+94 -11- 2581245/ 7

Bookmaker betfair Bonus review by ArtBetting.co.uk

Bookmaker bet365 Bonus review by ArtBetting.co.uk

Germany bookmaker bet365.de review by ArtBetting.de

Bookmaker bet365 Bonus review by ArtBetting.gr

Course Outline of MSc in IS Program

The two years degree programme comprises of twelve (12) three (3) credit courses, the mini laboratory project and the individual industry based project. The course units are designed in such a way that the students get an insight into all aspects of computer security. Each three (3) credit course consists of two workshops covering 16 hours (8 hours each), 14 hours of lectures, 15 hours practical in-class and 15 hours personally on practical.

 

Semester 01
  • MIS1101 :Principles of Information Security

    Course ID Course Name Credits Semester
    MIS1101 Principles of Information Security 3 First

    Having completed this course the student will be able to:

    • communicate knowledge of the concepts, models and terms commonly used in the area of IT security.

    • understand the basic concepts and scientific thinking in information security.

    • identify the current IT security issues.

    • evaluate factors that influence the security of systems.

    Syllabus:

    Introduction to information security, Security Models and Policies, Program Security, Malicious Software, Operating system security, Privacy and Privacy Enhancement Tools, Steganography, Social Engineering, Security threats on Social networks

  • MIS1102 : Cryptographic Systems

    Course ID Course Name Credits Semester
    MIS1102 Cryptographic Systems 3 First

    Having completed this course the student will be able to:

    • understand the basic concepts and scientific thinking in cryptography.

    • describe a number of cryptographic algorithms and protocols.

    • do security proofs for cryptographic schemes.

    • prove the security of cryptographic protocols.

    Syllabus:

    Cryptography overview, one-way functions, pseudo-randomness, hash functions, symmetric encryption, authentication systems, public-key encryption systems, digital signature schemes, Interactive Proofs, Elliptic curve cryptosystems, Cryptographic protocols such as zero-knowledge protocols and e-voting, two-party secure computation, multiparty secure computation, and chosen-ciphertext security, Quantum Cryptography

  • MIS1103 :Information Risk Management and Audit

    Course ID Course Name Credits Semester
    MIS1103 Information Risk Management and Audit 3 First

    Having completed this course the student will be able to:

    • understand the interactions between security concerns, business objectives and organizational processes.

    • have acquired profound knowledge about some of the existing models, analysis methods and tools for cryptographic protocols/access control/information flow: underlying assumptions, techniques, limitations, relationships.

    • systematically apply methods and techniques to evaluate security risk and ensure compliance with principles of governance.

    • plan and implement a risk management strategy and security audit

    Syllabus:

    Operative risk, Risk tolerance and risk appetite, Risk analysis and vulnerability assessment, Cost/benefit analysis, Communicating risk and developing risk metrics, Identifying risk mitigations, Acceptance Criteria, Internal Control, Audit and Security.

  • MIS1104 :Network Security

    Course ID Course Name Credits Semester
    MIS1104 Network Security 3 First

    Having completed this course the student will be able to:

    • understand the security threats, mechanisms, protocols and services in computer networks.

    • analyze and evaluate the implementation and functioning of network applications and decide on their suitability from the security point of view.

    • design and implement applications that provide or use security services in computer networks.

    Syllabus:

    Digital signatures, Public-Key Infrastructure (PKI) and Trusted Third Party (TTP), Message authentication, Network authentication (Kerberos), Web security protocols such as SSL, Email security protocols, VPN technology (IPSec), Security in IPV6 networks, Firewalls, Security in Web services, Intruder Detection and Prevention, DNS security

 

Semester 02
  • MIS2101 :Database Security

    Course ID Course Name Credits Semester
    MIS2101 Database Security 3 Third

    Having completed this course the student will be able to:

    • Understand security threats with respect to Database applications.
    • Understand the concepts and security mechanisms/measures in protecting data
    • Design and implement secure database applications/frameworks to suit different security requirements.

    Syllabus:

    Introduction to Database Security, Database Authentication, Discretionary Access Control, Role Based Access Control, Mandatory Access Control, Security threats with respect to SQL injections, Database Inference, Virtual Private Databases (VPD), Security in Statistical Databases, Encryption mechanisms in Databases, Database Auditing, Data mining.

  • MIS2102 :Digital Forensics

    Course ID Course Name Credits Semester
    MIS2102 Digital Forensics 3 Third

    Having completed this course the student will be able to:

    • relate computer security methodologies to criminal methods

    • apply the necessary methodologies to conduct a computer forensics examination.

    • application of Linux operating system for forensics analysis of seized media.

    • analyze hidden information from pictures and digital audio files utilizing stenography software.

    Syllabus:

    Types of computer crime, Computer misuse, Data protection, Criminal damage, Software piracy, Forgery, Pornography, Unsuitable material, Cybercrime methodologies, Computer forensics investigative theory, Computer forensics processing techniques, File system forensics, Forensics network investigations, Linux for forensics analysis, Linux forensics tools, Forensics investigation on mobile devices

  • MIS2103 :Security in Mobile and Wireless Networks

    Course ID Course Name Credits Semester
    MIS2103 Security in Mobile and Wireless Networks 3 Second

    Having completed this course the student will be able to:

    • understand the types and characteristics of wireless networks, threats associated with wireless networks.

    • understand the security mechanisms and protocols used in mobile and wireless networks.

    • analyze the security of mobile and wireless networks and decide on its suitability for specific applications.

    • design and implement security solutions for mobile and wireless networks.

    • suggest improvements for security of a wireless network.

    Syllabus:

    Overview of technologies and protocols, security threats and problems , Overview and analysis of security features in the 802.11 standard and protocols such as WPA, RSN, EAP, RADIUS , Security in WPAN (802.15 / Bluetooth), Key Management Protocols:WPA/RSN, TKIP, AES–CCMP , Security in Ad Hoc Networks , Wireless sensor technologies, cryptographic algorithms, security protocols, Security in Wireless Wide Area Networks : GSM, 3G, UMTS , RFIDs and NFC Protocol, 6LoWPAN.

  • MIS2104 :Project Management

    Course ID Course Name Credits Semester
    MIS2104 Project Management 3 Second

    Having completed this course the student will be able to:

    • list and discuss basic project success criteria and common reasons for project failure.
    • discuss techniques for setting up a successful project.
    • list and discuss elements of a risk management plan.
    • understand the general issues of project management.
    • understand how people people work as team members and as individuals.
    • prepare a various project documents to a professional standard.
    • improve the ability to communicate effectively both orally and in writing.

    Syllabus:

    Importance of software project management, Project Planning, Project Scheduling, Cost Management, Project Quality Management, Human Resources Management, Communication Management, Risk Management, Procurement Management, Management Process Groups, Writing project proposal, Grant applications, Progress reports, and articles

 

Semester 03
  • MIS3101 : Information and Coding Theory

    Course ID Course Name Credits Semester
    MIS3101 Information and Coding Theory 3 Second

    Having completed this course the student will be able to:

    • understand the principles and applications of information theory in data compression, transmission, storage and processing.

    • analysis, design and optimization tool for wireless systems and networks, sensor networks, network information flow.

    Syllabus:

    Entropy: entropy, relative entropy, mutual information, chain rules, data processing inequality, the asymptotic equipartition property, entropy rates for stochastic processes, Data Compression: the Kraft inequality, arithmetic coding etc., Channel Capacity: discrete channels, random coding bound and converse, Gaussian channels, Error Control Coding: linear block codes and their properties, hard-decision decoding, cyclic codes, Homomorphic encryption

  • MIS3102 :Secure Software Systems

    Course ID Course Name Credits Semester
    MIS3102 Secure Software Systems 3 Second

    Having completed this course the student will be able to:

    • understand the security features and functionality of the software application development frameworks

    • understand the security issues and security solutions related to electronic commerce applications and transactions.

    • design and implement secure software applications.

    • analyze and evaluate the implementation and functioning of an electronic commerce application and decide on its security properties.

    Syllabus:

    Security lifecycle: models and processes, Standards, methods, and mechanisms, Software threats and vulnerabilities, Security of modern operating systems, Secure software design principles, Secure coding principles, Verification and validation, Managing Code & Documentation, Programing languages security, Hardware systems for security

  • MIS3103 :Information Security Governance

    Course ID Course Name Credits Semester
    MIS3103 Information Security Governance 3 Third

    Having completed this course the student will be able to:

    • understand and operate effectively within the context in which information security management is conducted

    • understand and apply the principles and philosophies which underlie successful information security governance

    • understand the interactions between information security concerns and business objectives and organizational processes

    • understand the issues in designing and implementing information security policies

    • estimate, plan and critically evaluate information security activities within the implementation of a project and operations

    Syllabus:

    Principles for information security practitioners, Information security management practices, with focus on governance, Business Model for Information Security (BMIS), with case studies, Threats, Compliance, Security Controls, Information security governance with case study, Security Policy, Industry best practices, Incident Management, Business Continuity, ISO27001, Cobit

  • MIS3104 :Individual Project

    Course ID Course Name Credits Semester
    MIS3104 Individual Project 10 Third

    Project work chosen and completed under supervision of a senior lecturer, which results in project report accepted by three-member academic committee. The project report must be defended in oral presentation. Students are expected to meet with their supervisor on a regular basis, as agreed with the supervisor, keep log forms and provide an interim report.

 

Semester 04
  • MIS4101 :Cyber Security and Law

    Course ID Course Name Credits Semester
    MIS4101 Cyber Security and Law 3 Fourth

    Having completed this course the student will be able to:

    • describe how computers and other technologies are used to commit cybercrimes

    • discuss the social theories of computer-enabled abuse

    • discuss law enforcement’s response to cybercrime

    • describe the basic principles of the Sri Lankan legal system.

    • explain the business challenges facing financial institutions with regard to information security law

    • list some of the challenges with protecting children on the Internet and describe laws in place to protect children

    Syllabus:

    Web application security, Cloud Security, Cyberwar, General Criminal Law Concepts, Intellectual property law, Electronic signatures law, Dispute resolution on the Internet, Digital criminal law, Common criminal Laws used in cyberspace, computer/digital evidence, Cyber forensics process (e.g., ACPO guidelines)

  • MIS4102 :Applied Security Mini Project

    Course ID Course Name Credits Semester
    MIS4102 Applied Security Mini Project 4 Fourth

    Mini project works completed under supervision of a senior lecturer, which results in laboratory reports or log forms. The mini project will be defined by the senior lecture and should implemented within the given time. Students are expected to work as group as agreed with the lecturer and produced log forms or laboratory reports individually. Minimum of eight (8) and maximum of ten (10) mini projects will be given under this course.