Back to Modules
CS441

Network Security

1 CreditsTerm 2

Description

Built on the foundation of the Information Security and Trust course (IS302), this course draws on hard-won experience to explain the latest developments in security protocols, network security, web security, application security and industrial standards. Classroom instruction and discussion will closely integrate technical principles with real world applications such as secure e-banking, secure corporate networking, secure messaging in healthcare environment and multimedia system security. In addition, case studies will be used to demonstrate that security and trust are not only for protection of information assets, but also means of improving business operation or even starting new businesses. Besides the textbook knowledge, this course also brings to the classroom security practices in industries, e.g. Microsoft, and government agencies (e.g IRAS and CSIT).

Requisites

Prerequisites: IS302/IS443/CS440 - Pre-req

Co-requisites: None

Anti-requisites: None

Attributes

Department: SCIS

Course Level: Undergraduate

Tracks: CS/IS: Cybersecurity Track

Areas: Advanced Business Technology Major Business Options Econ Major Rel/Econ Options IS Depth Electives Social Sciences/PLE Major-related Technology & Entrepreneurship

Learning Outcomes

i) Understand the importance of randomness in cyberspace security ii) Apply cryptographic theory on network protocols iii) Classify and compare network attacks in different layers iv) Experiment with network attacks on Linux platform v) Understand different authentication techniques including security requirements and limitations. vi) Understand threats on privacy and techniques to protect privacy in cyberspace vii) Understand techniques used to detect and defend against network attacks viii) Experiment with Firewall and Intrusion Detection Systems to detect and defend against network attacks. ix) Evaluate the security strengths of various anonymous network communication techniques. x) Understand the techniques used to protect network communication confidentiality and integrity. xi) Evaluate the security strengths of SSL and VPN in different operation modes.

Graduate Learning Outcomes

Disciplinary Knowledge, Critical thinking & problem solving

Competencies

Security Architecture, Solution Architecture, Systems Design, Network Security, Research