0% found this document useful (0 votes)
125 views

QF01/C4107AE: Al-Zaytoonah University of Jordan Faculty of Science & IT

This document provides details on a course in information security offered at Al-Zaytoonah University of Jordan's Faculty of Science & IT. The 3-credit hour course aims to provide students with an understanding of security threats, vulnerabilities, and encryption techniques. Over 16 weeks, topics will include classical and modern encryption algorithms, public and private key cryptography, digital signatures, and network security. Assessment will be based on exams, assignments, and a final exam. The primary textbook is Cryptography and Network Security by William Stallings.
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
125 views

QF01/C4107AE: Al-Zaytoonah University of Jordan Faculty of Science & IT

This document provides details on a course in information security offered at Al-Zaytoonah University of Jordan's Faculty of Science & IT. The 3-credit hour course aims to provide students with an understanding of security threats, vulnerabilities, and encryption techniques. Over 16 weeks, topics will include classical and modern encryption algorithms, public and private key cryptography, digital signatures, and network security. Assessment will be based on exams, assignments, and a final exam. The primary textbook is Cryptography and Network Security by William Stallings.
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 4

Al-Zaytoonah University of Jordan

Faculty of Science & IT

Page
4/1




Version
1.0

Issue
Date
11-11-2009

Document
Number
QF01/C4107AE



Course Detailed Description Procedures of the Course Plan & Educational Resources Committee

Software Engineering Computer Information Systems

Information Security
0107210

Computer Science

Math & Natural Sciences

0107231

Course Name

3

Prerequisite

Number & date of


course plan approval

See
form
QF01/C4109

On successful completion of this module, students will be able to:


a) Cite the need for information security.
b) To provide basic understanding of security threats and vulnerabilities of
computing system.
c) To provide basic understanding of classical encryption Techniques:
Substitution, Transposition and product Ciphers.
d) Examination of conventional encryption algorithms and design principles
including transposition and substitution techniques such as DES.
e) To provide basic understanding of the modern encryption technique such
as RSA.
f) Develop efficient algorithms for manipulating encryption techniques such
as ( Key distribution, digital signature, identification and authentication,
and secret sharing keys ) in which we use encryption algorithm and how
to implements them.
g) To provide basic understanding of backup, auto save, and recovery.

Introduction to Computer Security.


Fundamentals of Access Control and Security Policies
Authentication and Confidentiality Policies
Intrusion detection
Virus and virus scan programs
Public-key and Private-Key cryptography
Secure hash
Network Security
Wireless Networks

QF01/C4108A - page1/4

Department


Course
.No

Credit
Hours

Brief
Description

:
Course)
(Objectives

:
Course)
(Topics

Al-Zaytoonah University of Jordan


Faculty of Science & IT

4/2


11-11-2009


1.0


QF01/C4108AE



Course Detailed Description Procedures of the Course Plan & Educational Resources Committee

Firewalls

. Cryptography and Network Security by William Stalling, 4th Ed., Pearson


Education, 2005

:
(Text Book)

1. Handbook of Applied Cryptography by A. Menezes, P. van Oorschot, and S.


Vanstone, CRC Press, 1996.
2. Introduction to Computer Security", Matt Bishop, 2nd Ed., Addison-Wesley,
2005
= 50%

( )

Course Work

(Reports, Term Papers, Quizes)


Final Exam =

50%

Notes

Pages in
Textboo
k

= 10%

1 Exam= 20%
2nd Exam= 20%

Final Exam
:
=50%
Grade)
Participation
st

:
Practical Course)
(Grade Determination

(Course Outline)

(Determination

Subjects

Introduction
Security Services
28-49
Cryptography and Cryptanalysis.
Classical Encryption Techniques
62-90
Block Cipher: General View of DES Algorithm.
189
Stream cipher.
Assignment!!!!!!!!!!!!!!
Cryptography:
232,257-267 Int. to Public and Secret Key cryptosystem
Mathematical hard problems
95-130
Introduction to Number Theory:
Finding GCD, Exponentiations, Prime Numbers,
Euler's Totient Function, Inverse
357-364
Hash Functions:
Secure Hash Algorithm (SHA)
290-300
Public-key exchange (Key Management) :
Diffie-Hellman Key Exchange
7,8,16-19

QF01/C4108A page 2/4

:
(References)

Hour
s

Week

01

02
03
04

3
6

05
06

4.5

07/08

Al-Zaytoonah University of Jordan


Faculty of Science & IT

4/3


11-11-2009




1.0


QF01/C4108AE



Course Detailed Description Procedures of the Course Plan & Educational Resources Committee
257-286

Public-Key Encryption:
RSA, Rabin, ElGamal Algorithms
Digital Signature Algorithms: RSADS, Digital
Signature Algorithm (DSA)

377-390

4.5

08/09

10

9-13

Security Cycle: Threats, countermeasures and


Vulnerability
Security Attacks: Passive and Active attacks

11

282, 382

System Access Control: Password Management,


Password Protection
Data Access Control:
DAC, MAC, RBAC
Digital Watermarking:
Steganography
IP Security

12

13

4.5

14/15

4.5

15/16

634-638
53-54
483

Projects
- Viruses
- Firewall
- Web Security
Review

598
621
527

Date of
Approv
al

Approved
by Dept.
Chair

( ) :
Extra Information: (Updated every semester and filled by course instructor)
. Course
Instructor
Office
.No


Extension


QF01/C4108A page 3/4




QF01/C4108AE


1.0

Al-Zaytoonah University of Jordan


Faculty of Science & IT


11-11-2009

4/4



Course Detailed Description Procedures of the Course Plan & Educational Resources Committee

QF01/C4108A page 4/4

You might also like