CE348 : Infomation security
Course Outcome
CO1 : Define various security goal and understand the security policies such as the CIA triad of Confidentiality, Integrity and Availability.
CO2 : Classify various forms of security attacks, where they arise, and appropriate tools or mechanism to quantify them.
CO3 : Illustrate a basic understanding of cryptography, how it has evolved, and evaluate symmetric key encryption techniques used today.
CO4 : Distinguish modern symmetric encryption standard, key distribution scenario and analyse effectiveness in todays’ environment.
CO5 : Evaluate Asymmetric key encryption techniques, key distribution scenario and calculate public and private components of asymmetric key encryption techniques.
CO6 : Develop message integrity and message authentication of message digest.
Teaching and Examination Scheme
Resource Person
External Resource Person
Mr.Keyur Talati, Security Analyst @ Websecure app