IT Security (S2, 2015)
This course aims to introduce you to the techniques for securing computer systems and network communications. The course focuses on the security technologies available, what they can be used for, and their limitations. It is oriented towards practical issues; theoretical aspects of computer security (e.g. cryptographic algorithms) are not covered in detail. Topics covered include: authenticating users, software (including operating system) security, web and Internet security and attacks, and management issues relevant to organisations. The knowledge gained from this course will help you in deploying technologies that secure data, software and communication networks.
- Dr Steven Gordon (contact details)
- Lecture Times
- Tuesday 10:40-12:00, BKD2506
- Wednesday 14:40-16:00, BKD3506
- Computer Security, 2nd Edition by Williams Stallings and Lawrie Brown, Prentice Hall, 2012. (additional resources)
- No formal prerequisites, although it is expected that you have good knowledge of system/software design principles (e.g. passed operating systems and data structures courses), basic knowledge of data communications (e.g. passed ITS323 or similar) and have used or can quickly learn Linux command line utilities. See the Study Guide for advice on refreshing your knowledge in these areas.
- Online Resources
- Course Home: http://sandilands.info/sgordon/teaching/its335y15s2/
Past courses available via: http://sandilands.info/sgordon/teaching/
- Related Courses
- CSS441 Cryptography and Security is a related course I teach to computer science students. CSS441 is more theoretical, while this course (ITS335) is more practical. CSS441 covers more aspects of cryptography, looking at the details of how algorithms work, and then some Internet protocols where cryptography is applied. Most of the discussion is related to network security. CSS441 is of benefit to those that need to design and implement security algorithms and protocols. ITS335 is of benefit to those that need to select and apply security technologies in organisations.
- Schedule: Schedule of lectures, listing the topics covered each week.
- Assessment Criteria: Expectations of students and methods for assessing their work.
- News Forum: Course announcements and news. Also distributed by email.
- Extra Resources: Other resources, such as textbooks, past courses and background material, that may help you be successful in this course.
- Security Links: Links to selected websites and documents related to security. Includes companies, alerts, attacks and different cryptographic techniques.
- Topics and Lecture Material: list of topics, and for each topic a page containing lecture notes, handouts, videos and examples.
- Quizzes and Homework: links to quizzes and homeworks.
- Exams: links to midterm and final exam details.
Return to: Course Home | Course List | Steven Gordon's Home | SIIT