IT Security (S2, 2014)

Course Overview

This course aims to introduce you to the techniques for securing computer systems and network communications. The course focuses on the security technologies available, what they can be used for, and their limitations. It is oriented towards practical issues; theoretical aspects of computer security (e.g. cryptographic algorithms) are not covered in detail. Topics covered include: authenticating users, software (including operating system) security, web and Internet security and attacks, and management issues relevant to organisations. The knowledge gained from this course will help you in deploying technologies that secure data, software and communication networks.

Lecturer
Dr Steven Gordon (contact details)
Lecture Times
Textbook
Computer Security, 2nd Edition by Williams Stallings and Lawrie Brown, Prentice Hall, 2012. (additional resources)
Prerequisites
No formal prerequisites, although it is expected that you have good knowledge of system/software design principles (e.g. passed operating systems and data structures courses), basic knowledge of data communications (e.g. passed ITS323 or similar) and have used or can quickly learn Linux command line utilities. See the Study Guide for advice on refreshing your knowledge in these areas.
Online Resources
Course Home: http://sandilands.info/sgordon/teaching/its335y14s2/
YouTube: http://www.youtube.com/StevesLectures
Past courses available via: http://sandilands.info/sgordon/teaching/
Related Courses
CSS322 Cryptography and Security is a related course I teach to computer science students. CSS322 is more theoretical, while this course (ITS335) is more practical. CSS322 covers more aspects of cryptography, looking at the details of how algorithms work, and then some Internet protocols where cryptography is applied. Most of the discussion is related to network security. CSS322 is of benefit to those that need to design and implement security algorithms and protocols. ITS335 is of benefit to those that need to select and apply security technologies in organisations.

Course Material

Return to: Course Home | Course List | Steven Gordon's Home | SIIT