Skip to document

CSE 210 Syllabus AD Section 22 66

Course

Computer and Network Security (ECC4703)

68 Documents
Students shared 68 documents in this course
Academic year: 2020/2021
Uploaded by:
350Uploads
130upvotes

Comments

Please sign in or register to post comments.

Preview text

College of Engineering

Course Syllabus

Cybersecurity Program Spring 20-21 Semester

Course Name: Introduction to Cybersecurity Engineering Course Code: CSE 210 Course Pre-requisites: ECT Course Co-requisites: Credit hours: 3

Instructor’s Name: Abid Mehmood Telephone: 025015785 E-mail: Abid@adu.ac Class Location: Online Class Time: SuTu 04:45 – 06:15 pm Office Location: U2F89 Office Hours: SuTu 12:30 – 02:00 pm

1. Course Description

This course will provide a basic introduction to of all aspects of cybersecurity including business, policy and procedures, communications security, network security, security management, legal issues, political issues, and technical issues. This course introduces students to cryptography, security management, organizational policy, network security, software security, operating system security and database security. It covers all processes from risk analysis, engineering security requirements, malware analysis to anticipate future vulnerabilities, and planning ongoing improvements. The course will initiate students to the basic concepts and terminology of cybersecurity, standards, and how cyber security is commonly addressed during different phases. It will help the students build up an understanding of how to integrate cyber security tools/techniques and best practices in the design processes of systems engineering.

2. Learning Outcomes

Expected Learning Outcomes and Associated Assessment Tools

Course Learning Outcome Assessment Tool(s)* Determine the levels of protection and response to security incidents Assignment 1, Quiz 1 Perform inspection and protection of information assets Lab 1, Final Project Identify the spectrum of security activities, methods, methodologies, and procedures Assignment 2 Understand the nature of secure software development, operating systems, and data base design Midterm, Lab 1 Understand the legal and ethical aspects of cybersecurity Quiz 2, Lab 2 Work in a team and communicate to audience effectively Final Project *Please note that the assessment tool(s) are to be used in assessing the course learning outcomes.

3. Weekly Outline

Week Topics Assessments Readings (Textbook) 1 Introduction to Cybersecurity

  • The need for Cybersecurity
  • Personal Data and Organizational data
  • The impact of a breach
  • The profile of a cyber attacker

Cisco (Intro to cybersecurity CH - 1)

2 Attacks concepts and techniques - Goals of Cybersecurity - Building an effective Cybersecurity system - Security vulnerabilities and exploits - Types of security vulnerabilities - Types of malwares and symptoms

Assignment 1 Cisco (Intro to cybersecurity CH - 2)

3-4 Introduction to Cryptography - Protecting your devices and network - Public and private key cryptography - Hashing

Lab 1 (Password Cracking) Quiz 1

Cisco (Intro to cybersecurity CH - 3)

5 IT Security Management and risk assessment - Asset Identification - Identification of Threats/Risks/Vulnerabilities - Analyze Risks - Determine Consequence/Impact on Organization - Documenting the Results in a Risk Register

Chapter 14

6-7 IT Security Controls Plans and Procedures - Control Classification - IT Security Plan - Security Plan and Implementation - Security Compliance

Chapter 15

8 Intrusion detection system - Detecting attacks in real time - Protecting against malware - Tools for incident protection and detection

Midterm Exams

Cisco (Intro to cybersecurity CH - 4)

9 Database Security - The need for database security - Database management systems

Lab 2 (SQL Injection Attacks)

Chapter 5

  • Introduction to Cybersecurity by Cisco Network Academy
  • Raef Meeuwisse. (2017). Cybersecurity for Beginners, 2nd Edition, Cyber Simplicity Ltd.
  • Nancy R. Mead and Carol Woody (2017). Cyber Security Engineering: A Practical Approach for Systems and Software Assurance, 1st Ed, Addison-Wesley.

6. Assessment of Student Learning

Assessment Tool Percent Description Assignments 20% Used to test students’ ability to apply the theory to practical tasks relating to risk analysis and the design of secure software systems Labs 20% Used to practice cyber security engineering knowledge, skills, and best practices in a realistic development environment Final Project 15% Students will be required to work in a team and practice cyber security engineering knowledge, skills, and best practices in a realistic development environment Quizzes 10% Used to progressively assess the students’ understanding of the course material Midterm Exam 10% Will examine students’ understanding of all course material midway through the course Final Exam 25% Will examine students’ understanding of all course material on completion of the course

7. Grading Key

Grade Percentage Grade Point A 90-100 4 B+ 85-89 3. B 80-84 3 C+ 75-79 2. C 70-74 2 D+ 65-69 1. D 60-64 1 F Less than 60 0. I N/A 0.

