CONTACT CSU

ITC593 Network Security (8)

Abstract

ITC593 provides a practical survey of network security protocols and standards, along with an in-depth introduction to the field of cryptography. ITC593 explores how digital signatures, encryption algorithms, and hash functions are used to satisfy various security goals, such as authentication, confidentiality, and integrity. ITC593 also includes a comprehensive coverage of two important network security services, Kerberos and PKI (Public Key Infrastructure).

+ Subject Availability Modes and Location

Session 2
DistanceWagga Wagga Campus
Session 3
DistanceWagga Wagga Campus
Continuing students should consult the SAL for current offering details: ITC593
Where differences exist between the Handbook and the SAL, the SAL should be taken as containing the correct subject offering details.

Subject information

Duration Grading System School:
One sessionHD/FLSchool of Computing and Mathematics

Enrolment restrictions

Available only to students in:
Master of Networking and System Administration
Master of Systems Development
Master of Information Systems Security
Master of Database Design and Management
Master of Management (Information Technology)
Graduate Certificate in Networking and Systems Administration
Graduate Certificate in Systems Development
Graduate Certificate in Information Systems Security
Graduate Certificate in Database Design and Management
Prerequisite(s)
ITI500

Learning Outcomes

Upon successful completion of this subject, students should:
  • be able to identify the various digital threats to which networked computing devices are prone, as well as propose and evaluate solutions to these threats;
  • be able to analyse cryptographic algorithms, both symmetrical and asymmetrical, and explain how these are used to improve network security;
  • be able to compare and contrast the features of Kerberos and design an authentication protocol using Kerberos;
  • be able to explain the operation of a Key Distribution Centre (KDC) and effectively communicate and justify why a Public Key Infrastructure (PKI) is an important component in a network security architecture;
  • be able to investigate and critique the current and emerging trends in cryptography and network security.

Syllabus

The subject will cover the following topics:
  • Introduction to computer and network security.
  • Introduction to cryptography.
  • Secret key (symmetric) algorithms.
  • Modes of operation.
  • Public key (asymmetric) algorithms.
  • Number theory.
  • Authentication systems.
  • User authentication.
  • Security handshakes.
  • Kerberos.
  • Public key infrastructure (PKI).

Back

The information contained in the 2016 CSU Handbook was accurate at the date of publication: 06 September 2016. The University reserves the right to vary the information at any time without notice.