By the end of this course, students will be able to build mechanically resilient networks, with advanced modern copper, wireless, and optical media technologies and laying techniques, and mechanisms to make them resilient to wiretapping, crosstalk, jamming, disasters, wildlife, and nature, explain concepts related to applied cryptography, including plaintext, cipher text, symmetric cryptography, asymmetric cryptography, and digital signatures, explain the theory behind the security of different cryptographic algorithms, explain common network vulnerabilities and attacks, security weakness, defense mechanisms against network attacks, and reporting mechanisms, outline the requirements and mechanisms for identification and authentication, identify the possible threats to each mechanism and ways to protect against these threats, explain the requirements of real-time communication security and issues related to the security of network and web services and Explain the requirements of non-real time security (email security), documentation security and ways to provide privacy, source authentication, message integrity, non-repudiation, proof of submission, and proof of delivery, message flow confidentiality, and anonymity.
Course ID: CYS 406
Credit hours | Theory | Practical | Laboratory | Lecture | Studio | Contact hours | Pre-requisite | 3 | - | CYS 307 |
---|