Dr. Qasim Ali – Associate Professor



Mehran University of Engineering and Technology, JamshoroFRM-003/00/QSP-004 Dec, 01, 2001Tentative Teaching PlanDepartment of Software EngineeringName of TeacherDr. Qasim AliCourse NameInformation SecurityCourse CodeSW316Batch17SW-IYear3rd Semester5thSemester Start Date14th October 2019Semester End Date21 February 2020#TopicLearning OutcomeDelivery MethodLecture HoursCLOsAssessmentRemarks1Course Introduction, Three Objectives of Information Security, Three Foundations of Information Security, Classical Cryptography Learn basics of ISLecture021Class Test1AndMid Semester--2Threat Environment ,Employee, Ex-Employee ThreatBasics of Threat and AttacksLecture0213Traditional External Attacker , Malware : Virus ,Worm ,Trojan Horse Etc.Attacker information and related attacksLecture0214Hackers , Social Engineering Used By Hackers , Cryptography , Kirchhoff’s Principle Understanding Of hacking , different techniques used for HackingLecture0215One-Time Pad, Steganography, Types of CiphersDifferent Types of CryptographyLecture & Discussion0116Methods of Encryption, Symmetric & Asymmetric Cryptography Types Of Encryption , Symmetric VS AsymmetricLecture & Discussion0117Block Ciphers, Stream Ciphers,?Data Encryption Standard (DES)Algorithm associated with Cryptography Lecture & Discussion0218Triple DES (3DES),Advanced Encryption Standard (AES)Algorithm associated with Cryptography Lecture & Discussion0229Asymmetric Key Algorithms, Diffie Hellman Algorithm, RSA Algorithm, Difference between Public Key Cryptography and Public Key Infrastructure (PKI)Working of Different Security AlgorithmsLecture02210Message Authentication Codes (MAC), HMAC Example, Types of Hashing Algorithms, Digital Signatures, Digital Signature Standard (DSS)Understanding of Hashing and Digital SignaturesLecture & Discussion033Class Test2, AssignmentAndFinal exam--11Certificate Authority (CA),Certificate Revocation List (CRL),PKI Components, PKI Security Services, Kerberos Protocol, Key Management Principles,Understanding of CA and and CRLsLecture & Discussion03312Encryption vs End-to-End Encryption, Encryption at Different LayersAble to understand End to End Encryption Lecture & Discussion01113?Email Standards?,Quantum Cryptography, Internet Security, Internet ProtocolsUnderstanding of Internet Security Lecture02214Secure HTTP(S-HTTP), Secure Electronic Transaction (SET), CookiesUnderstanding of Application Layer Services like HTTPs and othersLecture01215Secure Shell (SSH), Virtual Private Networks (VPNs),IPSEC?Understanding of VPNs and IPSECLecture & Discussion02216Enterprise Network Architecture, Different Traffic Flows in the EnterpriseWorking of Enterprise networkLecture01217Implementing Security in the EnterpriseUnderstanding Security in Enterprise NetworkLecture01218Firewalls, Types of Firewalls,?Firewall Configurations and Demilitarized Zone (DMZ), Distributed FirewallsWorking principle of Firewalls and DMZLecture03219Intrusion Detection and Prevention System (IDPS),IPS Technologies, Common IPS Detection MethodologiesDifferentiate between IPS and IDPSLecture03220System and Server SecurityUnderstanding server level Security Lecture01121Web Application Security, Open Web Application Security Project (OWASP)Understanding Web SecurityLecture02122Secure SDLC,Information Security Assessments, Vulnerability ScanningLearn to find Vulnerabilities in web applications and their assessment Lecture02123Target Vulnerability Validation TechniquesLearn Vulnerability Validation schemes Lecture01124Security Features on Switches, Layer 2 Security, Types of Layer 2 Attacks, Port Level Traffic ControlsUnderstanding Layer 2 Security Lecture01125Access Control Lists on Switches, Layer 2 Security Best PracticesTo configure ACLs over switchesLecture01126Twenty Critical Security Controls, Award-winning Security ProductsTo conclude Best Practice using Information Security Lecture011 Total credit hours45SignatureSignature of TeacherDated: Remarks of DMRCDated: Signature of ChairmanDated: ................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download