• Tidak ada hasil yang ditemukan

Course Plan

N/A
N/A
Protected

Academic year: 2024

Membagikan "Course Plan"

Copied!
8
0
0

Teks penuh

(1)

Issue Date:11/7/2021

issue:02

ZU/QP10F004

Faculty: Information Technology

Program: Bachelor's Department: Cybersecurity

Semester:

Academic year:

Course Plan

First: Course Information

Credit Hours:3 Course Title: Information and Network

Security Course No.

1506341

Lecture Time:

Section No.:

Prerequisite:

Obligatory Faculty Requirement Elective University Requirement Obligatory University Requirement Faculty Requirement

Course Elective Specialty Requirement Obligatory Specialization requiremen

t

Type Of Course:

Face-to-Face Learning

Blended Learning(2 Face-to-Face + 1Asynchronous) Online Learning (2 Synchronous+1 Asynchronous) Type of

Learning:

Second: Lecturer Information

Academic Rank:

Name:

E-mail:

Ext. Number:

Office Number:

Sunday Monday Tuesday Wednesday Thursday Office Hours:

Third: Course Description

Overview principles and technologies behind computer security. Topics include: principles of computer

security; encryption and decryption; security mechanisms in computer programs, operating systems,

databases, and networks; administration of computer security, and legal and ethical issues .

(2)

Issue Date:11/7/2021

issue:02

ZU/QP10F004

Fourth: Learning Resources

Security in Computing Textbook:

Year: 2007

4

th

: Edition

Author: Charles P.

Pfleeger, and Shari Lawrence Pfleeger

 Moodle

 Network Security Essentials: Applications and Standards, Wm.

Stallings, Prentice Hall, Fifth Edition, 2013.

 Network Security - Private Communication in a Public World, Charlie Kaufman, Radia Perlman and Mike Speciner, Prentice Hall, Englewood Cliffs, New Jersey, 1995.

 Handbook of Applied Cryptography , Alfred J. Menezes, Paul C.

van Oorschot and Scott A. Vanstone, 1996 Additional Resources

(Books, Websites, …)

Classroom Laboratory Workshop MS Teams Moodle Teaching Place:

Fifth: Learning Outcomes

Course Learning Outcomes

Program Learning Outcome Code Knowledge

Course Code

*PK1 Recognize the concepts and principles of Information Security.

* K1

PK1 Define the computer security.

K2

PK1, PK2 Define the computer Criminals.

K3

PK1 List the basic approaches to defense of computing systems.

K4

PK1, PK2 Provide understanding of how cryptography is used in secure

communication K5

PK1 An overview of Stream/Block Ciphers

K6

PK1, PK3 Develop knowledge of security mechanisms in computer

programs, operating systems, databases, and networks, administration of computer security, and legal/ethical issues in computer security

K7

PK1, PK2 Develop knowledge of vulnerabilities, threats and attacks in

computing systems K8

PK1, PK2 Describe the main networks threats.

K9

(3)

Issue Date:11/7/2021

issue:02

ZU/QP10F004

PK1, PK4, PK5 Understand the importance of senior system manager’s role in

information assurance K10

PK1 List the main security Principles.

K11

PK1 Describe the effect of malicious code in it field

K12

PK1, PK3 Explain how to increase the protection level for networks

K13

Skills

**PS4 Learn how to use cryptography algorithms to encrypt and

decrypt data.

* S1

PS4 Learn how to uses of encryption.

S2

PS4 Learn how to uses of network security controls

S3

PS4 Learn how to collect and define the vulnerabilities.

S4

PS4 Learn how to apply cryptography algorithms to encrypt and

decrypt data.

S5

PS4 Develop proficiency in use of various software tools for

computer security.

S6

PS4 Distinguish between viruses and other malicious code.

S7

PS4 Analyze, design, build and manage secure systems

S8

PS4 Analyze the typical attack scenario.

S9

PS4 How controls against program threats work.

S10

PS4 Investigate the virus's signature.

S11

Competences

**PC5 Students are able to effectively communicate their ideas

* C1

Discuss and work in a group in order to study several cases PC1 related to the computer threats, vulnerability and controls.

C2

PC1, PC5 Creativity

C3

PC1, PC4 Leadership

C4

PC4, PC5 Critical thinking

C5

*K: knowledge, *S: skills, *C: competencies.

