Page 98 - PG-Handbook23-24-finale
P. 98
Synopsis of Course Content
This course covers the networking and security challenges and the use of programming to defence
against cyber-attacks and cyber threats. These include the procedures of network connection and
endpoint protection. You will also learn how to assess a network's vulnerabilities and develop a secure
network solution with the help of Python scripting.
Evaluation and Weightage
Continuous Assessment : 60%
Final Examination : 40%
WQE7003 Cryptography and Information Hiding
Course Learning Outcomes
At the end of the course, students are able to:
1. Explain the principles and mechanism used in cryptography and information hiding.
2. Analyse the cryptographic and information hiding algorithms for their strengths and weaknesses.
3. Evaluate the practical applications of cryptographic and information hiding mechanisms.
Synopsis of Course Content
This course consists of developing an understanding of cryptography, cryptanalysis, Symmetric and
Asymmetric cryptographic algorithms (classic and modern algorithms), Introduction to Number Theory,
Hash Functions, Message Authentication and Digital Signatures. This course also introduces the
concepts and techniques used in information hiding which focuses mainly on watermarking and
steganography. Topics includes spatial and transform domain embedding, media specific information
hiding and attacks on watermarking and steganography
Evaluation and Weightage
Continuous Assessment : 50%
Final Examination : 50%
WQE7004 Information Assurance
Learning Outcomes
At the end of this course, the students are able to:
1. Analyze the challenges and solutions in Information Assurance involving the triad of people,
processes and technologies.
2. Evaluate security solutions to meet security needs for a meaningful society in accordance with the
principles in information security.
3. Ideate security solutions based on current challenges and issues in the topic of information security.
Synopsis of Course Content
This course covers and provides a practical view of security that involved the triad of people, policies
and procedures and technology, which include: Information Assurance strategy, policy, concepts,
Information Assurance planning, risk mitigation, Information Assurance detection and recovery process
and application of Information Assurance in selected industries.
Evaluation and Weightage
Continuous Assessment : 60%
Final Examination : 40%