Course Information
Lectures |
1:25–2:15pm, Mon/Wed
Luddy Hall 0117
|
Labs |
Thu: 1–2:15pm, 2:30–3:45pm
Luddy Hall 3115
|
Instructor |
Apu Kapadia
Email alias: kapadia
Office: Luddy Hall 3028
Office Hours: Mon 2:15–3pm, briefly after class, or by appointment
|
Associate Instructors (AI) |
Ruiyu Zhu, TBD
Email aliases: zhu52. All end in @iu.edu.
Office Hours: TBD, During lab hours (in the lab), or by appointment
|
Textbooks |
- SB (Required): Computer Security:
Principles and Practice (4th Edition), by William Stallings
and Lawrie Brown.
- Optional readings (if you want to prepare for the CISSP exam
in the future): CISSP (ISC)2 Certified Information Systems Security
Professional Official Study Guide, 7th Edition, by James Michael Stewart, Mike Chapple, Darril Gibson.
|
Prerequisites |
Required
INFO-I 231 or CSCI-C 231
Some programming background is necessary. A specific language is
not required, but it is assumed you can pick up new languages
where needed for this course.
This course also assumes you are savvy with the Linux command
line, or have the willingness to put in the extra effort needed to become proficient.
|
Course Description
From the course catalog: This course is an extensive survey of network security. The course materials cover threats to information confidentiality, integrity, and availability in different Internet layers, and defense mechanisms that control these threats. The course also provides a necessary foundation on network security, such as cryptographic, primitives/protocols, authentication, authorization and access control technologies; and hands-on experiences through programming assignments and course projects.
|