Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
4 views7 pages

Course Specification Security

Uploaded by

Basma Oueslati
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views7 pages

Course Specification Security

Uploaded by

Basma Oueslati
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Course Title: Computer systems Security

Course Code: 502459-3

Program: Bachelor in Computer Science

Department: Department of Computer Science

College: College of Computers and Information Technology

Institution: Taif University

Version: 1

Last Revision Date: 01-02-2024


Table of Contents
A. General information about the course: ...................................................................................................... 3
B. Course Learning Outcomes (CLOs), Teaching Strategies and Assessment Methods.................................. 4
C. Course Content............................................................................................................................................. 5
D. Students Assessment Activities ................................................................................................................... 5
E. Learning Resources and Facilities ................................................................................................................ 6
F. Assessment of Course Quality...................................................................................................................... 6
G. Specification Approval ................................................................................................................................. 7

2
A. General information about the course:

1. Course Identification
1. Credit hours: ( 3 )

2. Course type
A. ☐ University ☒ College ☐ Department ☐ Track ☐ Others
B. ☒ Required ☐ Elective
3. Level/year at which this course is offered: (10th Level/ 5th year)
4. Course general Description:
This course introduces the basic security attacks against computer systems and the
different techniques to overcome these attacks. Besides, this course explains the
different modern encryption mechanisms and protocols (including symmetric and
public key cryptography). Moreover, it examines the different security services such
as authentication and access control. Finally, this course introduces an overview to
network security and the tools used to secure networks such as the firewall, proxy
and intrusion detection systems. Students will learn about tools for defending
against attacks, and methods for designing secure systems
5. Pre-requirements for this course (if any):
503442-3 Computer networks

6. Co-requirements for this course (if any):


None

7. Course Main Objective(s):


● The objective of this course is to cover principles of computer and network
security along with some relevant background in basic cryptography. We will
discuss various attack techniques and how to defend against them. After
completing this course, students will be able to analyze, design, and build secure
systems of moderate complexity.

3
2. Teaching mode (mark all that apply)
No Mode of Instruction Contact Hours Percentage
1 Traditional classroom 5 100%
2 E-learning - -
Hybrid
3 ● Traditional classroom - -
● E-learning
4 Distance learning - -

3. Contact Hours (based on the academic semester)


No Activity Contact Hours
1. Lectures 45
2. Laboratory/Studio 30
3. Field -
4. Tutorial -
5. Others (specify) -
Total 75

B. Course Learning Outcomes (CLOs), Teaching Strategies and Assessment


Methods

Code of
CLOs
Teaching Assessment
Code Course Learning Outcomes aligned
Strategies Methods
with
program
1.0 Knowledge and understanding
Ability to understand and Direct Assessment Tool
Lecture Written Exams/
contrast most existing threads,
1.1 K1 Discussion Assignments/ Practical Exam
attacks and vulnerabilities of a Indirect Assessment Tool
Lab work
computer system. Course Exit Survey
2.0 Skills
Direct Assessment Tool
Ability to use the appropriate Lecture
2.1 S1 Written Exams/
cryptographic methods and Discussion Assignments/ Practical Exam

4
Code of
CLOs
Teaching Assessment
Code Course Learning Outcomes aligned
Strategies Methods
with
program
techniques to protect local and Lab work Indirect Assessment Tool
Course Exit Survey
communicated data.
Ability to use existing security Direct Assessment Tool
Lecture Written Exams/
services and techniques to
2.2 S2 Discussion Assignments/ Practical Exam
design a secure computer Indirect Assessment Tool
Lab work
system. Course Exit Survey

3.0 Values, autonomy, and responsibility


3.1 - - - -

C. Course Content
No List of Topics Contact Hours
1. Introduction to computer security 3
2. Malware 3
3. Cryptographic Tools and encryption methods 3
4. Symmetric cryptography encryption methods 5
5. Public-Key Cryptography and Message Authentication 6
6. User Authentication 3
7. Access Control methods 4
8. Web Security: Vulnerabilities, Attacks, and Countermeasures 6
9. Networks security 9
10. Physical and Infrastructure security 3
Total 45

D. Students Assessment Activities

Assessment
Percentage of Total
No Assessment Activities * timing
Assessment Score
(in week no)
1. Assignments 5,12 5%
2. Mid Exam 7 20%
3. Minor project 13 10%
4. Final presentation 13 5%
5. Labs 14 20%
6. Final Exam 16 40%
*Assessment Activities (i.e., Written test, oral test, oral presentation, group project, essay, etc.).

5
E. Learning Resources and Facilities

1. References and Learning Resources


Essential References William Stallings, Lawrie Brown, "Computer Security: Principles
and Practice", Prentice Hall, Fifth edition.Pearson Education, 2023
CompTIA Security+ Review Guide: Exam SY0-501
Supportive References James Michael Stewart
ISBN: 978-1-119-41694-4
Electronic Materials Presentations and recorded lectures
Useful web links
Other Learning Materials
Resources for security certification training

2. Required Facilities and equipment


Items Resources
● A Lecture room appropriate for maximum 25
students with a personal computer, a data
facilities
show and a smart board.
(Classrooms, laboratories, exhibition rooms,
● A Lab room appropriate for maximum 15
simulation rooms, etc.)
students with a personal computer, a data
show and a smart board.
Technology equipment
● Lab materials and required software
(projector, smart board, software)
Other equipment -
(depending on the nature of the specialty)

F. Assessment of Course Quality


Assessment Areas/Issues Assessor Assessment Methods
● Course exit survey
● Feedback from Faculty
● Students
members
● Faculty members
● Feedback from Course
Effectiveness of teaching ● Coordinator
Coordinator
● Council
● Feedback from council
● Curriculum Committees
● Feedback from Curriculum
Committees
● deficiencies based on the
student Evaluation, faculty
Improvement of Teaching ● Course Coordinator
input, course file, and
program assessment
● Students ● Course exit survey
Effectiveness of
● Faculty members ● Feedback from Faculty
Students assessment
● Coordinator members

6
Assessment Areas/Issues Assessor Assessment Methods
● Council ● Feedback from Course
● Curriculum Committees Coordinator
● Feedback from council
● Feedback from Curriculum
Committees
● Course exit survey
● Feedback from Faculty
● Students
members
● Faculty members
● Feedback from Course
Quality of learning resources ● Coordinator
Coordinator
● Council
● Feedback from council
● Curriculum Committees
● Feedback from Curriculum
Committees
● Course exit survey
● Feedback from Faculty
● Students
members
● Faculty members
The extent to which CLOs ● Feedback from Course
● Coordinator
have been achieved Coordinator
● Council
● Feedback from council
● Curriculum Committees
● Feedback from Curriculum
Committees
● Review CAF (Course
assessment file)
Verifying Standards of ● Curriculum Committee ● Alumni surveys.
Student Achievement
Periodic exchange and remarking
of tests or a sample of
assignments with staff at another
Assessors (Students, Faculty, Program Leaders, Peer Reviewer, Others (specify)
Assessment Methods (Direct, Indirect)

G. Specification Approval
Council /Committee CS Council

Reference No. Meeting #11

Date 07/03/2024

You might also like