Internet and E-Security - B.Tech
Network Section
GOAL:
Provide both practical and technical skills, and a broad high-level understanding of Internet and E-Security. It also focuses on security professionals providing in-depth instruction on new security ideas, concepts, and techniques to prevent and react to malicious intrusion and to secure information assets.
PROGRAM OBJECTIVES:
- Understand distributed resource and network management and computational intelligence.
- Meet the increasing needs of organizations and our communities to understand, prepare for, respond to, and recover from threats to our information infrastructures.
PROGRAM LEARNING OUTCOMES:
Graduates should be able to:
- Gain the fundamentals of the provision of security in information and Internet, as well as an appreciation of some of the problems that arise in devising practical solutions to E-security requirements.
- Hands-on experience with programming techniques for security protocols
- Analyze, design, and plan the implementation of a corporate computer network that meets the technical requirements.
- Measure, analyze, and optimize security performance
- Generate instruction in contingency/disaster recovery, and build procedures for contingency planning and security policy formulation and enforcement.
- Recognize the security issues that arise in a variety of applications
- Appreciate how and why particular applications can address various security concerns
- Illustrate the cryptographic techniques, aims and types of cryptographic methods, Level of security, cover time and key exhaustion.
- Explain and discuss the related legal and national policy
- Determine if an incident has occurred and how incident response teams work, manage trouble tickets, and basic analysis of the events.
- Apply Disaster recovery planning and testing
- Develop risk training and management programs
- Apply Security policy formulation and enforcement
- Plan Network systems security.
- Apply the Network management security
- Demonstrate Network defaces: Firewalls and intrusion detection systems, and the threats they counter.
- Define the underlying concepts in client server development using commonly accesses databases.