** PK:Program Learning Outcome Knowledge, PS: Program Learning Outcome Skill, PC: Program Learning Outcome Competence.

Sixth: Course Teaching Plan

Lecture Date

Intended Teaching Outcomes(IL

Os)

Topics

Teaching Procedure

s*

TeachingMethods*** References***

Week1 C1 Syllabus overview Face-to-Face Lecture Textbook

(4)

Issue Date:11/7/2021

issue:02

ZU/QP10F004

K1 Introduction to

computer security Face-to-Face Lecturing , quizzes

and assignments Textbook

K1

Writing malware to attack the availability of any computer system using a notepad and dos command.

Asynchronous Assignments Internet, DOS

Week2

K1, K2

Confidentiality, Integrity and availability

Face-to-Face Lecturing , quizzes and

assignments Textbook

K1, K2

Confidentiality, Integrity and availability

Face-to-Face Lecturing , quizzes and

assignments Textbook

K1, K2, K3

 Create a case study to make a balance between a CIA

Create and draw a case study to

define a

vulnerability, threat, and control

framework.

Asynchronous Case study Textbook

Week3

K1, K2, K3

Computer criminals and methods of

defends Face-to-Face Lecturing , quizzes and

assignments Textbook

K4, K5, K6, S1, S2, S3, S4, S5

An Overview of

Cryptography Face-to-Face Lecturing , quizzes and

assignments Textbook

K4, K5, K6, S1, S2, S3, S4, S5

 Develop a windows

application to

create a

dictionary for the most

vulnerabilities in the world.

Asynchronous Programming, assignments

CVE website, CVE® Program (https://cve.mitre.

org/)

Week4

K4, K5, K6, S1, S2, S3, S4, S5

Transpositions Face-to-Face Lecturing , quizzes and

assignments Textbook

K4, K5, K6, S1, S2, S3, S4, S5

Steganography Face-to-Face Lecturing , quizzes and

assignments Textbook

K4, K5, K6, S1, S2, S3, S4, S5

 Write a java program to implement the Shift (Caesar) Cipher

algorithm.

 Write a java

Asynchronous Programming,

assignments Textbook

(5)

Issue Date:11/7/2021

issue:02

ZU/QP10F004

program to implement the Keyword Mixed Alphabet algorithm.

Week5

K4, K5, K6, S1, S2, S3, S4, S5

Data Encryption

Standard (DES) Face-to-Face Lecturing , quizzes and

assignments Textbook

K4, K5, K6, S1, S2, S3, S4, S5

Data Encryption

Standard (DES) Face-to-Face Lecturing , quizzes and

assignments Textbook

K4, K5, K6, S1, S2, S3, S4, S5

 Write a java program to implement the Vernam Cipher algorithm.

 Write a java program to implement the Vigenere Cipher algorithm.

Asynchronous Programming,

assignments Textbook

Week6

K4, K5, K6, S1, S2, S3, S4, S5

Public Key

Encryption Face-to-Face Lecturing , quizzes and

assignments Textbook

K4, K5, K6, S1, S2, S3, S4, S5

Public Key

Encryption Face-to-Face Lecturing , quizzes and

assignments Textbook

K4, K5, K6, S1, S2, S3, S4, S5

 Write a java program to implement the Columnar Transposition algorithm.

 Using a

combination of substitution and transposition algorithms (product cipher) design a block diagram and implement that

in java

programming.

Asynchronous Programming,

assignments Textbook

Week7

K4, K5, K6, S1, S2, S3, S4, S5

Trustworthy

Encryption Face-to-Face Lecturing , quizzes and

assignments Textbook

K4, K5, K6, S1, S2, S3, S4, S5

Hashing Face-to-Face Lecturing , quizzes and

assignments Textbook

K4, K5, K6, S1, S2, S3, S4, S5

Steganography:

Develop a project to Asynchronous Programming,

assignments Video, Textbook

(6)

Issue Date:11/7/2021

issue:02

ZU/QP10F004

S6, S7, S8, S9, S10, S11

hide text inside audio or video file.

