Issue Date:11/7/2021
issue:02
ZU/QP10F004
Faculty: Information Technology
Program: Bachelor's Department: Cybersecurity
Semester:
Academic year:
Course Plan
First: Course Information
Credit Hours:3 Course Title: Information and Network
Security Course No.
1506341
Lecture Time:
Section No.:
Prerequisite:
Obligatory Faculty Requirement Elective University Requirement Obligatory University Requirement Faculty Requirement
Course Elective Specialty Requirement Obligatory Specialization requiremen
tType Of Course:
Face-to-Face Learning
Blended Learning(2 Face-to-Face + 1Asynchronous) Online Learning (2 Synchronous+1 Asynchronous) Type of
Learning:
Second: Lecturer Information
Academic Rank:
Name:
E-mail:
Ext. Number:
Office Number:
Sunday Monday Tuesday Wednesday Thursday Office Hours:
Third: Course Description
Overview principles and technologies behind computer security. Topics include: principles of computer
security; encryption and decryption; security mechanisms in computer programs, operating systems,
databases, and networks; administration of computer security, and legal and ethical issues .
Issue Date:11/7/2021
issue:02
ZU/QP10F004
Fourth: Learning Resources
Security in Computing Textbook:
Year: 2007
4
th: Edition
Author: Charles P.
Pfleeger, and Shari Lawrence Pfleeger
Moodle
Network Security Essentials: Applications and Standards, Wm.
Stallings, Prentice Hall, Fifth Edition, 2013.
Network Security - Private Communication in a Public World, Charlie Kaufman, Radia Perlman and Mike Speciner, Prentice Hall, Englewood Cliffs, New Jersey, 1995.
Handbook of Applied Cryptography , Alfred J. Menezes, Paul C.
van Oorschot and Scott A. Vanstone, 1996 Additional Resources
(Books, Websites, …)
Classroom Laboratory Workshop MS Teams Moodle Teaching Place:
Fifth: Learning Outcomes
Course Learning Outcomes
Program Learning Outcome Code Knowledge
Course Code
*PK1 Recognize the concepts and principles of Information Security.
* K1
PK1 Define the computer security.
K2
PK1, PK2 Define the computer Criminals.
K3
PK1 List the basic approaches to defense of computing systems.
K4
PK1, PK2 Provide understanding of how cryptography is used in secure
communication K5
PK1 An overview of Stream/Block Ciphers
K6
PK1, PK3 Develop knowledge of security mechanisms in computer
programs, operating systems, databases, and networks, administration of computer security, and legal/ethical issues in computer security
K7
PK1, PK2 Develop knowledge of vulnerabilities, threats and attacks in
computing systems K8
PK1, PK2 Describe the main networks threats.
K9
Issue Date:11/7/2021
issue:02
ZU/QP10F004
PK1, PK4, PK5 Understand the importance of senior system manager’s role in
information assurance K10
PK1 List the main security Principles.
K11
PK1 Describe the effect of malicious code in it field
K12
PK1, PK3 Explain how to increase the protection level for networks
K13
Skills
**PS4 Learn how to use cryptography algorithms to encrypt and
decrypt data.
* S1
PS4 Learn how to uses of encryption.
S2
PS4 Learn how to uses of network security controls
S3
PS4 Learn how to collect and define the vulnerabilities.
S4
PS4 Learn how to apply cryptography algorithms to encrypt and
decrypt data.
S5
PS4 Develop proficiency in use of various software tools for
computer security.
S6
PS4 Distinguish between viruses and other malicious code.
S7
PS4 Analyze, design, build and manage secure systems
S8
PS4 Analyze the typical attack scenario.
S9
PS4 How controls against program threats work.
S10
PS4 Investigate the virus's signature.
S11
Competences
**PC5 Students are able to effectively communicate their ideas
* C1
Discuss and work in a group in order to study several cases PC1 related to the computer threats, vulnerability and controls.
C2
PC1, PC5 Creativity
C3
PC1, PC4 Leadership
C4
PC4, PC5 Critical thinking
C5
*K: knowledge, *S: skills, *C: competencies.
