1. Course Title | Security and protection of computer communication systems and networks | |||||||
2. Code | 3ФЕИТ07Л003 | |||||||
3. Study program | KHIE, KTI | |||||||
4. Organizer of the study program (unit, institute, department) | Faculty of Electrical Engineering and Information Technologies | |||||||
5. Degree (first, second, third cycle) | First cycle | |||||||
6. Academic year/semester | III/6, IV/8 | 7. Number of ECTS credits | 6.00 | |||||
8. Lecturer | Dr Danijela Efnusheva | |||||||
9. Course Prerequisites | ||||||||
10. Course Goals (acquired competencies): Introduction to the basic principles of security in computer-communication systems and networks, security of operating systems, applications and users. Upon completion of the course students will be able to work with security systems and design secure networks. |
||||||||
11. Course Syllabus: Basic principles of security in computer-communication systems and networks. Principles of security in Windows operating system. Principles of security for Unix and Linux operating systems. Principles of security with web browsers and clients. Principles of security for web servers. Principles of email security. Principles of DNS security. Principles of security of servers. Security of wireless networks. Basics of building a network architecture. Firewalls . Intrusion Detection Systems. Secret communication. Cryptography. Digital signatures. Hidden communication. water marks. Application of secret and encrypted communication. Email. Public keys. Virtual Private Networks. SSL. Intrusion Detection Systems. An overview of the most common attacks. Mechanisms for protection. Honeypots. Dealing with incidents. Security estimates. Testing. Evaluation. |
||||||||
12. Learning methods: Theoretical and practical (laboratory) classes | ||||||||
13. Total number of course hours | 2 + 2 + 1 + 0 | |||||||
14. Distribution of course hours | 180 | |||||||
15. Forms of teaching | 15.1. Lectures-theoretical teaching | 30 | ||||||
15.2. Exercises (laboratory, practice classes), seminars, teamwork | 45 | |||||||
16. Other course activities | 16.1. Projects, seminar papers | 15 | ||||||
16.2. Individual tasks | 30 | |||||||
16.3. Homework and self-learning | 60 | |||||||
17. Grading | 17.1. Exams | 10 | ||||||
17.2. Seminar work/project (presentation: written and oral) | 40 | |||||||
17.3. Activity and participation | 0 | |||||||
17.4. Final exam | 50 | |||||||
18. Grading criteria (points) | up to 50 points | 5 (five) (F) | ||||||
from 51 to 60 points | 6 (six) (E) | |||||||
from 61 to 70 points | 7 (seven) (D) | |||||||
from 71 to 80 points | 8 (eight) (C) | |||||||
from 81 to 90 points | 9 (nine) (B) | |||||||
from 91 to 100 points | 10 (ten) (A) | |||||||
19. Conditions for acquiring teacher’s signature and for taking final exam | Practical (laboratory) exercises | |||||||
20. Forms of assessment | Two partial exams during the semester with a duration of 120 minutes each or one final exam in a corresponding exam session with a duration of 120 minutes. The laboratory exercises are also graded. The final grade includes points from the exam and the laboratory exercises. It is not allowed to use books, scripts, manuscripts or notes of any kind during the exam, as well as a calculator, mobile phone, tablet or any other electronic device |
|||||||
21. Language | Macedonian and English | |||||||
22. Method of monitoring of teaching quality | Evaluation of the curriculum using tests and quizzes | |||||||
23. Literature | ||||||||
23.1. Required Literature | ||||||||
No. | Author | Title | Publisher | Year | ||||
1 | William Stallings | Cryptography and Network Security: Principles and Practice, 7th Ed. | Pearson | 2016 | ||||
2 | William Stallings | Network Security Essentials: Applications and Standards, 6th Ed. | Pearson | 2016 | ||||
3 | J.Kempf | Wirelles Internet Security: Architectures and Protocols | Cambridge Univ. Press. | 2008 | ||||
23.2. Additional Literature | ||||||||
No. | Author | Title | Publisher | Year | ||||
1 | William Stallings, Lawrie Brown | Computer Security: Principles and Practice, 3rd Ed. | Pearson | 2014 | ||||
2 | John R. Vacca | Computer and Information Security Handbook, 2nd Ed. | Morgan Kaufmann | 2013 | ||||
3 | William (Chuck) Easttom II |
Computer Security Fundamentals, 3rd Ed. |
Pearson IT Certification | 2016 |