Week8

K4, K5, K6, S1, S2, S3, S4, S5

DES algorithm Face-to-Face Assignments Examples,

Textbook K4, K5,

K6, S1, S2, S3, S4, S5

DES algorithm Face-to-Face Assignments Examples,

Textbook K4, K5,

K6, S1, S2, S3, S4, S5

DES algorithm Quiz Asynchronous Assignments Examples, Textbook

Week9

K4, K5, K6, S1, S2, S3, S4, S5

The Uses of

Encryption Face-to-Face Lecturing , quizzes and

assignments Textbook

K4, K5, K6, S1, S2, S3, S4, S5

Public Key

Encryption Face-to-Face Lecturing , quizzes and

assignments Textbook

K7, K8, K11

RSA Practice

Problems Asynchronous Assignments Textbook

Examples,

Week10

K7, K8, K11

Non-malicious

Program Errors Face-to-Face Lecturing , quizzes and

assignments Textbook

K7, K8, K11

Non-malicious

Program Errors Face-to-Face Lecturing , quizzes and

assignments Textbook

K7, K8, K11

Watching a video about Hash Function.

(write a report for one of the techniques or algorithms or tools using hashing)

Asynchronous Writing Report Video, Internet, Textbook

Week11

K7, K8, K11

Viruses and Other

Malicious Code Face-to-Face Lecturing , quizzes and

assignments Textbook

K9, K10 Controls Against

Program Threats Face-to-Face Lecturing , quizzes and

assignments Textbook

K9, K10

 Reading material about PKI and Certificates.

Then answering questions based on the read material.

 Watching videos about SSL, TLS, HTTP, HTTPS and DMZ.

Asynchronous Assignments

Research Paper, Video, Internet,

Textbook

Week12

K9, K10 Threats in Networks Face-to-Face Lecturing , quizzes and

assignments Textbook

K10, K11, S10

Network Security

Controls Face-to-Face Lecturing , quizzes and

assignments Textbook

K10, K11, S10

Watching videos about SSL, TLS, HTTP, HTTPS and DMZ.

Asynchronous Lecturing , quizzes and

assignments Textbook

(7)

Issue Date:11/7/2021

issue:02

ZU/QP10F004

Week13

K10, K11, S10

Firewalls and Intrusion detection systems

Face-to-Face Lecturing , quizzes and

assignments Textbook

K10, K11, S10

Firewalls and Intrusion detection systems

Face-to-Face Lecturing , quizzes and

assignments Textbook

K10, K11, S10

 Writing or summarizing a report about one of a commercial anti-virus.

 Watching videos about Firewalls.

 Writing or summarizing a report about the newest network attack.

Asynchronous Writing Report, assignments

Video, Internet, Textbook

Week14

C1, C2,

C3, C4, C5 e-Mail Security Face-to-Face Lecturing , quizzes and

assignments Textbook

C1, C2,

C3, C4, C5 Student’s projects Face-to-Face Lecturing , quizzes and assignments K1, K2,

K3, K4, K5, K6, K7, K8, K9, K10, K11, S1, S2, S3, S4, S5, S6, S7, S8, S9, S10, S11

Final Exam

discussion forum

Asynchronous Lecturing Textbook

* Learning procedures: (Face-to-Face, synchronous, asynchronous). * * Teaching methods: (Lecture, video…..). ** * Reference: (Pages of the book, recorded lecture, video….).

Seventh: Assessment Methods

Methods Fully Electronic Education

Blended Learning

Face-To- Face Learning

The course outcomes that are measured

Mid-term Exam 30

K1, K2, K3, K4, K5, K6, S1, S2,

S3, S4, S5

Asynchronous Activities &

Participations 20

K1, K2, K3, K4, K5, K6, K7, K8,

K9, K10, K11, S1, S2, S3, S4, S5, C1, C2, C3, C4, C5

Final Exam 50

K1, K2, K3, K4, K5, K6, K7, K8,

K9, K10, K11, S1, S2, S3, S4, S5, S6, S7, S8, S9, S10, S11

(8)

Issue Date:11/7/2021

issue:02

ZU/QP10F004

Eighth: Course Polices

 All course policies are applied on all teaching patterns (online, blended, and face- to-face Learning) as follows:

a. Punctuality.

b. Participation and interaction.

c. Attendance and exams.

 Academic integrity: (cheating and plagiarism are prohibited).

Approval Name Date Signature

Head of Department

Faculty Dean

Referensi

Dokumen terkait

Variabel No Simbol Variabel Nama Variabel 1 K1 Luas lantai kurang dari 8m2 /KK 2 K2 Jenis lantai 3 K3 Jenis dinding 4 K4 Jenis atap 5 K5 Kendaraan yang dimiliki 6 K6 Sumber air