Page 98 - PG-Handbook23-24-finale
P. 98

Synopsis of Course Content
               This course covers the networking and security challenges and the use of programming to defence
               against cyber-attacks and cyber threats. These  include the  procedures  of network connection and
               endpoint protection. You will also learn how to assess a network's vulnerabilities and develop a secure
               network solution with the help of Python scripting.


                Evaluation and Weightage
               Continuous Assessment      : 60%
               Final Examination          : 40%



               WQE7003                   Cryptography and Information Hiding



               Course Learning Outcomes
               At the end of the course, students are able to:
               1. Explain the principles and mechanism used in cryptography and information hiding.
               2. Analyse the cryptographic and information hiding algorithms for their strengths and weaknesses.
               3. Evaluate the practical applications of cryptographic and information hiding mechanisms.

               Synopsis of Course Content
               This course consists of developing an understanding of cryptography, cryptanalysis, Symmetric and
               Asymmetric cryptographic algorithms (classic and modern algorithms), Introduction to Number Theory,
               Hash Functions, Message Authentication and Digital Signatures. This course  also  introduces the
               concepts and techniques  used  in information  hiding  which focuses mainly  on  watermarking and
               steganography. Topics includes spatial and transform domain embedding, media specific information
               hiding and attacks on watermarking and steganography

               Evaluation and Weightage
               Continuous Assessment      : 50%
               Final Examination          : 50%


               WQE7004            Information Assurance



               Learning Outcomes
               At the end of this course, the students are able to:
               1. Analyze  the challenges and solutions in Information Assurance involving the triad of people,
                   processes and technologies.
               2. Evaluate security solutions to meet security needs for a meaningful society in accordance with the
                   principles in information security.
               3. Ideate security solutions based on current challenges and issues in the topic of information security.

               Synopsis of Course Content
               This course covers and provides a practical view of security that involved the triad of people, policies
               and procedures and technology,  which include: Information Assurance strategy,  policy, concepts,
               Information Assurance planning, risk mitigation, Information Assurance detection and recovery process
               and application of Information Assurance in selected industries.

               Evaluation and Weightage
               Continuous Assessment      : 60%
               Final Examination          : 40%
   93   94   95   96   97   98   99   100   101   102   103