Information Technology 455

I. Course Title: Applied Cryptography and Network Security

II. Course Number: ITEC 455

III. Credit Hours: 3 credits

IV. Prerequisites: ITEC 345, and either ITEC 350 or both ITEC 205 and ITEC 315.

V. Course Description: 

Threats and vulnerabilities in computer networks, cryptography and its application to network security mechanisms, secure network protocols, and network intrusion detection systems.

VI. Detailed Description of Content of the Course:

Topics include:

  1. Secret and public key cryptography.
  2. Modes of operation.
  3. Hashes and message digests.
  4. Public key infrastructure.
  5. Threats and attacks on networking infrastructure.
  6. Analyzing networking protocols for security flaws.
  7. Secure authentication protocols and security standards (e.g., Kerberos, SSL/TLS).
  8. Securing networks: defense in depth, device security, perimeter security, wireless security.
  9. Incident response.

VI. Detailed Description of Conduct of Course:

Projects that involve configuration of network security mechanisms and/or use of networking packet filters will be given. Students will also work on problems in cryptography and programming projects in Web Security.

VII. Goals and Objectives of the Course:

Students who complete the course will be able to:

  1. Identify and describe the working and application of various cryptographic algorithms and mechanisms including secret and public key cryptographic algorithms, modes of operation, hashes and message digests.
  2. Identify and describe vulnerabilities, threats and attacks on a networking infrastructure.
  3. Analyze common network protocols for security issues and describe standards such as Kerberos, public key infrastructure (PKI) and IPsec.
  4. Configure and/or apply network security controls such as firewalls, virtual private networks and intrusion detection systems.  
  5. Respond to network security incidents. 
  6. Demonstrate the ability to communicate effectively.
  7. Demonstrate the ability to work in a team based environment. 

VIII. Assessment Measures:

Evaluation may be based on several projects, problems, and at least two examinations. The instructor may also use quizzes or other assessment strategies.

 

Other Course Information: None

 

Review and Approval

September 9, 2008        New Course    Arthur Carter, Chair

April 12, 2018

March 01, 2021