Singapore University of Social Sciences

Network Security

Network Security (ICT318)

Applications Open: 01 May 2024

Applications Close: 15 June 2024

Next Available Intake: July 2024

Course Types: Modular Undergraduate Course

Language: English

Duration: 6 months

Fees: $1529.14 View More Details on Fees

Area of Interest: Science and Technology

Schemes: Alumni Continuing Education (ACE)

Funding: To be confirmed

School/Department: School of Science and Technology


Synopsis

ICT318 Network Security provides a broad overview on the concept and importance of network security. By learning the basics of encryption, students can understand how the use of keys protect information for Internet applications by verifying the origin of a message (also known as authentication), proving the contents of a message are not modified after sending (integrity), and ensuring the sender cannot deny sending the message (nonrepudiation). Students will also be able to explain how security is implemented at the Application, Transport and Network layers of the TCP/IP stack. In addition, network security technologies that protect the computer network against any theft of information and malicious attacks will be presented, including firewalls, Intrusion Detection and Prevention Systems (IDPS), and IEEE 802.11i.

Level: 3
Credit Units: 5
Presentation Pattern: Every semester

Topics

  • Overview of security
  • Symmetric key cryptography
  • Message authentication
  • Asymmetric key cryptography
  • Key distribution
  • Security at the Application layer
  • Security at the Transport layer
  • Security at the Network layer
  • Firewall technologies
  • Network monitoring and intrusion detection
  • Wireless network security
  • Contingency planning and networking incident response

Learning Outcome

  • Assess the threats and their associated attacks on network security
  • Illustrate how Kerberos / X.509 Certificates enables user authentication
  • Discuss the security protocols used at the application, transport and network layers of the TCP/IP stack
  • Examine intrusion detection and prevention techniques
  • Apply symmetric and asymmetric encryption techniques for protecting information
  • Implement security protection using firewalls
  • Use IEEE 802.11i to perform Wireless Local Area Network (WLAN) protection
Back to top
Back to top