• Tidak ada hasil yang ditemukan

PDF Course Plan - ZU

N/A
N/A
Protected

Academic year: 2024

Membagikan "PDF Course Plan - ZU"

Copied!
5
0
0

Teks penuh

(1)

Issue Date:11/7/2021 issue:02

ZU/QP10F004

Faculty: Information Technology

Program: Bachelor Department: Cyber Security

Semester:

Academic year:

Course Plan

First: Course Information

Credit Hours: 3 Course Title: Secure Communications Protocols

Course No.:

1506345

Lecture Time:

Section No.:

Prerequisite:

1506341

Obligatory Faculty Requirement Elective University Requirement Obligatory University Requirement Faculty Requirement

Course Elective Specialty Requirement Obligatory Specialization requiremen

t

Type Of Course:

Face-to-Face Learning

Blended Learning (2 Face-to-Face + 1Asynchronous) Online Learning (2 Synchronous+1 Asynchronous) Type of

Learning:

Second: Instructor’s Information

Academic Rank:

Name:

E-mail:

Ext. Number:

Office Number:

Thursday Wednesday

Tuesday Monday

Sunday Office Hours:

Third: Course Description

The aim of this course is to give students a basic knowledge of several security protocols used in the cybersecurity industry. In particular, it introduces the protocol concept in general. It revises the OSI Model protocols and TCP/IP Model protocols. A number of security protocols are then discussed in detail which is related to the network layers, in general. Other Authentications protocols will also be discussed.

Moreover, some protocols will be discussed which are specific for cloud-based communications,

multimedia streaming, mobile communications, and wireless networks security. Some of the protocols

which will be discussed in this course are Secure Sockets Layer/ Transport Layer Security (SSL/TLS),

Datagram Transport Layer Security (DTLS), Secure Shell Protocol (SSH), IPSec, Host Intrusion

Prevention (HIP), Extensible Authentication Protocol (EAP), Remote Authentication Dial-In User Service

(RADIUS), OpenID, OAuth, Single Sign-On (SSO), and Security Assertion Markup Language (SAML).

(2)

Issue Date:11/7/2021 issue:02

ZU/QP10F004

Fourth: Learning Source

Design and Analysis of Security Protocol for Communication

Main Reference:

Publication Year: 2020 Issue No.: First Edition.

Authors: Dinesh Goyal, S.

Balamurugan, Sheng-Lung Peng and O.P. Verma

 Communication System Security, 1

st

Edition, Lidong Chen and Guang Gong, Taylor & Francis Group, 2012.

 Introduction to Network Security: Theory and Practice, 2

nd

Edition, Jie Wang Zachary A. Kissel, Wiley, 2015.

 Information security principles and practices, 2

nd

Edition, Mark S. Merkow and Jim Breithaupt, Pearson IT Certification, 2014.

 Data Communications and Networking, 5th edition, Behrouz A. Forouzan, McGraw-Hill Education, 2013.

Additional Sources

&Websites:

Classroom Laboratory Workshop MS Teams Moodle Teaching Type:

Fifth: Learning Outcomes

Connection to Program ILOs

Code Course Intended Learning Outcomes (CILOs)

Course Code

Knowledge

*PK1

Discuss the basics of network security.

**K1

Identify the basic knowledge of protocol concepts, OSI Model protocols,

PK1

and TCP/IP Model protocols.

K2

PK2, PK3

List knowledge of concepts, terminology, and principles of different security protocols.

K3

Skills

Apply different protocols to secure wired and wireless communication.

PS1

***S1

Distinguish the strength and weaknesses points of different security

PS1

protocols.

S2

Determining the proper security protocol to be applied based on the

PS1

vulnerabilities and sources of attack and intrusion.

S3

Competencies

Demonstrate skills in problem-solving and decision-making regarding

PC1

security issues.

****C1

Prove the ability to research, analyze and critically evaluate different

PC3

security protocols.

C2

Signify teamwork's capability to express and communicate ideas in written

PC2

and oral forms.

C3

* P: Program, **K: knowledge, ***S: skills, ****C: competencies.

