Information Technology 455
ITEC 455: Applied Cryptography and Network Security
Prerequisites: ITEC 122, ITEC 220 (Grade of “C” or better), ITEC 345, ITEC 350
Credit Hours: (3)
Threats and vulnerabilities in computer networks, cryptography and its application to network security mechanisms, secure network protocols and network intrusion detection systems.
Detailed Description of Content of Course
1. Secret and public key cryptography.
2. Modes of operation.
3. Hashes and message digests.
4. Public key infrastructure.
5. Threats and attacks on networking infrastructure.
6. Analyzing networking protocols for security flaws.
7. Secure authentication protocols and security standards (e.g., Kerberos, SSL/TLS).
8. Securing networks: defense in depth, device security, perimeter security, wireless security.
9. Incident response.
Detailed Description of Conduct of Course
Projects that involve configuration of network security mechanisms and/or use of networking packet filters will be given. Students will also work on problems in cryptography and programming projects in Web Security.
Goals and Objectives of the Course
Students who complete the course will be able to:
1. Identify and describe the working and application of various cryptographic algorithms and mechanisms including secret and public key cryptographic algorithms, modes of operation, hashes and message digests.
2. Identify and describe vulnerabilities, threats and attacks on a networking infrastructure.
3. Analyze common network protocols for security issues and describe standards such as Kerberos, public key infrastructure (PKI) and IPsec.
4. Configure and/or apply network security controls such as firewalls, virtual private networks and intrusion detection systems.
5. Respond to network security incidents.
Evaluation may be based on several projects, problems, and at least two examinations. The instructor may also use quizzes or other assessment strategies.
Other Course Information
Review and Approval
September 9, 2008 New Course Arthur Carter, Chair