COURSE OUTCOMES 

Upon completion of this course, the student will be able to 

CO1: identify common network security vulnerabilities and attacks (K2). 

CO2: apply standard cryptographic algorithms to avoid basic level threats. (K3).

CO3: comprehend the issues involved in hash functions, authentication applications and key management (K2). 

CO4: realize the importance of security practice and system security (K2). 

CO5: acquire the knowledge of internet security protocols.(K2).