(3)

Issue Date:11/7/2021 issue:02

ZU/QP10F004

Sixth: Course Structure

References***

Teaching Methods***

Teaching Procedures*

Topics Intended

Teaching Outcomes

(ILOs) Lecture Date

--- ---

Face-to-Face Syllabus Overview

--- Week 1

Textbook, slides Lecture,

In-class Questions Face-to-Face

Introduction to Network Security K1

Textbook, slides Lecture,

In-class Questions Face-to-Face

Introduction to Network Security K1

Textbook, slides Lecture,

In-class Questions Face-to-Face

Introduction to Network Security K1

Week 2 Textbook,

slides Lecture,

In-class Questions Face-to-Face

Introduction to OSI Model and Protocols

K2

Textbook, slides Lecture,

In-class Questions Face-to-Face

Introduction to OSI Model and Protocols

K2

Textbook, slides Lecture,

In-class Questions Face-to-Face

Introduction to TCP/IP Model and Protocols

K2

Week 3 Textbook,

slides Lecture,

In-class Questions Face-to-Face

Introduction to TCP/IP Model and Protocols

K2

Textbook, slides Lecture,

In-class Questions Face-to-Face

Network Security Protocols (Application Layer) K3, S1, S2,

S3, C1

Textbook, slides Lecture,

In-class Questions Face-to-Face

Network Security Protocols (Application Layer) K3, S1, S2,

S3, C1

Week 4 Textbook,

slides Lecture,

In-class Questions Face-to-Face

Network Security Protocols (Application Layer) K3, S1, S2,

S3, C1

Textbook, slides Lecture,

In-class Questions Face-to-Face

Network Security Protocols (Transport Layer)

K3, S1, S2, S3, C1

Textbook, slides Lecture,

In-class Questions Face-to-Face

Network Security Protocols (Transport Layer)

K3, S1, S2, S3, C1

Week 5 Textbook,

slides Lecture,

In-class Questions Face-to-Face

Network Security Protocols (Transport Layer)

K3, S1, S2, S3, C1

Textbook, slides Lecture,

In-class Questions Face-to-Face

Network Security Protocols (Data Link Layer)

K3, S1, S2, S3, C1

Textbook, slides Lecture,

In-class Face-to-Face

Network Security Protocols (Data Link Layer)

K3, S1, S2, S3, C1 Week 6

(4)

Issue Date:11/7/2021 issue:02

ZU/QP10F004

Questions

Textbook, slides Lecture,

In-class Questions Face-to-Face

Network Security Protocols (Data Link Layer)

K3, S1, S2, S3, C1

Textbook, slides Lecture,

In-class Questions Face-to-Face

Midterm Exam Recap K1, K2, K3,

S1, S2, S3, C1

Textbook, slides Lecture,

In-class Questions Face-to-Face

Types of Authentication

Protocols (Remote Authentication Dial-In User Service)

K3, S1, S2, S3, C1

Week 7 Textbook,

slides Lecture,

In-class Questions Face-to-Face

Types of Authentication Protocols (Remote

Authentication Dial-In User Service)

K3, S1, S2, S3, C1

Textbook, slides Lecture,

In-class Questions Face-to-Face

Types of Authentication Protocols (Kerberos) K3, S1, S2,

S3, C1

Textbook, slides Lecture,

In-class Questions Face-to-Face

Types of Authentication Protocols (Kerberos) K3, S1, S2,

S3, C1 Week 8

Textbook, slides Lecture,

In-class Questions Face-to-Face

Types of Authentication Protocols (OpenID, OAuth) K3, S1, S2,

S3, C1

Week 9

Textbook, slides Lecture,

In-class Questions Face-to-Face

Types of Authentication Protocols (OpenID, OAuth) K3, S1, S2,

S3, C1

Textbook, slides Lecture,

In-class Questions Face-to-Face

Types of Authentication Protocols (Light-Weight Directory Access Protocol (LDAP))

