syllabus - CSC 574 Information Systems and Network Security...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Syllabus A. Instructors: Dr. Peng Ning, Office: 3258 Engineering Building II Phone: (919) 513-4457 Email: pning@ncsu.edu URL: http://www.csc.ncsu.edu/faculty/ning B. Course prerequisites or restrictive statements: CSC 316 Data Structure for Computer Scientists CSC 401 Data and Computer Communications Networks or CSC/ECE 570 Computer Networks Ability to program in Java or C/C++ C. Designation of course as a General Education Requirement (GER) N/A D. Student learning outcomes: By the end of this course, students will be able to: - State the basic concepts in information security, including security policies, security models, and various security mechanisms. - Explain concepts related to applied cryptography, including plaintext, ciphertext, symmetric cryptography, asymmetric cryptography, and digital signatures. - Explain the basic number theory required for cryptographic applications as well as various cryptographic systems. - Manually compute using Fermat's theorem, Euler's theorem, Euclid's algorithm, extended Euclid's algorithm; manually encrypt/decrypt and sign/verify signatures for small messages using RSA, Diffie-Hellman, and DSA algorithms. - State the requirements and mechanisms for identification and authentication; explain and identify typical security pitfalls in authentication protocols. - List network and distributed systems security issues and solutions, including authentication, key distribution, and network security protocols. - Explain the network access control mechanisms, including the basic concepts of firewalls, packet filters, application gateways, and typical firewall configurations - Outline the protocols, i.e., AH and ESP protocols, for IP Security and the two modes for both protocols. - Explain in their own words the goals of IP Security protocols (AH and ESP), the - Use combinations of IP security protocols to achieve a given security goal (e.g., source authentication, content authentication, traffic confidentiality, etc.) - Explain SSL/TLS protocols. -
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 12/05/2009 for the course IT IS taught by Professor Arther during the Three '09 term at Queensland Tech.

Page1 / 5

syllabus - CSC 574 Information Systems and Network Security...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online