Skip to main content
رقم المقرر ورمزه اسم المقرر نوع المقرر الوحدات المعتمدة الوحدات العملية الوحدات النظرية المتطلبات الأساسية للمقرر
سيب 270 التشفير مقرر من الخطة 3 2 2
وصف المقرر
This course introduces fundamental cryptographic concepts and their application in computer security, covering both theoretical principles and practical implementations. Topics include symmetric/asymmetric encryption algorithms, key management, digital certificates/signatures, hash functions, encryption protocols/standards, and types of attacks. Discussions delve into threats, attacks, and countermeasures, encompassing cryptosystems, cryptographic protocols, and secure systems/networks.theoretical principles and practical implementations. Topics include symmetric/asymmetric encryption algorithms, key management, digital certificates/signatures, hash functions, encryption protocols/standards, and types of attacks. Discussions delve into threats, attacks, and countermeasures, encompassing cryptosystems, cryptographic protocols, and secure systems/networks.systems. Its primary objective is to provide students with a broad overview of computer operating systems, including Windows, Linux, Unix, and more. Throughout the course, a Unix-based system will be used as the primary platform for hands-on learning. Topics include an overview of the components of an operating system, process concept, concurrency, process scheduling and interprocess communication, threads, multicore systems, process synchronization, deadlock handling, memory management and Storage management. The course will also include topics on command-line usage for operating system commands

هل كانت هذه الصفحة مفيدة؟

0% من المستخدمين قالو نعم من 0 تعليقا.

من فضلك أخبرنا بالسبب(يمكنك اختيار خيارات متعددة)