University Catalog

Print Page

IA 606. Security and Cryptographic Protocols

Credits: 3
Department: Computer Science
Description: Architecture network devices and protocols. Security protocols for authentication, e-mail, web, IP, VoIP, and wireless computing. Cryptographic techniques for providing data confidentiality, integrity, non-repudiation and information assurance.
Prerequisites: Permission of instructor.
Semester Offered: Fall
Grading Method:

Student Learning Outcomes

1. Identify the threats to the security of network devices and services.
2. Evaluate the security of protocols for email, web, VoIP, electronic transactions, and wireless networks.
3. Design and analyze cryptographic methods for encryption, decryption, key verification and hashing.
4. Evaluate security of cryptographic protocols.
5. Use security standards to evaluate and secure TCP/IP-based networks and applications.
6. Evaluate the legal and social implications of cryptographic technology.

The contents in this catalog and other university publications, policies, fees, bulletins or announcements are subject to change without notice and do not constitute an irrevocable contract between any student and St. Cloud State University.