Unit 1: Overview of Computer security (4 hrs)
Computer Security Concepts
Computer Security, Information Security, Network Security
Threats, Attacks and Assets
Security Requirements
Security Design Principles
Attack Surfaces and Attack Trees
Computer Security Strategy
Unit 2: Cryptographic Algorithms (12 hrs)
Classical Cryptosystems: Ceasar, Vignere, Playfair, Rail Fence Ciphers
Modem Ciphers: Block vs. Stream Ciphers, Symmetric vs. Asymmetric Ciphers
Symmetric Encryption: Fiestel Cipher Structure, Data Encryption Standards (DES), Basic Concepts of Fields: Groups, Rings, Fields, Modular Arithmetic, Galois Fields, Polynomial Arithmetic, Advanced Encryption Standards (AES)
Number Theory: Prime Numbers, Fermat’s Theorem, Primility Testing: Miller-Rabin Algorithm, Euclidean Theorem, Extended Euclidean Theorem, Euler Totient Function
Asymmetric Encryption: Diffie-Helman Key Exchange, RSA Algorithm
Unit 3: Message Authentication and Hash Functions (6 hrs)
Message Authentication
Hash Functions
Message Digests: MD4 and MD5
Secure Hash Algorithms: SHA-1
HMAC
Digital Signatures
Unit 4: User Authentication (5 hrs)
User Authentication Principles
Password-Based Authentication
Token-Based Authentication
Biometric Authentication
Remote User Authentication
Two Factor Authentication
Unit 5: Access Control (5 hrs)
Access Control Principles
Subjects, Objects and Access Rights
Access Control Matrix and Capability Lists
Discretionary Access Control
Role Based Access Control
Attribute Based Access Control
Identity, Credential and Access Management
Trust Frameworks
Unit 6: Malicious Software and Intrusion (4 hrs)
Malicious Software
Virus and its phases, Virus Classification
Worm, Worm Propagation Model, State of Worm Technology
Trojan Horse
Intrusion and Intruders
Intrusion Detection System
Analysis Approaches: Anomaly Based, Signature Based
Honeypots
Unit 7: Network Security (5 hrs)
Overview of Network Security
Email Security: S/MIME, Pretty Good Privacy (PGP)
Secure Socket Layer (SSL) and Transport Layer Security (TLS)
IP Security (IPSec)
Firewalls and their types
Unit 8: Security Auditing (7 hrs)
Security Audit
Security Auditing Architecture
Security Audit Trail
Implementing Logging Function
Audit Trail Analysis