Issue Date:11/7/2021 issue:02
ZU/QP10F004
Faculty: Information Technology
Program: Bachelor Department: Cyber Security
Semester:
Academic year:
Course Plan
First: Course Information
Credit Hours: 3 Course Title: Secure Communications Protocols
Course No.:
1506345
Lecture Time:
Section No.:
Prerequisite:
1506341
Obligatory Faculty Requirement Elective University Requirement Obligatory University Requirement Faculty Requirement
Course Elective Specialty Requirement Obligatory Specialization requiremen
tType Of Course:
Face-to-Face Learning
Blended Learning (2 Face-to-Face + 1Asynchronous) Online Learning (2 Synchronous+1 Asynchronous) Type of
Learning:
Second: Instructor’s Information
Academic Rank:
Name:
E-mail:
Ext. Number:
Office Number:
Thursday Wednesday
Tuesday Monday
Sunday Office Hours:
Third: Course Description
The aim of this course is to give students a basic knowledge of several security protocols used in the cybersecurity industry. In particular, it introduces the protocol concept in general. It revises the OSI Model protocols and TCP/IP Model protocols. A number of security protocols are then discussed in detail which is related to the network layers, in general. Other Authentications protocols will also be discussed.
Moreover, some protocols will be discussed which are specific for cloud-based communications,
multimedia streaming, mobile communications, and wireless networks security. Some of the protocols
which will be discussed in this course are Secure Sockets Layer/ Transport Layer Security (SSL/TLS),
Datagram Transport Layer Security (DTLS), Secure Shell Protocol (SSH), IPSec, Host Intrusion
Prevention (HIP), Extensible Authentication Protocol (EAP), Remote Authentication Dial-In User Service
(RADIUS), OpenID, OAuth, Single Sign-On (SSO), and Security Assertion Markup Language (SAML).
Issue Date:11/7/2021 issue:02
ZU/QP10F004
Fourth: Learning Source
Design and Analysis of Security Protocol for Communication
Main Reference:
Publication Year: 2020 Issue No.: First Edition.
Authors: Dinesh Goyal, S.
Balamurugan, Sheng-Lung Peng and O.P. Verma
Communication System Security, 1
stEdition, Lidong Chen and Guang Gong, Taylor & Francis Group, 2012.
Introduction to Network Security: Theory and Practice, 2
ndEdition, Jie Wang Zachary A. Kissel, Wiley, 2015.
Information security principles and practices, 2
ndEdition, Mark S. Merkow and Jim Breithaupt, Pearson IT Certification, 2014.
Data Communications and Networking, 5th edition, Behrouz A. Forouzan, McGraw-Hill Education, 2013.
Additional Sources
&Websites:
Classroom Laboratory Workshop MS Teams Moodle Teaching Type:
Fifth: Learning Outcomes
Connection to Program ILOs
Code Course Intended Learning Outcomes (CILOs)
Course Code
Knowledge
*PK1
Discuss the basics of network security.
**K1
Identify the basic knowledge of protocol concepts, OSI Model protocols,
PK1
and TCP/IP Model protocols.
K2
PK2, PK3
List knowledge of concepts, terminology, and principles of different security protocols.
K3
Skills
Apply different protocols to secure wired and wireless communication.
PS1
***S1
Distinguish the strength and weaknesses points of different security
PS1
protocols.
S2
Determining the proper security protocol to be applied based on the
PS1
vulnerabilities and sources of attack and intrusion.
S3
Competencies
Demonstrate skills in problem-solving and decision-making regarding
PC1
security issues.
****C1
Prove the ability to research, analyze and critically evaluate different
PC3
security protocols.
C2
Signify teamwork's capability to express and communicate ideas in written
PC2
and oral forms.
C3
* P: Program, **K: knowledge, ***S: skills, ****C: competencies.
Issue Date:11/7/2021 issue:02
ZU/QP10F004
Sixth: Course Structure
References***
Teaching Methods***
Teaching Procedures*
Topics Intended
Teaching Outcomes
(ILOs) Lecture Date
--- ---
Face-to-Face Syllabus Overview
--- Week 1
Textbook, slides Lecture,
In-class Questions Face-to-Face
Introduction to Network Security K1
Textbook, slides Lecture,
In-class Questions Face-to-Face
Introduction to Network Security K1
Textbook, slides Lecture,
In-class Questions Face-to-Face
Introduction to Network Security K1
Week 2 Textbook,
slides Lecture,
In-class Questions Face-to-Face
Introduction to OSI Model and Protocols
K2
Textbook, slides Lecture,
In-class Questions Face-to-Face
Introduction to OSI Model and Protocols
K2
Textbook, slides Lecture,
In-class Questions Face-to-Face
Introduction to TCP/IP Model and Protocols
K2
Week 3 Textbook,
slides Lecture,
In-class Questions Face-to-Face
Introduction to TCP/IP Model and Protocols
K2
Textbook, slides Lecture,
In-class Questions Face-to-Face
Network Security Protocols (Application Layer) K3, S1, S2,
S3, C1
Textbook, slides Lecture,