** PK:Program Learning Outcome Knowledge, PS: Program Learning Outcome Skill, PC: Program Learning Outcome Competence.
Sixth: Course Teaching Plan
Lecture Date
Intended Teaching Outcomes(IL
Os)
Topics
Teaching Procedure
s*
TeachingMethods*** References***
Week1 C1 Syllabus overview Face-to-Face Lecture Textbook
Issue Date:11/7/2021
issue:02
ZU/QP10F004
K1 Introduction to
computer security Face-to-Face Lecturing , quizzes
and assignments Textbook
K1
Writing malware to attack the availability of any computer system using a notepad and dos command.
Asynchronous Assignments Internet, DOS
Week2
K1, K2
Confidentiality, Integrity and availability
Face-to-Face Lecturing , quizzes and
assignments Textbook
K1, K2
Confidentiality, Integrity and availability
Face-to-Face Lecturing , quizzes and
assignments Textbook
K1, K2, K3
Create a case study to make a balance between a CIA
Create and draw a case study todefine a
vulnerability, threat, and control
framework.
Asynchronous Case study Textbook
Week3
K1, K2, K3
Computer criminals and methods of
defends Face-to-Face Lecturing , quizzes and
assignments Textbook
K4, K5, K6, S1, S2, S3, S4, S5
An Overview of
Cryptography Face-to-Face Lecturing , quizzes and
assignments Textbook
K4, K5, K6, S1, S2, S3, S4, S5
Develop a windows
application to
create a
dictionary for the most
vulnerabilities in the world.
Asynchronous Programming, assignments
CVE website, CVE® Program (https://cve.mitre.
org/)
Week4
K4, K5, K6, S1, S2, S3, S4, S5
Transpositions Face-to-Face Lecturing , quizzes and
assignments Textbook
K4, K5, K6, S1, S2, S3, S4, S5
Steganography Face-to-Face Lecturing , quizzes and
assignments Textbook
K4, K5, K6, S1, S2, S3, S4, S5
Write a java program to implement the Shift (Caesar) Cipher
algorithm.
Write a java
Asynchronous Programming,
assignments Textbook
Issue Date:11/7/2021
issue:02
ZU/QP10F004
program to implement the Keyword Mixed Alphabet algorithm.
Week5
K4, K5, K6, S1, S2, S3, S4, S5
Data Encryption
Standard (DES) Face-to-Face Lecturing , quizzes and
assignments Textbook
K4, K5, K6, S1, S2, S3, S4, S5
Data Encryption
Standard (DES) Face-to-Face Lecturing , quizzes and
assignments Textbook
K4, K5, K6, S1, S2, S3, S4, S5
Write a java program to implement the Vernam Cipher algorithm.
Write a java program to implement the Vigenere Cipher algorithm.
Asynchronous Programming,
assignments Textbook
Week6
K4, K5, K6, S1, S2, S3, S4, S5
Public Key
Encryption Face-to-Face Lecturing , quizzes and
assignments Textbook
K4, K5, K6, S1, S2, S3, S4, S5
Public Key
Encryption Face-to-Face Lecturing , quizzes and
assignments Textbook
K4, K5, K6, S1, S2, S3, S4, S5
Write a java program to implement the Columnar Transposition algorithm.
Using a
combination of substitution and transposition algorithms (product cipher) design a block diagram and implement that
in java
programming.
Asynchronous Programming,
assignments Textbook
Week7
K4, K5, K6, S1, S2, S3, S4, S5
Trustworthy
Encryption Face-to-Face Lecturing , quizzes and
assignments Textbook
K4, K5, K6, S1, S2, S3, S4, S5
Hashing Face-to-Face Lecturing , quizzes and
assignments Textbook
K4, K5, K6, S1, S2, S3, S4, S5
Steganography:
Develop a project to Asynchronous Programming,
assignments Video, Textbook
Issue Date:11/7/2021
issue:02
ZU/QP10F004
S6, S7, S8, S9, S10, S11
hide text inside audio or video file.
