Overview
In COMP 400, you will learn concepts and technologies that address the risky computer and network environment IT professionals face. The course covers cryptographic tools and algorithms, authentication and access control schemes and protocols, systems that can be used to secure computers and networks, and the security of these systems. COMP 400 concludes with an exploration of management issues in computer and network security. You will also learn to use a variety of tools and systems for security assessment, intrusion detection, information protection, digital forensics, and system recovery.
Learning outcomes
Upon successful completion of this course, you should be able to
- identify computer and information assets and the threats to the security of these assets.
- explain how some cryptographic protocols, tools, and algorithms work, and where and how they can be used.
- explain how authentication and access control can be done in various computer and information systems, and evaluate the strengths and weaknesses of those schemes and protocols.
- use various security systems and tools to secure computer and information assets and to detect intrusions.
- design new security protocols and tools for solving some network security problems.
- collect evidence and take the steps to recover from an attack.
- explain what security technology and techniques have been implemented in some popular computer and information systems.
- discuss a variety of management issues related to computer and network security.
- design and implement security policies and management-related measures for the security of computers and networks.
Evaluation
To receive credit for COMP 400, you must achieve a course composite grade of at least D (50 percent), including a grade of at least 50 percent on each assignment and at least 50 percent on the final examination. The weighting of the assessments in the course are as follows:
Activity | Weight |
Assignment 1 | 20% |
Assignment 2 | 20% |
Assignment 3 | 20% |
Class Participation | 10% |
Final Exam | 30% |
Total | 100% |
The final examination for this course must be requested in advance and written under the supervision of an AU-approved exam invigilator. Invigilators include either ProctorU or an approved in-person invigilation centre that can accommodate online exams. Students are responsible for payment of any invigilation fees. Information on exam request deadlines, invigilators, and other exam-related questions, can be found at the Exams and grades section of the Calendar.
To learn more about assignments and examinations, please refer to Athabasca University’s online Calendar.
Materials
Digital course materials
Links to the following course materials will be made available in the course:
Stallings, W., & Brown, L. (2024). Computer security: Principles and practice (5th ed.). Pearson Education.
Challenge for credit
Overview
The challenge for credit process allows you to demonstrate that you have acquired a command of the general subject matter, knowledge, intellectual and/or other skills that would normally be found in a university-level course.
Full information about challenge for credit can be found in the Undergraduate Calendar.
Evaluation
To receive credit for the COMP 400 challenge registration, you must achieve a grade of at least D (50 percent) on the challenge project and at least D (50 percent) on the challenge exam. The weighting of the final grade is as follows:
Activity | Weight |
Challenge Project | 50% |
Challenge Exam | 50% |
Total | 100% |
Challenge for credit course registration form