Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Information Assurance Specialization College of Technology, University of Houston Course Description Course: Cryptography and Information Systems Security Course Number: ITEC 6323 Credit Hours: 3 hours Instructor: Ed Crowley, Instructional Associate Professor Department: Information and Logistics Technology Catalog Description ITEC6323 Cryptography and Information Systems Security 3 credit hours Practical issues in cryptography, including examples of current historical cryptography systems; major types of cryptosystems and cryptanalytic techniques and how they operate; hands-on experience with current cryptographic technology. Course Overview This class examines applied cryptographic security services. It also examines enterprise related system threats and countermeasures. Specific cryptographic services include confidentiality, integrity, authentication and non repudiation. Specific mechanisms include encryption, hashes, message authentication codes, digital signatures and digital certificates Specific applications include: Public Key Infrastructure (PKI), secure protocols and virtual private networks (VPNs). Network counter-measures including intrusion detection are also examined. Intrusion detection systems can detect and limit potential system compromises. Since these systems provide a historical record of network and system events, they can also provide assurance that an enterprise’s infrastructure has not been compromised. Laboratory exercises provide an opportunity to apply class concepts. Laboratory activities include: encryption/decryption, file integrity testing, secure key exchange, as well as Public Key Infrastructure Issues. “Hands-on” system and network vulnerability scanning are also included as are lab activities relating to IPSec and SSL based Virtual Private Networks (VPNs). Learning Objectives At the end of this course, students will be able to: 1. Identify and explain major cryptographic services and mechanisms. 2. Define relevant cryptographic terms including random number, private key, public key, algorithm, trusted third party and cryptanalysis. 3. Name, explain and utilize major algorithms including MD5, SHA1, DES, AES and RSA.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4. Compare and contrast symmetric and asymmetric cryptography and explain cryptographic services relevant to each. 5.
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 12/10/2011 for the course TECH 1201 taught by Professor Rock during the Spring '11 term at Hartford.

Page1 / 7


This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online