Week8
K4, K5, K6, S1, S2, S3, S4, S5
DES algorithm Face-to-Face Assignments Examples,
Textbook K4, K5,
K6, S1, S2, S3, S4, S5
DES algorithm Face-to-Face Assignments Examples,
Textbook K4, K5,
K6, S1, S2, S3, S4, S5
DES algorithm Quiz Asynchronous Assignments Examples, Textbook
Week9
K4, K5, K6, S1, S2, S3, S4, S5
The Uses of
Encryption Face-to-Face Lecturing , quizzes and
assignments Textbook
K4, K5, K6, S1, S2, S3, S4, S5
Public Key
Encryption Face-to-Face Lecturing , quizzes and
assignments Textbook
K7, K8, K11
RSA Practice
Problems Asynchronous Assignments Textbook
Examples,
Week10
K7, K8, K11
Non-malicious
Program Errors Face-to-Face Lecturing , quizzes and
assignments Textbook
K7, K8, K11
Non-malicious
Program Errors Face-to-Face Lecturing , quizzes and
assignments Textbook
K7, K8, K11
Watching a video about Hash Function.
(write a report for one of the techniques or algorithms or tools using hashing)
Asynchronous Writing Report Video, Internet, Textbook
Week11
K7, K8, K11
Viruses and Other
Malicious Code Face-to-Face Lecturing , quizzes and
assignments Textbook
K9, K10 Controls Against
Program Threats Face-to-Face Lecturing , quizzes and
assignments Textbook
K9, K10
Reading material about PKI and Certificates.
Then answering questions based on the read material.
Watching videos about SSL, TLS, HTTP, HTTPS and DMZ.
Asynchronous Assignments
Research Paper, Video, Internet,
Textbook
Week12
K9, K10 Threats in Networks Face-to-Face Lecturing , quizzes and
assignments Textbook
K10, K11, S10
Network Security
Controls Face-to-Face Lecturing , quizzes and
assignments Textbook
K10, K11, S10
Watching videos about SSL, TLS, HTTP, HTTPS and DMZ.
Asynchronous Lecturing , quizzes and
assignments Textbook
Issue Date:11/7/2021
issue:02
ZU/QP10F004
Week13
K10, K11, S10
Firewalls and Intrusion detection systems
Face-to-Face Lecturing , quizzes and
assignments Textbook
K10, K11, S10
Firewalls and Intrusion detection systems
Face-to-Face Lecturing , quizzes and
assignments Textbook
K10, K11, S10
Writing or summarizing a report about one of a commercial anti-virus.
Watching videos about Firewalls.
Writing or summarizing a report about the newest network attack.
Asynchronous Writing Report, assignments
Video, Internet, Textbook
Week14
C1, C2,
C3, C4, C5 e-Mail Security Face-to-Face Lecturing , quizzes and
assignments Textbook
C1, C2,
C3, C4, C5 Student’s projects Face-to-Face Lecturing , quizzes and assignments K1, K2,
K3, K4, K5, K6, K7, K8, K9, K10, K11, S1, S2, S3, S4, S5, S6, S7, S8, S9, S10, S11
Final Exam
discussion forum
Asynchronous Lecturing Textbook
* Learning procedures: (Face-to-Face, synchronous, asynchronous). * * Teaching methods: (Lecture, video…..). ** * Reference: (Pages of the book, recorded lecture, video….).
Seventh: Assessment Methods
Methods Fully Electronic Education
Blended Learning
Face-To- Face Learning
The course outcomes that are measured
Mid-term Exam 30
K1, K2, K3, K4, K5, K6, S1, S2,S3, S4, S5
Asynchronous Activities &
Participations 20
K1, K2, K3, K4, K5, K6, K7, K8,K9, K10, K11, S1, S2, S3, S4, S5, C1, C2, C3, C4, C5
Final Exam 50
K1, K2, K3, K4, K5, K6, K7, K8,K9, K10, K11, S1, S2, S3, S4, S5, S6, S7, S8, S9, S10, S11
Issue Date:11/7/2021
issue:02
ZU/QP10F004
Eighth: Course Polices
All course policies are applied on all teaching patterns (online, blended, and face- to-face Learning) as follows:
a. Punctuality.
b. Participation and interaction.
c. Attendance and exams.
Academic integrity: (cheating and plagiarism are prohibited).
Approval Name Date Signature
Head of Department
Faculty Dean