ICS 460 Networks and Security
Principles and practices of the OSI and TCP/IP models of computer networks, with special emphasis on the security of these networks. Coverage of general issues of computer and data security. Introduction to the various layers of network protocols, including physical, data link, network, and transport layers, flow control, error checking, and congestion control. Computer system strengths and vulnerabilities, and protection techniques: Topics include applied cryptography, security threats, security management, operating systems, network firewall and security measures. Focus on secure programming techniques. Programming projects.
First day attendance is mandatory.
Note: Students are responsible to both be aware of and abide by prerequisites for ICS courses for which they enroll, and will be administratively dropped from a course if they have not met prerequisites.
Prerequisites
Special information
Note: Students are responsible to both be aware of and abide by prerequisites for ICS courses for which they enroll, and will be administratively dropped from a course if they have not met prerequisites.
4 Undergraduate credits
Effective August 17, 2014 to present
Learning outcomes
General
- Describe the high-level functions of, and interactions between, the protocol layers of network protocol stacks.
- Explain the purpose and workings of the link, network, and transport layers in network protocol stacks, including the IP, TCP, and UDP protocols.
- Evaluate the reliability and performance implications of different link, network, and transport layer protocols and solve quantitative problems involving these protocols.
- Compare and contrast the protocols used in wireless and mobile networking with those used in traditional fixed-infrastructure networking.
- Describe the goals of computer security to preserve confidentiality, integrity, and availability (CIA) of computer systems, and understand the threats to these goals.
- Evaluate the role of cryptography in meeting threats to the CIA goals.
- Evaluate the roles of operating system and network security measures in meeting threat to the CIA goals.
- Introduce secure programming techniques to implement security measures.
Summer 2024
Section | Title | Instructor | books | eservices |
---|---|---|---|---|
01 | Networks and Security | Armitage, Bradford C | Books for ICS-460-01 Summer 2024 | Course details for ICS-460-01 Summer 2024 |
Fall 2024
Section | Title | Instructor | books | eservices |
---|---|---|---|---|
01 | Networks and Security | El-Shekeil, Ibrahim Ali | Books for ICS-460-01 Fall 2024 | Course details for ICS-460-01 Fall 2024 |
02 | Networks and Security | El-Shekeil, Ibrahim Ali | Books for ICS-460-02 Fall 2024 | Course details for ICS-460-02 Fall 2024 |
Spring 2025
Section | Title | Instructor | books | eservices |
---|---|---|---|---|
01 | Networks and Security | El-Shekeil, Ibrahim Ali | Books for ICS-460-01 Spring 2025 | Course details for ICS-460-01 Spring 2025 |
02 | Networks and Security | El-Shekeil, Ibrahim Ali | Books for ICS-460-02 Spring 2025 | Course details for ICS-460-02 Spring 2025 |