K3, S1, S2, S3, C1

Textbook, slides Lecture,

In-class Questions Face-to-Face

Types of Authentication Protocols (Light-Weight Directory Access Protocol (LDAP))

K3, S1, S2, S3, C1

Week 10 Textbook,

slides Lecture,

In-class Questions Face-to-Face

Types of Authentication Protocols (Security Assertion Markup Language (SAML)) K3, S1, S2,

S3, C1

Textbook, slides Lecture,

In-class Questions Face-to-Face

Types of Authentication Protocols (Security Assertion Markup Language (SAML))

K3, S1, S2, S3, C1

Textbook, slides Lecture,

In-class Questions Face-to-Face

Types of Authentication Protocols (Extensible

Authentication Protocol (EAP) K3, S1, S2,

S3, C1

Week 11 Textbook,

slides Lecture,

In-class Questions Face-to-Face

Types of Authentication Protocols (Extensible

Authentication Protocol (EAP) K3, S1, S2,

S3, C1

Textbook, slides Lecture,

In-class Questions Face-to-Face

Security Protocols for Mobile Communications

K3, S1, S2, S3, C1

Textbook, slides Lecture,

In-class Questions Face-to-Face

Security Protocols for Mobile Communications

K3, S1, S2, S3, C1 Week 12

Textbook, slides Lecture,

In-class Questions Face-to-Face

Security Protocol for Cloud- Based Communication K3, S1, S2,

S3, C1

(5)

Issue Date:11/7/2021 issue:02

ZU/QP10F004

Independence Day Holiday 25/05/2023

Textbook, slides Lecture,

In-class Questions Face-to-Face

Security Protocol for Cloud- Based Communication K3, S1, S2,

S3, C1

Week 13 Textbook,

slides Lecture,

In-class Questions Face-to-Face

Security Protocol for Multimedia Streaming K3, S1, S2,

S3, C1

Textbook, slides Lecture,

In-class Questions Face-to-Face

Security Protocol for Multimedia Streaming K3, S1, S2,

S3, C1

Textbook, slides Lecture,

In-class Questions Face-to-Face

Wireless Network Security K3, S1, S2,

S3, C1

Week 14 Textbook,

slides Lecture,

In-class Questions Face-to-Face

Students’ Projects Presentation K1, K2, K3,

S1, S2, S3, C1, C2, C3

--- Presentations

Face-to-Face Final Exam Recap

K1, K2, K3, S1, S2, S3,

C1

* Learning procedures: (Face-to-Face, synchronous, asynchronous). * * Teaching methods: (Lecture, video….). ** * Reference: (Pages of the book, recorded lecture, video….).

Seventh: Assessment methods

Methods Face-To-Face Learning

Measurable Course (ILOs) Mid Exam 35

K1, K2, K3, S1, S2, S3, C1

Participation 15

K1, K2, K3, S1, S2, S3, C1, C2, C3

Final Exam 50

K1, K2, K3, S1, S2, S3, C1

Eighth: Course Policies

 All course policies are applied to all teaching patterns (online, blended, and face-to-face Learning) as follows:

a. Punctuality.

b. Participation and interaction.

c. Attendance and exams.

 Academic integrity: (cheating and plagiarism are prohibited).

Approved by: Name Date Signature

Head of

Department

Faculty Dean

Referensi

Dokumen terkait

Issue Date:11/7/2021 issue:02 ZU/QP10F004 1D 1E Organizing and coordinating marketing activities face to face Lecture Pages of the book 2A 1E Asynchronous 2E

Issue Date:11/7/2021 issue:02 ZU/QP10F004 Fourth: Learning Source Python Deep Learning Designated Book: Year: 2019 Print: Second Edition, Author: Ivan Vasilev  Ian Goodfellow

Issue Date:11/7/2021 issue:02 ZU/QP10F004 Fourth: Learning Source Big Data Science and Analytics Main Reference: Publication Year: 2019 Issue No.: 1st edition Authors:

1506445 Lecture Time: Section No.: Prerequisite: 1506341 Obligatory Faculty Requirement Elective University Requirement Obligatory University Requirement