secure
Competences to be transmission of data and management of key required
Acquired for required for encryption
• Understand authentication requirements and study
various authentication mechanisms
• Understand network security concepts and study
different Web security mechanisms.

1. Introduction
1.1. Need for Security
1.2. Security Attacks
1.3. Services and Mechanisms
1.4. Network Security
1.5. Model
2. Symmetric Ciphers
2.1. Substitution &Transposition Techniques
2.2. Block Cipher
2.3. DES
2.4. Triple DES
Course Description
2.5. Stream Ciphers
3. Public Key Cryptography
3.1. Need and Principles of Public Key Cryptosystems
3.2. RSA Algorithm
3.3. Diffie-Hellman Key Exchange
3.4. Digital Signatures
3.5. Key Distribution and Management
4. Authentication
4.1. Authentication Requirements
4.2. Message Authentication Codes
4.3. Hashes
4.4. MD5 & SHA
4.5. User Authentication: Password, Certificate based &
Biometric Authentication
4.6. Kerberos
5. Network Security
5.1. Firewalls
5.2. IP Security
5.3. VPN
5.4. Intrusion Detection
5.5. Web Security
5.6. SSL and TLS
Lab Sessions:
• Packet Sniffing (Using Wire-shark) and Port Scanning
Laboratory Exercise
• Cryptography with Java Cryptography Extensions (JCE)
• Secure Communication with SSL/Java Socket Extension
(JSSE)
Pre-requisites Data Communication and Computer Networks - ECEg4172
Computer Architecture and Organization - ECEg3122
Semester II
Status of Course Compulsory
Teaching & Learning Lectures supported by tutorials and practical laboratory
Methods exercises.
Assessment/Evaluation Assignments (20%), Tests (30%), and Final Exam (50%)
Textbook:
❖ "Network Security Essentials: Applications and
References Standards," Prentice Hall, Wm. Stallings, Third
Edition.
References:
❖ Andrew S. Tanenbaum: Computer Networks,

You might also like