8. Attendance

For all students, absence is marked at a maximum of 30% of total class time. Final dismissals (WA) will be posted on the student’s academic record. The calculation of the absence percentage is based on the total number of class meetings, regardless of the length of the meetings. For example, if a class meets once a week for 15 weeks, then a student would need 5 absences to reach the 30% threshold.

Students will be considered absent if they do not arrive on time for a lesson. Taking attendance will start on the first day of classes and will continue until the last day of classes in the semester.

Final Dismissal will not be waived under any circumstances. The Registrar's Office will accept excuses only from students missing an exam/major assignment due to absence. Students will be permitted to take a make-up exam if its weight is at least 10%ofthe course total mark upon approval

of a legitimate excuse.

Exams/Tests will be repeated when serious reasons similar to the following take place and documented evidence are submitted to the Office of the Registrar on the day student returns to class. - Hospitalization, - Contagious Disease, - Death, may God forbid, of an immediate family member (father, mother, sibling, husband, son, daughter, grandparent), - Car Accident, - Job Requirement (special assignment), with prior written approval from the Office of the Registrar - Al Haj

Al Umra

Al Umra trips are not valid excuses for students to be absent.

In the case of excused absence for a final exam, the student has to apply for an Incomplete (I) grade at the Office of the Registrar within 48 hours of the exam.

9. Academic Integrity

The mission of ADU includes developing students’ sense of ethics, morality, and social responsibility. Students at ADU have the fundamental obligation to conduct themselves with utmost integrity. To ensure an education environment characterized with Academic integrity (AI), ADU has revised its Academic Integrity Policy (AIP).

The revised Academic Integrity Policy (AIP) – copies available on the intranet under the link of the Office of Academic Integrity (OAI) – has identified violations of AI punishable by serious penalties, including “dismissal” from ADU. The types of violations identified in AIP, along with the description and examples of each violation, are: 1. Cheating 2. Plagiarism 3. Fabrication of data 4. Presenting false credentials 5. Collusion 6. Free Riding

At the beginning of each semester, your instructor will review the essential elements of AIP in class and will describe the intrinsic values of compliance, and the consequences of non-compliance (i., penalties) with the Policy. In addition, OAI undertakes a widespread AI Awareness Campaign at the beginning of each semester to educate students about AI issues and the ways students can avoid violations.

In view of resources provided by ADU in this regard, all students are expected to strictly comply with the tenet of AIP and conduct themselves with highest degree of integrity and ethical conduct. Students in need of additional information or assistance are requested to seek help from OAI. Failure to comply with the provisions of AIP will have severe consequences, including “dismissal” from ADU.

Software plagiarism detection software Measure of Software Similarity (MOSS) will be used on coding assignments, labs, and projects.

Was this document helpful?

CSE 210 Syllabus AD Section 22 66

Course: Computer and Network Security (ECC4703)

68 Documents
Students shared 68 documents in this course
Was this document helpful?
1
College of Engineering
Course Syllabus
Cybersecurity Program
Spring 20-21 Semester
Course Name:
Introduction to Cybersecurity Engineering
Course Code:
CSE 210
Course Pre-requisites:
ECT200
Course Co-requisites:
Credit hours:
3
Instructor’s Name:
Abid Mehmood
Telephone:
025015785
E-mail:
Abid.mehmood@adu.ac.ae
Class Location:
Online
Class Time:
Office Location:
U2F89
Office Hours:
SuTu 12:30 02:00 pm
1. Course Description
This course will provide a basic introduction to of all aspects of cybersecurity including business,
policy and procedures, communications security, network security, security management, legal
issues, political issues, and technical issues. This course introduces students to cryptography,
security management, organizational policy, network security, software security, operating system
security and database security. It covers all processes from risk analysis, engineering security
requirements, malware analysis to anticipate future vulnerabilities, and planning ongoing
improvements. The course will initiate students to the basic concepts and terminology of
cybersecurity, standards, and how cyber security is commonly addressed during different phases.
It will help the students build up an understanding of how to integrate cyber security
tools/techniques and best practices in the design processes of systems engineering.
2. Learning Outcomes
Expected Learning Outcomes and Associated Assessment Tools
Course Learning Outcome
Assessment Tool(s)*
Determine the levels of protection and response to security
incidents
Assignment 1, Quiz 1
Perform inspection and protection of information assets
Lab 1, Final Project
Identify the spectrum of security activities, methods,
methodologies, and procedures
Assignment 2
Understand the nature of secure software development, operating
systems, and data base design
Midterm, Lab 1
Understand the legal and ethical aspects of cybersecurity
Quiz 2, Lab 2
Work in a team and communicate to audience effectively
Final Project
*Please note that the assessment tool(s) are to be used in assessing the course learning outcomes.