IT-312-course Outline
IT-312-course Outline
2
20 Blakley’s scheme, Entity authentication S-Chapter # 7 Quiz # 3
Assignment # 3
11 21 S-MIME S-Chapter # 7
22 IP Security Overview, IP Security Policy S-Chapter # 8
12 23 Web Security, Threats and approaches, SSL S-Chapter # 5
24 Legal and ethical aspects S-Chapter # 13
13 25 System Security, Intruders, Intrusion Detection, Audit Records, S-Chapter # 9
Statistical Anomaly detection
26 Rule based intrusion detection, Distributed intrusion detection, S-Chapter # 9
honeypots,
14 27 Password management, protection, Strategies to choose password S-Chapter # 9 Quiz # 4
Assignment # 4
28 Malicious Software’s S-Chapter # 10
15 29 The Need for Firewalls S-Chapter # 11
Firewall Characteristics
Types of Firewalls
30 Firewall Basing S-Chapter # 11
Firewall Location and Configurations
16 31 Presentations
32 Final Term