SE205: Information Security

This course is part of the Cairo University Software Engineering Professional Master's Degree program.

Course Syllabus

Unit Main Topics Key Concepts Algorithms / Tools Interactive Material
Unit 1 - Introduction to Information Security
- Security Threats & Attacks
- Security Services (CIA Triad)
- Security Mechanisms
- Network Security Models
- Importance of Security (Big Data, Internet Growth)
- Historical Context (ARPANET)
- Information Security Definition
- Confidentiality, Integrity, Availability (CIA)
- Security Threats vs. Attacks
- Active vs. Passive Attacks (Masquerade, Replay, DoS, Eavesdropping, Traffic Analysis)
- Security Mechanisms (Encipherment, Access Control, Integrity, Digital Signature, Padding)
- OSI Security Architecture Overview
- General & Network Access Security Models
- Security Trinity (Prevention, Detection, Response)
- CIA Triad
- Attack Classification
- Security Models
Quiz 1
Unit 2 - Cryptography Concepts
- Symmetric Key Ciphers
- Classical Encryption Techniques
- Modern Symmetric Block Ciphers
- Cryptography Dimensions (Operations, Keys, Processing)
- Terminology (Plaintext, Ciphertext, Encrypt, Decrypt, Key, Cipher)
- Symmetric vs. Asymmetric Overview
- Cryptanalysis (Goals, Brute-Force)
- Substitution vs. Transposition
- Stream vs. Block Ciphers
- Classical Ciphers (Caesar, Monoalphabetic, Polyalphabetic, Playfair, Hill, Rail Fence)
- Simple Modern Ciphers (XOR)
- DES (Structure, Features, Weaknesses)
- SDES (Simplified DES for learning)
- 3DES (Structure, Keying Options)
- AES (Structure, Key Sizes, Rounds, Operations: SubBytes, ShiftRows, MixColumns, AddRoundKey)
- Caesar Cipher
- Playfair Cipher
- Hill Cipher
- Rail Fence Cipher
- XOR Cipher
- DES / SDES
- 3DES
- AES
1. Quiz 2

2. Cryptography visualizer

3. S-DES key generator visualizer
Unit 3 - Asymmetric Key Cryptography
- Public Key Principles
- RSA Algorithm
- Diffie-Hellman Key Exchange
- Other Asymmetric Systems
- Public/Private Key Pairs
- Encryption/Decryption Process
- Authentication with Asymmetric Keys
- Secrecy & Authentication Combined
- Applications (Encryption, Digital Signatures, Key Exchange)
- Requirements for Public Key Crypto
- Cryptanalysis (Brute-force, Factoring)
- Symmetric vs. Asymmetric (Comparison: Speed, Keys, Management, Use Cases)
- Hybrid Approach (e.g., TLS/SSL, PGP)
- RSA Algorithm Steps (Key Gen, Encrypt, Decrypt)
- Euler Totient Function
- Diffie-Hellman Steps (Setup, Key Calculation)
- Primitive Roots, Modulo Arithmetic
- ElGamal, ECC (Concepts)
- RSA
- Diffie-Hellman
- ElGamal
- ECC
1. Quiz 3
2. RSA Visualizer
Unit 4 - Message Authentication
- Hash Functions
- MAC Algorithms
- Digital Signatures
- SHA Algorithms
- Blockchain Hashing
- Need for Authentication (Integrity, Sender ID, Replay Prevention)
- Authentication Functions Overview
- Hash Function Definition & Purpose
- Properties (One-way, Collision Resistance)
- Preimage vs. Collision
- Hash Applications (Integrity Check, Passwords, MACs, Signatures)
- Message Authentication Code (MAC) Process
- Keyed Hash Function
- HMAC vs. CMAC (Concept)
- Digital Signature Process (Hashing + Asymmetric Encryption)
- Simple Hash Functions (XOR-based)
- Security Requirements for Hash Functions
- Attacks (Brute-Force, Cryptanalysis, Birthday Attack)
- Secure Hash Structure (Merkle–Damgård)
- SHA Family (SHA-1, SHA-2 variants, SHA-3 Keccak/Sponge Construction)
- Blockchain Basics (Ledger, Blocks, Chaining, Hashes, Immutability)
- Block Structure (Header, Body, Merkle Root, Nonce)
- Proof-of-Work vs. Proof-of-Stake
- MAC (HMAC, CMAC)
- Digital Signatures
- SHA-1
- SHA-2 (256, 512)
- SHA-3
- Merkle Trees
- PoW / PoS
Final revesion (all chapters)
Unit 5 - Secure Software Design (SSDLC)
- Web Application Security
- Firewalls
- Secure Software Development Life Cycle (SSDLC) vs. SDLC
- Importance of Early Security Integration
- Key Principles (Security by Design, Monitoring, Risk Assessment, Training, Collaboration)
- 7 Secure Design Principles (SaC, Secure Defaults, Least Privilege, SoD, Minimize Attack Surface, Complete Mediation, Fail Securely)
- Best Practices for Secure Development
- Web Security Principles (AuthN, Confidentiality, Integrity, Availability)
- Common Web Threats (SQL Injection, Cross-Site Scripting - XSS, Broken Authentication)
- Firewall Purpose & Function
- Firewall Types (Packet Filtering, Stateful, Proxy, NGFW)
- Web Application Firewall (WAF) - Purpose, How it works (Reverse Proxy), Relation to SQLi/XSS protection.
- SSDLC Methodologies
- OWASP Top 10 (Implied)
- Firewalls (Various Types)
- WAF

Course Objectives

Grading

Assignments (Examples from Slides)

Course References

Original repo