ITC593 Network Security and Cryptography (8)

ITC593 provides the practical knowledge and skills needed to analyse and work with network security protocols and standards, along with an in-depth introduction to the field of cryptography. The subject explores how contemporary encryption algorithms, digital signatures and cryptographic hash functions are used to implement various security goals, such as authentication, confidentiality and integrity. It also includes a comprehensive coverage of emerging security trends in modern IT infrastructure.

Availability

Session 2 (60)
Online
Wagga Wagga Campus
Session 3 (90)
Online
Wagga Wagga Campus

Continuing students should consult the SAL for current offering details: ITC593. Where differences exist between the Handbook and the SAL, the SAL should be taken as containing the correct subject offering details.

Subject Information

Grading System

HD/FL

Duration

One session

School

School of Computing and Mathematics

Enrolment Restrictions

 Only available to postgraduate students.

Learning Outcomes

Upon successful completion of this subject, students should:
  • be able to identify and explain the various digital threats to IT networks and computing devices;
  • be able to analyse cryptographic algorithms, both symmetrical and asymmetrical, and explain how they are used to improve network security;
  • be able to compare and contrast the features of various authentication protocols;
  • be able to design security solutions using existing authentication protocols;
  • be able to effectively communicate and justify why a Public Key Infrastructure (PKI) is an important component in a network security architecture;
  • be able to investigate and evaluate the current and emerging trends in cryptography and network security; and
  • be able to propose mitigating techniques against cryptographic and network security threats.

Syllabus

This subject will cover the following topics:
  • Introduction to computer and network security.
  • Cryptography and its applications in network security.
  • Secret key (symmetric) algorithms.
  • Public key (asymmetric) algorithms.
  • Modes of operation.
  • RSA algorithm;
  • Authentication systems.
  • TLS and IP security
  • User authentication & Kerberos.
  • Key Management & Public key infrastructure (PKI).
  • Emerging trends and challenges of network security.

Contact

For further information about courses and subjects outlined in the CSU handbook please contact:

Current students

Future students

The information contained in the CSU Handbook was accurate at the date of publication: May 2019. The University reserves the right to vary the information at any time without notice.

Back