In-class Questions Face-to-Face
Network Security Protocols (Application Layer) K3, S1, S2,
S3, C1
Week 4 Textbook,
slides Lecture,
In-class Questions Face-to-Face
Network Security Protocols (Application Layer) K3, S1, S2,
S3, C1
Textbook, slides Lecture,
In-class Questions Face-to-Face
Network Security Protocols (Transport Layer)
K3, S1, S2, S3, C1
Textbook, slides Lecture,
In-class Questions Face-to-Face
Network Security Protocols (Transport Layer)
K3, S1, S2, S3, C1
Week 5 Textbook,
slides Lecture,
In-class Questions Face-to-Face
Network Security Protocols (Transport Layer)
K3, S1, S2, S3, C1
Textbook, slides Lecture,
In-class Questions Face-to-Face
Network Security Protocols (Data Link Layer)
K3, S1, S2, S3, C1
Textbook, slides Lecture,
In-class Face-to-Face
Network Security Protocols (Data Link Layer)
K3, S1, S2, S3, C1 Week 6
Issue Date:11/7/2021 issue:02
ZU/QP10F004
Questions
Textbook, slides Lecture,
In-class Questions Face-to-Face
Network Security Protocols (Data Link Layer)
K3, S1, S2, S3, C1
Textbook, slides Lecture,
In-class Questions Face-to-Face
Midterm Exam Recap K1, K2, K3,
S1, S2, S3, C1
Textbook, slides Lecture,
In-class Questions Face-to-Face
Types of Authentication
Protocols (Remote Authentication Dial-In User Service)
K3, S1, S2, S3, C1
Week 7 Textbook,
slides Lecture,
In-class Questions Face-to-Face
Types of Authentication Protocols (Remote
Authentication Dial-In User Service)
K3, S1, S2, S3, C1
Textbook, slides Lecture,
In-class Questions Face-to-Face
Types of Authentication Protocols (Kerberos) K3, S1, S2,
S3, C1
Textbook, slides Lecture,
In-class Questions Face-to-Face
Types of Authentication Protocols (Kerberos) K3, S1, S2,
S3, C1 Week 8
Textbook, slides Lecture,
In-class Questions Face-to-Face
Types of Authentication Protocols (OpenID, OAuth) K3, S1, S2,
S3, C1
Week 9
Textbook, slides Lecture,
In-class Questions Face-to-Face
Types of Authentication Protocols (OpenID, OAuth) K3, S1, S2,
S3, C1
Textbook, slides Lecture,
In-class Questions Face-to-Face
Types of Authentication Protocols (Light-Weight Directory Access Protocol (LDAP))
K3, S1, S2, S3, C1
Textbook, slides Lecture,
In-class Questions Face-to-Face
Types of Authentication Protocols (Light-Weight Directory Access Protocol (LDAP))
K3, S1, S2, S3, C1
Week 10 Textbook,
slides Lecture,
In-class Questions Face-to-Face
Types of Authentication Protocols (Security Assertion Markup Language (SAML)) K3, S1, S2,
S3, C1
Textbook, slides Lecture,
In-class Questions Face-to-Face
Types of Authentication Protocols (Security Assertion Markup Language (SAML))
K3, S1, S2, S3, C1
Textbook, slides Lecture,
In-class Questions Face-to-Face
Types of Authentication Protocols (Extensible
Authentication Protocol (EAP) K3, S1, S2,
S3, C1
Week 11 Textbook,
slides Lecture,
In-class Questions Face-to-Face
Types of Authentication Protocols (Extensible
Authentication Protocol (EAP) K3, S1, S2,
S3, C1
Textbook, slides Lecture,
In-class Questions Face-to-Face
Security Protocols for Mobile Communications
K3, S1, S2, S3, C1
Textbook, slides Lecture,
In-class Questions Face-to-Face
Security Protocols for Mobile Communications
K3, S1, S2, S3, C1 Week 12
Textbook, slides Lecture,
In-class Questions Face-to-Face
Security Protocol for Cloud- Based Communication K3, S1, S2,
S3, C1
Issue Date:11/7/2021 issue:02
ZU/QP10F004
Independence Day Holiday 25/05/2023
Textbook, slides Lecture,
In-class Questions Face-to-Face
Security Protocol for Cloud- Based Communication K3, S1, S2,
S3, C1
Week 13 Textbook,
slides Lecture,
In-class Questions Face-to-Face
Security Protocol for Multimedia Streaming K3, S1, S2,
S3, C1
Textbook, slides Lecture,
In-class Questions Face-to-Face
Security Protocol for Multimedia Streaming K3, S1, S2,
S3, C1
Textbook, slides Lecture,
In-class Questions Face-to-Face
Wireless Network Security K3, S1, S2,
S3, C1
Week 14 Textbook,
slides Lecture,
In-class Questions Face-to-Face
Students’ Projects Presentation K1, K2, K3,
S1, S2, S3, C1, C2, C3
--- Presentations
Face-to-Face Final Exam Recap
K1, K2, K3, S1, S2, S3,
C1
* Learning procedures: (Face-to-Face, synchronous, asynchronous). * * Teaching methods: (Lecture, video….). ** * Reference: (Pages of the book, recorded lecture, video….).
Seventh: Assessment methods
Methods Face-To-Face Learning
Measurable Course (ILOs) Mid Exam 35
K1, K2, K3, S1, S2, S3, C1Participation 15
K1, K2, K3, S1, S2, S3, C1, C2, C3Final Exam 50
K1, K2, K3, S1, S2, S3, C1Eighth: Course Policies
All course policies are applied to all teaching patterns (online, blended, and face-to-face Learning) as follows:
a. Punctuality.
b. Participation and interaction.
c. Attendance and exams.
Academic integrity: (cheating and plagiarism are prohibited).
Approved by: Name Date Signature
Head of
Department
Faculty Dean