Skip to content

astral-fate/SE205-Information-Security

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

70 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

SE205: Information Security

This course is part of Cairo University Software Engineering Professional Master's Degree

interactive matrial

Course Syllabus

Unit Main Topics Key Concepts
Unit 1: Attacks on Computer and Computer Security - Introduction to security
- Security approaches
- Principles of security
- Security attacks, services, and mechanisms
- The need for security
- Types of security attacks
- Security services
- Security mechanisms
- Network security models
Unit 2: Cryptography: Concepts and Techniques - Basic cryptographic concepts
- Classical encryption techniques
- Encryption and decryption
- Plain text and cipher text
- Substitution techniques
- Transposition techniques
Unit 3: Symmetric and Asymmetric Key Ciphers - Symmetric key cryptography
- Asymmetric key cryptography
- Key distribution
Symmetric Key Ciphers:
- Block cipher principles
- DES, AES, Blowfish algorithms
- Differential and linear cryptanalysis
- Block cipher modes of operation
- Stream ciphers (RC4)

Asymmetric Key Ciphers:
- Public key cryptosystem principles
- RSA, Diffie-Hellman, ECC algorithms
- Key distribution strategies
Unit 4: Authentication Methods - Message authentication
- Hash functions
- Digital signatures
- Authentication applications
Authentication Algorithms:
- Message authentication codes
- Hash functions (SHA, Whirlpool)
- HMAC, CMAC
- Digital signatures
- Knapsack algorithm

Authentication Applications:
- Kerberos
- X.509 Authentication Service
- Public Key Infrastructure (PKI)
- Biometric authentication
Unit 5: System and Web Security - Software and web security
- Intruders and intrusion detection
- Malware and firewalls
- Case studies
Web Security:
- Secure software design
- Web security considerations
- SSL/TLS
- Secure electronic transactions

Security Threats and Countermeasures:
- Intruders and intrusion detection
- Password management
- Viruses and related threats
- Firewall design principles and types

Case Studies:
- Secure inter-branch payment transactions
- Cross-site scripting vulnerability
- Virtual elections

Course References

Text Books:

  1. "Cryptography and Network Security" by William Stallings, Pearson Education
  2. "Cryptography and Network Security" by Atul Kahate, McGraw Hill
  3. https://xipher.netlify.app/
  4. https://pythontutor.com/visualize.html#mode=edit
  5. https://youtu.be/mS2VC7vbbNc?si=JXKOSlqRjSwVyylO
  6. https://www.youtube.com/watch?v=SN_-LMdx6cI