Class
Schedule:
Section
01 Lecture: HY-ONLINE
Course Requirements
This class will be held hybrid online. The instructor will provide PowerPoint lectures with accompanying audio-video tracks and transcript. Lecture videos and audios (mpeg) can be downloaded to iPod or iPhones. Students will engage in Discussion Groups, complete Homeworks, Lab assignments, and prepare an E-portfolio.
Major announcements related to class will be posted on my web site. (http://www.mcs.csueastbay.edu/~lertaul/) Check regularly announcement section from class web page. (http://www.mcs.csueastbay.edu/~lertaul/)
Students will receive the solutions of assignment problems and personal messages from their Horizon E-mail accounts. So please check and clear your horizon e-mail accounts regularly.
Students will use TURNITIN application in blackboard to submit their assignments. FYI, TURNITIN application has plagiarism filter built in . When students submit their assignments TURNITIN application prepares an ORIGINALITY report. Students can see this report immediately. Originality reports which have greater then %40 WILL NOT BE ACCEPTED. These assignments will get 0 points. If the originality report is higher then %80, instructor will file plagiarism report.
Students will submit their Homeworks on time. 25 points will be cut for one day late Homeworks. Homeworks which are 2 days late WILL NOT BE ACCEPTED. These homeworks will get 0 points. E-mail submissions WILL NOT be accepted. These homeworks will get 0 points.
Students will use blackboard to engage in discussion group. (see Blackboard help for further details) (http://www.viewletcentral.com/vc/viewlet.html?id=48389415)
Students will use WIKI to create a broader understanding of any subject which is security related (see blackboard help for Wiki)
Office hours will be held on SKYPE. (Skype ID: CSUEBLERTAUL ) Students can talk with the instructor using SKYPE for their questions during office hours.
Each student is expected to create an E-portfolio (see Blackboard help for E-Portfolios)
What is an E-portfolio and the benefits of creating E-portfolios
E-portfolio is organized collection of digital material that demonstrates your work, efforts, progress, and achievements. The collection reflects your participation in selecting contents, the criteria for judging merit, and evidence of your self reflection. Therefore your eportfolio will reflect the improvement of your understanding and lerning througout the semester in the network security course.
You will create your eportfolio using Blackboard authoring tool and you can put any kind of information (journal papers, links to websites, notes on the lectures, projects, plans, your comments on your classmates’ eportfolios, comments to the instructor, etc.) in any form (ppt, word, hypertxt, sound, video, imge, simulation, etc) you find necessary. In your eportfolio include a cover design with your name, class, a paragrah about the organization of your eportfolio, Table of contents with hyperlinks. For each artifact you included in your eportfolio state the criterion for chosing it and what you have learnt from it. As the last item in your eportfolio write a brief evaluation of your own learning in this course and the impact of using eportfolio. Be creative and look after quality in the material that you include in your eportfolio. Remember that your portfolio can serve as a binder of resources in the future.
Other people can see and comment on your eportfolio so that you can help in learning of others as well as improving of your own. Eportfolios are tools that interweave learning and assessment. By examining your portfolio your instructor will get an overall view of your understanding about the subject and thus evaluate you on your cumulative performance.
Some benefits of portfolios are :
- You will take more responsibility and increase your autonomy
- Get a broader, more in-depth look at what you know and can do.
- Actively monitor your learning and understanding about the course
- May help improve your reading and writing skills
- Reflect your understanding
- increase awareness of your strengths and weaknesses
- Create and improve continuosly your own reporsoitory of knowledge to use whenever you need.
- Gain experience in creating portfolios which later can be used for other purposes such as to document professional and academic resumes. Users can export their porftolios to be viewed outside of Blackboard, as an HTML package.
Grading Criteria:
- Cover design with name, class, title
- Table of Contents
- Cover Letter (description of the content and purpose
- Quality and relevance of the included material (articles, websites, etc.)
- Justification of the material included, and reflection on one’s learning (what you have learnt?)
- Overall evaluation of your learning in this course, the impact of using e-portfolio and addressing future learning needs.
- Quality of Presentation/Demonstration of Effort
- Other creative objects included
Some references on portfolio
What is a Portfolio http://www.stenhouse.com/pdfs/0060ch01.pdf
Eportfolio examples from students of Portland State University: http://web.pdx.edu/~pgerst/index.htm
Tutorials – eportfolio in blackboard:
- http://www.blackboard.com/quicktutorials/Bb_ePortfolios_swf.htm
- http://www.scribd.com/doc/2260472/EPortfolio-in-BlackBoard
- https://elp.northumbria.ac.uk/bbcswebdav/orgs/ORG1/StudentGuides/ePortfolios.doc
- http://www.blackboard.com/quicktutorials/quicktutorials.htm (videos for several subjects)
Each E-portfolio will have a comment section. Students will use this section to grade each others E-portfolios after each due date. Students will use only A, B, C & F grades. Every student participation in this grading process is required. No participation will result 20% grade loss in theirs final e-portfolio grades.
Course Description:
Principles of secure network communications. Techniques of authentication and identification, cryptographic key distribution and management, assurance of data integrity. Access Control. Security Policies. E-mail security, IP security, WEB security, Network management security. Discussions of the system security such as Intruders, Malicious software, Firewalls. Various commercial standards and protocols such as SSL/TLS, IPSec, S/MIME, PGP, X.509 certificates, PKI, Kerberos and VPN etc. Practical hacking and defense techniques.
Prerequisites: NONE
Required Text: William Stallings, Network Security Essentials, 4th Edition.
ISBN-10: 0136108059
ISBN-13: 9780136108054
Publisher: Prentice Hall
Copyright: 2011
Format: Paper; 432 pp
Published: 03/12/2010
Optional Texts: Matt Bishop, Computer Security, Art and Science, Charlie Kaufman, Network Security, 2nd ed; Paul Campbell, Security + Guide to Network Security Fundamentals and LAB Manual for Network Security
REFERENCE BOOKS for Practical Hacking and Defense Techniques.
CRC Press Online
- Book: Practical Hacking Techniques and Countermeasures
Mark D. Spivey, Consultant, Tomball, Texas, USA
ISBN-10: 0136122035
ISBN-13: 9780136122036
Publisher: Prentice Hall
Copyright: 2010
Format: Paper; 300 pp
Published: 07/16/2009
ISBN-10: 1435488539 ISBN-13: 9781435488533
384 Pages Paperbound
© 2010 Published
Course work and Grading:
Homework | 10% |
LABs | 10% |
Midterm | 20% |
Final | 20% |
E-Portfolio | 25% |
Discussion group and WIKI | 15% |
Final Grades are based on total course %.