0% found this document useful (0 votes)
270 views1 page

Information Security Course Outline

This 3 credit hour course on information security provides students with an understanding of key concepts like cryptography, risk management, and ethics. Students will discuss legal and professional issues, and apply security and risk management tools. The course aims to help students identify techniques for solving problems in information security. Topics covered include security foundations, mechanisms, policies, intrusion detection, and privacy. The course uses lectures, assignments, projects, and exams for assessment.

Uploaded by

ayesha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
270 views1 page

Information Security Course Outline

This 3 credit hour course on information security provides students with an understanding of key concepts like cryptography, risk management, and ethics. Students will discuss legal and professional issues, and apply security and risk management tools. The course aims to help students identify techniques for solving problems in information security. Topics covered include security foundations, mechanisms, policies, intrusion detection, and privacy. The course uses lectures, assignments, projects, and exams for assessment.

Uploaded by

ayesha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Information Security

ADP CS (Semester-IV)
Credit Hours: 3+0 Prerequisites: None
Course Learning Outcomes (CLOs):
At the end of the course the students will be able to: Domain BT Level*
1. Explain key concepts of information security such as
design principles, cryptography, risk management, and C 2
ethics
2. Discuss legal, ethical, and professional issues in
A 2
information security.
3. Apply various security and risk management tools for
C 3
achieving information security and privacy.
4. Identify appropriate techniques to tackle and solve
C 4
problems in the discipline of information security.
* BT= Bloom’s Taxonomy, C=Cognitive domain, P=Psychomotor domain, A=
Affective domain
Course Content:

Information security foundations, security design principles; security mechanisms,


symmetric and asymmetric cryptography, encryption, hash functions, digital signatures,
key management, authentication and access control; software security, vulnerabilities
and protections, malware, database security; network security, firewalls, intrusion
detection; security policies, policy formation and enforcement, risk assessment,
cybercrime, law and ethics in information security, privacy and anonymity of data.
Teaching Methodology:

Lectures, Written Assignments, Semester Project, Presentations

Course Assessment:

Sessional Exam, Home Assignments, Quizzes, Project, Presentations, Final Exam

Reference Materials:

1. Computer Security: Principles and Practice, 3rd edition by William Stallings


2. Principles of Information Security, 6th edition by M. Whitman and H. Mattord
3. Computer Security, 3rd edition by Dieter Gollmann
4. Computer Security Fundamentals, 3rd edition by William Easttom
5. Official (ISC)2 Guide to the CISSP CBK, 3rd edition

You might also like