IT Information Security Syllabus
IT Information Security Syllabus
OBJECTIVES:
The Students Will Try To Learn:
I Understand security standards and practices. The scope and essentiality of threats, attacks to
computers and networks associated to them.
II The symmetric and asymmetric key generation techniques used for providing message
authentication, confidentiality and integrity.
III The use cases on cryptography and security systems for server and client systems such as web,
email and firewalls.
COURSE OUTCOMES:
After successful completion of the course, Students will be able to:
CO 1 Identify computer and networks security threats and classify the threats for prevent,
detect and recover from the attacks.
CO 2 Explain Encryption and decryption mechanism using block and stream ciphers.
CO 3 Summarize key distribution and random generation technique for message
authentication.
CO 4 Demonstrate the symmetric and asymmetric key ciphers principles and algorithms.