0% found this document useful (0 votes)
134 views

Information security-LAB

Uploaded by

musabahmad090
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
134 views

Information security-LAB

Uploaded by

musabahmad090
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

SIXTEEN WEEK TEACHING PLAN

Course & Course Code Information Security Lab / COSC-2211


Credit Hours 1
Pre-Requisite(s), if any NO
Department / Institute Data Science & AI
Faculty Faculty of Information technology
Program/semester/section BS-Artificial Intelligence

Week 1
Objectives / Learning Outcome Understand the basic concepts and scientific thinking in
information
Contents / Sub Contents • Write a program to perform Encryption / Decryption using
Caesar cipher.
Week 2
Objectives / Learning Outcome Understand the basic concepts and scientific thinking in
information security.
Contents / Sub Contents • Write a program to perform Encryption / Decryption using
playfair system.
Week 3
Objectives / Learning Outcome Understand the basic concepts and scientific thinking in
information.
Contents / Sub Contents • Write a program to perform Encryption / Decryption using
Hill cipherTechnique.
Week 4
Objectives / Learning Outcome Explain key concepts of information security such as design
principles, cryptography, risk management, and ethics.
Contents / Sub Contents • Write a program to perform Encryption / Decryption using
transposition technique.
Week 5
Objectives / Learning Outcome Explain key concepts of information security such as design
principles, cryptography, risk management, and ethics.
Contents / Sub Contents • Write a Program to implement AES.
Week 6
Objectives / Learning Outcome Explain key concepts of information security such as design
principles, cryptography, risk management, and ethics.
Contents / Sub Contents • Write a program for DES algorithm to encrypt and
decrypt the data.
Week 7
Objectives / Learning Outcome Understand the basic concepts and scientific thinking in
information
Contents / Sub Contents • Write a program to perform Encryption/Decryption using
Diffie-Helmen Key exchange.
Week 8
Objectives / Learning Outcome 1. Understand the basic concepts and scientific thinking in
information security.
2. Explain key concepts of information security such as
design principles, cryptography, risk management, and
ethics
3. Identify the current IT security issues.
Contents / Sub Contents • Write a program for simple RSA algorithm to encrypt and
decrypt the data.
Week 9
Objectives / Learning Outcome Identify the current IT security issues.
Contents / Sub Contents • Write a program for hashing in MD5.
Appropriate Teaching Strategies / Tutorial, Lab
Methods
Week 10
Objectives / Learning Outcome 1. Identify the current IT security issues.
2. Apply various security and risk management tools for
achieving information security and privacy
3. Identify appropriate techniques to tackle and solve
problems in the discipline of information security

Contents / Sub Contents • Write a program for hashing in SHA1.


Week 11
Objectives / Learning Outcome 1. Identify the current IT security issues.
2. Apply various security and risk management tools for
achieving information security and privacy
3. Identify appropriate techniques to tackle and solve
problems in the discipline of information security
Contents / Sub Contents • Write a program for hashing in SHA256.
Week 12
Objectives / Learning Outcome 1. Identify the current IT security issues.
2. Apply various security and risk management tools for
achieving information security and privacy
3. Identify appropriate techniques to tackle and solve
problems in the discipline of information security
4. Discuss legal, ethical, and professional issues in
information security

Contents / Sub Contents • Write a program for hashing in Whirlpool.


Week 13
Objectives / Learning Outcome 1. Identify the current IT security issues.
2. Apply various security and risk management tools for
achieving information security and privacy
3. Identify appropriate techniques to tackle and solve
problems in the discipline of information security.
4. Discuss legal, ethical, and professional issues in
information security
Contents / Sub Contents • Write a program for encryption/hashing of different
algorithm with salt function.
Week 14
Objectives / Learning Outcome 1. Discuss legal, ethical, and professional issues in
information security
2. Identify appropriate techniques to tackle and solve
problems in the discipline of information security

Contents / Sub Contents • Write a program for Encryption/Decryption using


different algorithm with hash function.
Week 15
Objectives / Learning Outcome Identify appropriate techniques to tackle and solve problems
in the discipline of information security
Contents / Sub Contents • Write a program for creating digital signature.
Week 16
Objectives / Learning Outcome 1. Understand the basic concepts and scientific thinking
in information security.
2. Explain key concepts of information security such as
design principles, cryptography, risk management, and
ethics
3. Discuss legal, ethical, and professional issues in
information security
4. Identify the current IT security issues.
5. Apply various security and risk management tools for
achieving information security and privacy
6. Identify appropriate techniques to tackle and solve
problems in the discipline of information security

Contents / Sub Contents • Final Lab

Curriculum Contents: Information security foundations, security design principles; security mechanisms,
symmetric and asymmetric cryptography, encryption, hash functions, digital signatures, key management,
authentication and access control; software security, malware, database security; network security, firewalls,
intrusion detection; security policies, risk assessment, cybercrime, law, privacy and anonymity of data.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy