| Course Name |
(中) 網路安全(6924) |
| (Eng.) Network Security |
| Offering Dept |
Graduate Institute of Data Science and Information Computing |
| Course Type |
Elective |
Credits |
3 |
Teacher |
Pei-Ju Lee |
| Department |
Doctoral Program in Big Data Analytics for Industrial ApplicationsPh.D |
Language |
English |
Semester |
2026-SPRING |
| Course Description |
This course will cover three aspects of Information Security: traditional cryptography (cryptosystems, authentications, and digital signatures), network and internet security (intrusion detection, response, and communication security services), and security management (security management principles, models, and practices). |
| Prerequisites |
|
self-directed learning in the course |
Y |
| Relevance of Course Objectives and Core Learning Outcomes(%) |
Teaching and Assessment Methods for Course Objectives |
| Course Objectives |
Competency Indicators |
Ratio(%) |
Teaching Methods |
Assessment Methods |
| There are a number of benefits people can acquire with the popularity of the computer and internet nowadays; however, the more convenient or more critical a service, the higher is the level of security required. The main focus of this course are aim to equip students with cryptography and information security knowledge as well as security management skills. This course will cover three aspects of Information Security: traditional cryptography (cryptosystems, authentications, and digital signatures), network and internet security (intrusion detection, response, and communication security services), and security management (security management principles, models, and practices). |
|
|
|
| Attendance |
| Assignment |
| Quiz |
|
| Course Content and Homework/Schedule/Tests Schedule |
| Week |
Course Content |
| Week 1 |
Introduction [W. Stallings] 1, 2 |
| Week 2 |
Block Ciphers, the Data Encryption Standard, [W. Stallings] 3 |
| Week 3 |
Basic Number Theory, Finite Fields, Advance Encryption Standard [W. Stallings] 4, 5 |
| Week 4 |
Block Cipher Operation, Pseudorandom Number Generation, Stream Ciphers [W. Stallings] 6, 7 |
| Week 5 |
More Number Theory [W. Stallings] 8 |
| Week 6 |
Public-Key Cryptosystems, RSA [W. Stallings] 9 |
| Week 7 |
Other Public-Key Cryptosystems [W. Stallings] 10 |
| Week 8 |
Midterm |
| Week 9 |
Cryptographic Hash Functions [W. Stallings] 11 |
| Week 10 |
Message Authentication Codes [W. Stallings] 12 |
| Week 11 |
Digital Signatures [W. Stallings] 13 |
| Week 12 |
Key Management and Distribution [W. Stallings] 14 |
| Week 13 |
User Authentication [W. Stallings] 15 |
| Week 14 |
Network Access Control, Cloud Security [W. Stallings] 16 |
| Week 15 |
Transport-Level Security, Wireless Network Security [W. Stallings] 17, 18 |
| Week 16 |
Final
|
self-directed learning |
   02.Viewing multimedia materials related to industry and academia.
|
|
| Evaluation |
課堂參與 Participation 4 %
作業Homework 36 %
期中考Midterm 30 %
期末考Final 30 % |
| Textbook & other References |
| William Stallings, Cryptography and Network Security: Principles and Practice, Pearson. |
| Teaching Aids & Teacher's Website |
|
| Office Hours |
| Wednesday 10:00am-12:00pm or by appointment |
| Sustainable Development Goals, SDGs(Link URL) |
| 04.Quality Education | include experience courses:N |
|