Networking and Security Programming Courses
DATABASE MANAGEMENT SYSTEMS
File Organization. Indexing techniques. Data models. Query Languages. B-trees, B*-trees, B+-trees. Study design and implementation of a relational database. Students apply concepts from data structures and compiler design in database management.
FOUNDATIONS OF COMPUTER NETWORKS
Network Communication: Internal Structure, Interfaces, Routing, Buffering, and Congestion Control, Sockets. Network Protocols. TCP algorithms.
ROUTING AND SWITCHING
LAN and WAN protocols. LAN and WAN design issues. IP routing. IP Multicast. Frame relay. Router token ring. ATM routing and switching.
Security protocols. Security technologies: Concepts-Firewalls, Content Filters, Public Key Infrastructure (PKI), Authentication Technologies, Authorization technologies, Virtual Private Networks (VPN), Networking IDS anomaly, signature, passive, inline. Host Intrusion Prevention Cisco Threat Response. Routing and switching security features: IE mac address controls, port security, dhcp snoop.
Computers are the basic components of networks, and are often the entry point to those. Moreover, these end points are directly accessed by human users, and therefore are most prone to security breaches. In this course we will discuss various security risks in computers, various methods for exploiting these, and ways to protect against those. From simple Viruses transferred by files, to security holes in web browsers and network programs, to user unauthorized access, security issues will be addressed in the context of access control, security models, identification and authentication, cryptography, and more.