Syllabus - IST 665 - Secure Networking
Basic Information
- Section: FD5
- Semester: Fall II 2020
- Hard Deadline for All Work: Friday, December 4th, 2020 at 4:30 PM EST
- This course is fully online and does not meet in person. It is also asynchronous, which means that there is no specific time that you must be online each day.
- Prerequisites: Graduate Student Standing
- Credit Hours: 3
- Course Purpose: The purpose of this course is to study applications of cryptography for securing data while in transit over a network. These topics are of critical importance to information security managers and IT professionals, since practically every application in modern use is accessed through, or accesses, some type of computer network.
- Intended Audience: Graduate Students in the Santee Cooper M.S. Information Systems Technology program
Instructor Information
Dr. Mike Murphy
Please see the About Me page for contact information, and check my Schedule for office hours information.
Catalog Description
This course is designed to equip students with applications and practice of cryptography in securing wired/wireless networks and Internet. Following techniques are studied: classical systems, symmetric block ciphers, linear and differential cryptanalysis, public-key cryptography, cryptographic protocols, hash functions, authentication, key management, key exchange, signature schemes and how it can be applied to secure network infrastructure, firewalls, digital right management, and related topics.
Course Objectives and Tentative List of Major Topics
- Review the OSI Model for understanding the layers at which network security techniques may be applied.
- Discuss security and functionality trade-offs in network design.
- Describe network access control schemes, including isolation, access filters, and authenticated access.
- Explain methods for data encryption and key management, including PSK and PKI.
- Discuss hashing and signature detection.
- Identify network security and monitoring tools that can be used to detect and mitigate threats.
Course Student Learning Outcomes
Upon successful completion of this course, students should be able to:
- Analyze and apply the methods of conventional encryption for network security.
- Apply the concepts of public key encryption/infrastructure, key management, digital signature techniques for secure networking.
- Apply cryptographic data integrity algorithms for networks and Internet security.
- Design authentication, confidentiality, integrity, availability and non-repudiation functionalities to secure networks.
- Investigate and implement network and Internet security using a layered approach.
- Evaluate, design and apply network security tools and applications.
Texts and Materials
- No textbook is required for this course.
- Readings, reference materials, tutorials, and videos will be assigned, requiring Internet access.
Grade Categories
Graded activities in this course primarily consist of assignments and quizzes. Each graded item is weighted equally.
Additional Policies and Information
The following policies and documents are incorporated into this syllabus by reference:
- My Common Course Policies
- My Online Learning Expectations
- Contingency Plan
- First Week Checklist
- Student Services Guide
Disclaimer
Portions of this course may deal with issues related to cost analysis, laws, and ethics. The instructor of this course is not a lawyer, accountant, or financial advisor, and no portion of this class constitutes legal or financial advice. This syllabus and schedule are tentative and subject to change with notice to the student during the semester. If a portion of this syllabus is found to be non-compliant with University policies or applicable laws, the remainder of this syllabus will remain effective.