Week |
Subject |
Related Preparation |
1) |
Introduction to security and examination of security concepts |
Cryptography and Network Security (4th Edition) Principles and Practices, William Stallings
Network Security Essentials: Applications and Standards (3rd Edition), William Stallings
Network Security: Private Communication in a Public World (2nd Edition), Charlie Kaufman |
2) |
Overview of the elements that make up security |
Cryptography and Network Security (4th Edition) Principles and Practices, William Stallings
Network Security Essentials: Applications and Standards (3rd Edition), William Stallings
Network Security: Private Communication in a Public World (2nd Edition), Charlie Kaufman |
3) |
Overview of the elements that make up security |
Cryptography and Network Security (4th Edition) Principles and Practices, William Stallings
Network Security Essentials: Applications and Standards (3rd Edition), William Stallings
Network Security: Private Communication in a Public World (2nd Edition), Charlie Kaufman |
4) |
Cryptography and its place in security |
Cryptography and Network Security (4th Edition) Principles and Practices, William Stallings
Network Security Essentials: Applications and Standards (3rd Edition), William Stallings
Network Security: Private Communication in a Public World (2nd Edition), Charlie Kaufman |
5) |
Cryptography and its place in security |
Cryptography and Network Security (4th Edition) Principles and Practices, William Stallings
Network Security Essentials: Applications and Standards (3rd Edition), William Stallings
Network Security: Private Communication in a Public World (2nd Edition), Charlie Kaufman |
6) |
Network security |
Cryptography and Network Security (4th Edition) Principles and Practices, William Stallings
Network Security Essentials: Applications and Standards (3rd Edition), William Stallings
Network Security: Private Communication in a Public World (2nd Edition), Charlie Kaufman |
7) |
Operating systems security |
Cryptography and Network Security (4th Edition) Principles and Practices, William Stallings
Network Security Essentials: Applications and Standards (3rd Edition), William Stallings
Network Security: Private Communication in a Public World (2nd Edition), Charlie Kaufman |
8) |
Midterm |
|
9) |
Web application security |
Cryptography and Network Security (4th Edition) Principles and Practices, William Stallings
Network Security Essentials: Applications and Standards (3rd Edition), William Stallings
Network Security: Private Communication in a Public World (2nd Edition), Charlie Kaufman |
10) |
Web application security |
Cryptography and Network Security (4th Edition) Principles and Practices, William Stallings
Network Security Essentials: Applications and Standards (3rd Edition), William Stallings
Network Security: Private Communication in a Public World (2nd Edition), Charlie Kaufman |
11) |
Security in identity management |
Cryptography and Network Security (4th Edition) Principles and Practices, William Stallings
Network Security Essentials: Applications and Standards (3rd Edition), William Stallings
Network Security: Private Communication in a Public World (2nd Edition), Charlie Kaufman |
12) |
Compliance and certification |
Cryptography and Network Security (4th Edition) Principles and Practices, William Stallings
Network Security Essentials: Applications and Standards (3rd Edition), William Stallings
Network Security: Private Communication in a Public World (2nd Edition), Charlie Kaufman |
13) |
Security Reviews |
Cryptography and Network Security (4th Edition) Principles and Practices, William Stallings
Network Security Essentials: Applications and Standards (3rd Edition), William Stallings
Network Security: Private Communication in a Public World (2nd Edition), Charlie Kaufman |
14) |
Student Presentations |
Cryptography and Network Security (4th Edition) Principles and Practices, William Stallings
Network Security Essentials: Applications and Standards (3rd Edition), William Stallings
Network Security: Private Communication in a Public World (2nd Edition), Charlie Kaufman |
15) |
Final |
|
|
Program Outcomes |
Level of Contribution |
1) |
PO 1.1) Sufficient knowledge in mathematics, science and computer engineering |
|
2) |
PO 1.2) Ability to apply theoretical and applied knowledge in mathematics, science and computer engineering for modeling and solving engineering problems. |
|
3) |
PO 2.1) Identifying complex engineering problems |
|
4) |
PO 2.2) Defining complex engineering problems |
5 |
5) |
PO 2.3) Formulating complex engineering problems |
|
6) |
PO 2.4) Ability to solve complex engineering problems |
|
7) |
PO 2.5) Ability to choose and apply appropriate analysis and modeling methods |
|
8) |
PO 3.1) Ability to design a complex system, process, device or product to meet specific requirements under realistic constraints and conditions. |
|
9) |
PO 3.2) Ability to apply modern design methods under realistic constraints and conditions for a complex system, process, device or product |
|
10) |
PO 4.1) Developing modern techniques and tools necessary for the analysis and solution of complex problems encountered in engineering applications |
|
11) |
PO 4.2) Ability to select and use modern techniques and tools necessary for the analysis and solution of complex problems encountered in engineering applications |
|
12) |
PO 4.3) Ability to use information technologies effectively. |
|
13) |
PO 5.1) Examination of complex engineering problems or discipline-specific research topics, designing experiments |
|
14) |
PO 5.2) Examination of complex engineering problems or discipline-specific research topics, experimentation |
|
15) |
PO 5.3 ) Analysis of complex engineering problems or discipline-specific research topics, data collection |
|
16) |
PO 5.4) Analyzing the results of complex engineering problems or discipline-specific research topics |
|
17) |
PO 5.5) Examining and interpreting complex engineering problems or discipline-specific research topics |
|