Syllabus for Computer Systems and Data Security Course Code: Instructor: John Paul Maniwang Semester: 2nd Sem Class Schedule: Monday 10:00 – 1:00 Location: Room 103 Course Description This course introduces the foundations of computer systems security, covering risk management, cryptography, malware analysis, attack strategies, security solutions, and incident response. Students will learn practical and theoretical aspects to protect systems and data effectively. Course Objectives By the end of this course, students should be able to: Understand the fundamentals of system security and risk management. Apply cryptographic techniques to secure data. Identify and mitigate malware threats. Analyze security protocols and common attack strategies. Implement access controls and security solutions for network and system protection. Develop incident response strategies and ensure continuity in the face of security threats. Course Outline Week 1 (Prelim Period) Topic 1: Introduction Managing Risk Learning the Lingo Hacker Culture Threat Actors Lab: Think Like a Hacker Review Questions Week 2 Topic 2: Cryptography (Part 1) Why do we need cryptography? Terminology Keys Mathematical Foundations Week 3 Topic 2: Cryptography (Part 2) Hashes Symmetric and Asymmetric Encryption Stream and Block Ciphers Encryption Examples Lab: Hash it Out Review Questions Week 4 Prelim Exam Week 5 (Midterm Period) Topic 3: Malware What is Malware? Malware Targets Types of Malware Indicators of Compromise Delivery of Malware Cyber Killchain Lab: Malware Analysis Review Questions Week 6 Topic 4: Protocols Network Access Layer Internet Layer Protocols Transport and Application Layer Protocols Lab: Scanning with nmap Review Questions Week 7 Topic 5: Attacks Interception Attacks Network Layer and Internet Layer Attacks Name Resolution and Web-based Attacks Lab: MitM with Scapy Review Questions Week 8 Midterm Exam Week 9 (Final Period) Topic 6: Security Solutions False Positives / Negatives Layered Security Network Solutions EDR and Data Loss Prevention IDS/IPS, Email Solutions, SIEM Lab: Exploiting log4j Review Questions Topic 7: Access Controls General Principles and Techniques Physical and Network Access Lab: Linux File Permissions Review Questions Week 10 Topic 8: Incident Response and Continuity Security Organizations and SOC Incidents and Response MITRE ATT&CK Framework Lab: Reporting on the 2014 Sony Pictures Hack Review Questions Final Exam Grading System Prelim Exam: 20% Midterm Exam: 20% Final Exam: 20% Lab Exercises: 25% Participation and Assignments: 15% Textbook/Reference Computer Systems Security: Planning for Success by Ryan Tolboom Course Policies Academic Integrity: Cheating and plagiarism will result in disciplinary action. Attendance: Regular attendance is mandatory. Lab Work: Practical assignments must be completed by the deadline.