Singapore University of Social Sciences

Network Security

Network Security (ICT318)

Applications Open: 01 October 2023

Applications Close: 15 November 2023

Next Available Intake: January 2024

Course Types: Modular Undergraduate Course

Language: English

Duration: 6 months

Fees: $1514 View More Details on Fees

Area of Interest: Science and Technology

Schemes: Alumni Continuing Education (ACE)

Funding: To be confirmed

School/Department: School of Science and Technology


ICT318 Network Security provides a broad overview on the concept and importance of network security. By learning the basics of encryption, students can understand how the use of keys protect information for Internet applications by verifying the origin of a message (also known as authentication), proving the contents of a message are not modified after sending (integrity), and ensuring the sender cannot deny sending the message (nonrepudiation). Students will also be able to explain how security is implemented at the Application, Transport and Network layers of the TCP/IP stack. In addition, network security technologies that protect the computer network against any theft of information and malicious attacks will be presented, including firewalls, Intrusion Detection and Prevention Systems (IDPS), and IEEE 802.11i.

Level: 3
Credit Units: 5
Presentation Pattern: Every semester


  • Overview of security
  • Symmetric key cryptography
  • Message authentication
  • Asymmetric key cryptography
  • Key distribution
  • Security at the Application layer
  • Security at the Transport layer
  • Security at the Network layer
  • Firewall technologies
  • Network monitoring and intrusion detection
  • Wireless network security
  • Contingency planning and networking incident response

Learning Outcome

  • Assess the threats and their associated attacks on network security
  • Illustrate how Kerberos / X.509 Certificates enables user authentication
  • Discuss the security protocols used at the application, transport and network layers of the TCP/IP stack
  • Examine intrusion detection and prevention techniques
  • Apply symmetric and asymmetric encryption techniques for protecting information
  • Implement security protection using firewalls
  • Use IEEE 802.11i to perform Wireless Local Area Network (WLAN) protection
Back to top
Back to top