CSCI 4520


None
Course Number:
CSCI 4520

Approved Starting Semester:
Fall 2021

Course Title:
Network Security

Credit Hours:
3

Course Description (Bulletin Description):
An examination of the tools techniques, and technologies used in the securing of information assets via networks. Topics covered include network operating system security, security of transmissions, firewall configurations, vulnerabilities and hardening of network components. Web and distributed system security, and procedures dealing with storage and disposition of sensitive data.

Prerequisite:
CSCI 2700

Co-requisite:
None

Pre/Co-requisite::
None

Dual-Listed:
None

Course Objectives (Course-level Student Learning Outcomes):
At the completion of the course, the student will be able to: Define basic computer and network security principles. 1. Describe basic network security principles and the types of security threats attacks that must be dealt with. 2. Explain the techniques to increase network's security including cryptography, authentication, authorization and access control. 3. Evaluate applied cryptography techniques including symmetric ciphers, public encryption, hash functions, and digital signatures. 4. Explain mutual trust methods including key distribution and user authentication protocols. 5. Understand how applications can communicate securely and the protocols exist in order to offer different levels of security. 6. Explain network and Internet security techniques including transport security and IP security. 7. Summarize the functionality of e-mail security protocols and the security threats addressed. 8. Apply security tools to access network’s security and establish processes to test penetration.

Topics Covered (In Outline/Calendar):
Security attacks, security services, symmetric encryption, pubic key encryption, hash functions, digital signatures, key distribution and user authentication, network access control, transport-level security, electronic email security, IP security.

Student Learning Outcomes:
  • Analyze a complex computing problem and to apply principles of computing and other relevant disciplines to identify solutions. (SLO1)
  • Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program’s discipline. (SLO2)
  • Support the delivery, use, and management of information systems within an information systems environment. (SLO6-CIS)
  • Use systemic approaches to select, develop, apply, integrate, and administer secure computing technologies to accomplish user goals. (SLO6-CIT)
Course Coordinator:
Dr. Yingbing Yu

Instructor-in-charge:
Dr. Yingbing Yu

Previous Professors:
Dr. Yingbing Yu

Technologies / Skills:
Network security theories

Textbook(s):
Spring/Summer 2025
---------------------------------
Title: NETWORK SECURITY ESSENTIALS: APPLICATION AND STANDARDS
Edition: 6TH
Author: STALLLINGS
Publisher: PEARSON
ISBN: 9780134527338
---------------------------------
Title: Kali Linux Penetration Testing Bible
Edition: 1ST
Author: Gus Khawaja
Publisher: Wiley
ISBN: 9781119719083
========================================


Go back to choose another course