{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

ITEC-6323_Cryptography-and-Information-Systems-Security_Syllabus_2008

ITEC-6323_Cryptography-and-Information-Systems-Security_Syllabus_2008

Info icon This preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Information Assurance Specialization College of Technology, University of Houston Course Description Course: Cryptography and Information Systems Security Course Number: ITEC 6323 Credit Hours: 3 hours Instructor: Ed Crowley, Instructional Associate Professor Department: Information and Logistics Technology Catalog Description ITEC6323 Cryptography and Information Systems Security 3 credit hours Practical issues in cryptography, including examples of current historical cryptography systems; major types of cryptosystems and cryptanalytic techniques and how they operate; hands-on experience with current cryptographic technology. Course Overview This class examines applied cryptographic security services. It also examines enterprise related system threats and countermeasures. Specific cryptographic services include confidentiality, integrity, authentication and non repudiation. Specific mechanisms include encryption, hashes, message authentication codes, digital signatures and digital certificates Specific applications include: Public Key Infrastructure (PKI), secure protocols and virtual private networks (VPNs). Network counter-measures including intrusion detection are also examined. Intrusion detection systems can detect and limit potential system compromises. Since these systems provide a historical record of network and system events, they can also provide assurance that an enterprise’s infrastructure has not been compromised. Laboratory exercises provide an opportunity to apply class concepts. Laboratory activities include: encryption/decryption, file integrity testing, secure key exchange, as well as Public Key Infrastructure Issues. “Hands-on” system and network vulnerability scanning are also included as are lab activities relating to IPSec and SSL based Virtual Private Networks (VPNs). Learning Objectives At the end of this course, students will be able to: 1. Identify and explain major cryptographic services and mechanisms. 2. Define relevant cryptographic terms including random number, private key, public key, algorithm, trusted third party and cryptanalysis. 3. Name, explain and utilize major algorithms including MD5, SHA1, DES, AES and RSA.
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
4. Compare and contrast symmetric and asymmetric cryptography and explain cryptographic services relevant to each.
Image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern