0% found this document useful (0 votes)
8 views1 page

Is Outline

The Information Security course (CC-312) provides an overview of threats to information systems and the necessary tools and responsibilities for maintaining security. Key learning outcomes include understanding security concepts, discussing ethical issues, applying risk management tools, and identifying problem-solving techniques in information security. The syllabus covers topics such as cryptography, network security, and legal aspects of information security.

Uploaded by

heyumarshabbir
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views1 page

Is Outline

The Information Security course (CC-312) provides an overview of threats to information systems and the necessary tools and responsibilities for maintaining security. Key learning outcomes include understanding security concepts, discussing ethical issues, applying risk management tools, and identifying problem-solving techniques in information security. The syllabus covers topics such as cryptography, network security, and legal aspects of information security.

Uploaded by

heyumarshabbir
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Course Title Information Security

Course Code CC-312


Credit Hours 2 (2,0)
Category Computing Core
Prerequisite None
Co-Requisite None
Follow-up None
This course provides a broad overview of the threats to the security of information
systems, the responsibilities and basic tools for information security, and the levels of
Course training and expertise needed in organizations to reach and maintain a state of acceptable
Introduction security. It covers concepts and applications of system and data security. Areas of
particular focus include secure network design, implementation and transition issues, and
techniques for responding to security breaches.
At the end of the course, the students will be able to: BT PLO
CLO1: Explain key concepts of information security such as design
Course principles, cryptography, risk management, and ethics.
C2 (Explain) 1,2
Learning CLO2: Discuss legal, ethical, and professional issues in information
Outcomes C2 (Discuss) 1,2
security.
(CLOs) CLO3: Apply various security and risk management tools for achieving
information security and privacy. C3 (Apply) 3,4,5
CLO4: Identify appropriate techniques to tackle and solve problems in
the discipline of information security.
C4 (Identify) 3,4,5
Information security foundations, security design principles; security mechanisms,
symmetric and asymmetric cryptography, encryption, hash functions, digital signatures,
key management, authentication and access control; software security, vulnerabilities and
Syllabus
protections, malware, database security; network security, firewalls, intrusion detection;
security policies, policy formation and enforcement, risk assessment, cybercrime, law and
ethics in information security, privacy and anonymity of data.
Suggested 1. M. Whitman and H. Mattord, Principles of Information Security, 6th edition.
Instructional/ 2. William Stallings, Computer Security: Principles and Practice, 3rd edition.
Reading 3. Dieter Gollmann, Computer Security, 3rd edition.
Material 4. William Easttom, Computer Security Fundamentals, 3rd edition.

You might also like