ITOP 2414: Encryption, Public Key Infrastructure Architecture and Administration
Effective date
September 2021
School
Continuing Studies
Description
This course covers topics on encryption technology, security techniques, and their application to a production network. Students will gain conceptual overviews of cryptographic algorithms, confidentiality, integrity, authentication, non-repudiation, access control, and cryptographic standards and protocols. Students will examine public key infrastructure (PKI) concepts, including certificates, revocation and trust models.
Year of study
2nd Year Post-secondary
Course Learning Outcomes
Upon successful completion of this course, students will be able to:
- Describe basic principles of network security
- Utilize various encryption and decryption algorithms to explain need of cryptography
- Identify vulnerabilities in common cryptographic techniques
- Explain Public Key Infrastructure (PKI) from a security perspective
- Identify measures to increase system security with digital signatures or other authentication protocols
- Analyze the strengths and weaknesses of web-browser security
- Secure system against attacks, such as malware, and ransomware
Prior Learning Assessment & Recognition (PLAR)
Please see the Program Content Guide.
Hours
Lecture, Online, Seminar, Tutorial: 54
Total Hours: 54
Instructional Strategies
Students will engage with the material through a combination of interactive learning methods, such as hands-on activities, case studies, simulations, group work/discussions, demonstration and troubleshooting of problem-based tasks, projects, and exams.
Grading System
Letter Grade (A-F)
Evaluation Plan
Type
|
Percentage
|
Assessment activity
|
Assignments
|
25
|
Typically delivered in class
|
Quizzes/Tests
|
40
|
Five to ten quizzes
|
Final Exam
|
35
|
All chapters from textbook
|
Course topics
- Computer Security Concepts and OSI Security Architecture
Encryption Techniques
Steganography
Block Ciphers, including Data Encryption Standard (DES), Advanced Encryption Standard (AES), and Triple DES (TDES)
Pseudo-Random Number Generators (PRNGs)
Public Key Cryptosystems, including RSA
Key agreement protocol, including Elliptic-curve Diffie–Hellman (ECDH)
Hash Functions , including SHA-3
Message Authentication Codes (MACs), including HMAC, DAA, CMAC, CCM and GCM
Digital Signatures
Symmetric key distribution using symmetric and asymmetric encryption
Distribution of public keys
User Authentication Protocols and remote user authentication using symmetric encryption
Kerberos protocol
Transport Layer Security (TLS) and Secure Sockets Layer (SSL), HTTPS and Secure Shell (SSH)
E-mail Security, including Secure/Multipurpose Internet Mail Extensions (S/MIME) and Pretty Good Privacy (PGP)
Intruder classification, behaviour, and detection
Password management
Firewalls
Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks
Learning resources
Cryptography and Network Security by William Stallings
Notes:
- Course contents and descriptions, offerings and schedules are subject to change without notice.
- Students are required to follow all College policies including ones that govern their educational experience at VCC. Policies are available on the VCC website at:
https://www.vcc.ca/about/governance--policies/policies/.
- To find out if there are existing transfer agreements for this course, visit the BC Transfer Guide at https://www.bctransferguide.ca.