You are on page 1of 17

Csec-6012: Cybersecurity

Essentials
2
Introducing Myself

 Fitsum Assamnew, Ph.D.


 Email: fitsum.assamnew@aait.edu.et
 Office: 1st floor 120B
 Planned office hour
 To be decided
 Feel free to send me an email with anything regarding the
course
3
Course Description

 The course is designed to provide and demonstrate


 overview of data, network and system security
 the core concepts in securing information systems and infrastructure.
 fundamental capability to design and implement security controls for data,
host, system and network. 
4
Course Objectives

 The course should introduce the student to


 Assess the Cyber security landscape, including the nature of threats
 Understand the core concepts of cryptography
 Learn the concepts, principles and uses of network security
 Explain and compare the fundamentals of web security controls
 Understand, integrate and design security controls for data, host, system and
network.
 Understand basic concepts of cyber intelligence and investigation
5
Learning Outcomes

 After completion of this course, the student:


 Acquires the driving concepts of cryptography
 Design and implement appropriate network security controls
 Acquire necessary skill and knowledge of web application security
 Design and implement security controls for data, host, system and network.
6
Course Content

 Chapter One: Cyber security Fundamentals


 Cyber and related concepts: Cyber and cyber space, Major Components of Cyber,
Interdependencies of cyber components, Characteristics of cyber , Positive and
impacts of cyber, Challenges of cyber and the need for security
 Cyber security concepts, Evolution of Cyber security, Importance of Cyber security
 Cyber security situational awareness and mind set , Cyber security professionals
 Security trends, architecture, services, mechanisms
 Model of internet security
 Security attacks
7
Course Content …

 Chapter Two: Applied Cryptography


 Symmetric Cryptography: block ciphers, stream ciphers, Secure Hash
functions, Symmetric Cryptography
 Asymmetric Cryptography: Public Key Cryptography, Digital Signature,
Key Management, Attacks on Asymmetric Cryptography
8
Course Content…

 Chapter Three: Network Security Applications


 Authentication Applications: Kerberos, Public Key infrastructure, Directory
Authentication Service
 Electronic Mail Security: Pretty good Privacy (PGP) , S/MIME
 Internet Protocol Security(IPSec)
 Network management security
9
Course Content …

 Chapter Four: Web Application Security


 Fundamentals of web application security
  Web security requirements
 Top 10 OWASP attacks
 Applied web application security: (SSL, TLS, Secure Electronic Transaction
(SET))
10
Course Content …

 Chapter Five: System Security


 Hardening Network Components: router, switch, hub, wireless devices
security
 Intrusion detection IPS/IDS, Firewall, VPN
 Operating system security
 Malicious software and countermeasures
 Distributed Denial of service attacks (DDOS)
11
Course Content …

 Chapter Six: Data Security


 Fundamentals of data security
 Data security models
 Threats of data
 Data security controls
12
Course Content …

 Chapter Seven: Software Development Security


 Security in software development lifecycle
 Software development models
 Threat modeling principles
 Security controls for software development
13
Course Content …

 Chapter Eight: Cyber Intelligence and Investigation


 Digital forensics and investigation
 Cyber intelligence analysis
 Cyber warfare
 Cybercrime investigation
14
Course Modality

 Mode of Delivery: Lectures, Discussions, Guest Speakers??


 Mode of Assessment:
 Assignments 30%
 Paper Presentation 10%
 Paper Summaries 10%
 Project 20%
 Final Exam 30%
15
References

 Text Books:
 William Stallings, Network security essentials applications and standards, Sixth Edition, 2016
 Matt Bishop, Computer security art and science, Addis- Wesley,2019
 References
 CCNA Security,
 CCNP Security, Firewall,
 CCNP Security, IPS/IDS
 CCNP Security, VPN
 Official (ISC)2 guide to CISSP CBK Guide, fourth edition, Adam Gordon
16
Introduce yourself

 Please tell us
 Your name
 Your undergraduate education: What? Where?
 What you specialize in?
 What is your research interest?
17

asf

You might also like