This course is designed to provide the student with an introduction to information security
This course also includes the technical and operational issues of information security. The
student will learn about threats including schemes for breaking security, and techniques for
preventing security violations. Course work includes conventional and public-key
cryptosystems and their applications to achieve various security goals
Published Date
13 Thul-Qi’dah 1444
Last Change Date
13 Thul-Qi’dah 1444