CS 4310 : Computer and Network Security
CS 4310: Computer and Network Security
Semester Hours: 3.0
Contact Hours: 3
Coordinator: Ruinian Li
Text: Readings provided by instructor
Author(s): VARIED
Year: Varied
SPECIFIC COURSE INFORMATION
Catalog Description
Cryptographic techniques, including hashing, key distribution, and authentication; Comprehensive study of security protocols such as IPsec, SSH, VPN and TLS; Attacks and defenses in remote access, web applications and wireless networks; Hands-on experience with penetration testing, data protection with cryptographic algorithms in secure applications; security implications of emerging technologies. Prerequisites: a grade of C or better in CS 2310 or CS 3320, and a corequisite of CS 4390.
Course type: ELECTIVE
SPECIFIC COURSE GOALS
- I can compare common authentication schemes. (Analyze)
- I can analyze common security protocols in network communication. (Analyze)
- I can assess defense mechanisms for common web attacks. (Evaluate)
- I can assess defense mechanisms for common wireless attacks. (Evaluate)
- I can utilize common penetration tests. (Apply)
- I can evaluate cryptographic algorithms to protect data privacy in online applications. (Evaluate)
LIST OF TOPICS COVERED
- Introduction to Computer and Network Security (~7%)
- Overview of basic network protocols
- Understanding malwares and their types
- Role and functionality of security gateways
- Denial of service attacks and mitigation techniques
- Cryptography Fundamentals (~10%)
- Computational difficulty in cryptography
- Random numbers
- Security foundation of symmetric/asymmetric encryption algorithms
- Cryptographic hashes: password hashing, commitment schemes, Merkle trees
- Authentication (~7%)
- Password-based authentication
- Address-based authentication
- Biometrics in authentication
- Key distribution and recovery
- Remote Access Attacks and Defenses (~10%)
- Transport layer security (TLS)
- IPsec, IKE (Internet Key Exchange Protocol)
- SSH authentication and tunneling mechanisms
- VPN and anonymous communication
- Web Attacks and Defenses (~18%)
- Cross-Site scripting and defenses
- Cross-Site request forgery and defenses
- Injection attacks and defenses
- DNS attacks and defenses
- Wireless Attacks and Defenses (~10%)
- Packet sniffing and spoofing, and defenses
- Jamming Attacks and defenses
- Penetration Testing and Security Assessments (~14%)
- Basic penetration testing techniques and tools
- Social engineering attacks and human factors in security
- Practical security assessment methodologies
- Cryptographic Techniques for Data Protection (~7%)
- Proxy-based re-encryption scheme
- Identity-based and attribute-based encryption
- Homomorphic encryption, secret sharing, and zero-knowledge proof
- Blockchain (~7%)
- Introduction to Bitcoin and Ethereum
- Decentralized identifiers (DIDs) and their role
- Machine Learning and Security (~7%)
- Adversarial examples in machine learning
- Generative adversarial networks (GANs)
- Machine learning techniques for security analytics
- Security for Emerging Network Technologies: (~7%)
- 5G security considerations
- IoT network security challenges
- Edge computing and its implications for network security
Updated: 12/15/2025 04:47PM