Syllabus: AIT Information Systems Infrastructure Lifecycle Management
|
|
|
- Madlyn Bradley
- 10 years ago
- Views:
Transcription
1 Syllabus: AIT Information Systems Infrastructure Lifecycle Management Term: Fall 2014 Instructor: Jay Holcomb, Adjunct Faculty, Department of Applied Information Technology, Volgenau School of Engineering GMU Website: E- mail: [email protected] Course: AIT Information System Infrastructure Credits: 3 Examines information system infrastructure lifecycle management including the audit process, IT governance and best practices, system and infrastructure control, IT service delivery and support, protection of information assets, physical security, business and disaster recovery. Day/Time: Thursday, 4:30 pm-7:10 pm Where: Music/Theater Building, Room: 1002 Textbooks (Required): Richard Bejtlich, The Practice of Network Security Monitoring: Understanding Incident Detection and Response, No Starch Press (August 2, 2013). ISBN: (Available on Safari Tech Books Online, which is part of the E- Book Databases@Mason) Other Resources: Paper readings and Internet resources posted on Blackboard -- AIT 671 Course Course Goals: 1. Obtain in-depth knowledge on various security systems examples. 2. Gain increased understanding of attack models used against security systems. 3. Learn how security systems provide defenses and counter measures against differing attack vectors. 4. Understand overall evaluation and management of security systems life cycle. Version 1.0 Page 1 of 6 Fall 2014
2 Grading policy: Grades will be determined based on the following: Grade Component Weight Current Cyber Event Paper #1 10% Current Cyber Event Paper #2 10% Quiz 10% Lab assignments (10% each) 30% Team Project and Presentation 30% Class Participation 10% Total: 100% The grading scale for this course is: Numeric Grade Letter Grade % A % A 90 92% A % B % B 80 82% B % C % C 70 72% C % D 0 59% F Version 1.0 Page 2 of 6 Fall 2014
3 Current Cyber Event Papers (2 10% each): Select a recent cyber event - research the event using open source references - write an executive-level technical brief on the event. Include the following at a minimum: threat vector used, vulnerability attacked, business impact of this event, your recommended security system(s) to help provide increased defenses against similar attacks in the future, and why/justification. The length of this paper should be one page - maximum of two pages. (One page is a single side of paper) On a separate page include your open source references - minimum of two (2) unique sources are required. Quiz (10%): A 25 question open-book multiple-choice quiz covering the key terms/topics discussed during the first seven (7) weeks of the course. If unable to complete the quiz within allotted time a written make-up assignment may be completed. (Must be completed within 2 weeks of the quiz for credit.) Lab Assignments (3 10% each): Three (3) labs supporting course objectives regarding attacks and defensive options related to security systems. If unable to attend/participate in a lab a written make-up assignment may be completed. (Must be completed within 2 weeks of the missed lab for credit.) Team Project and Presentation (30%): (Five teams of 5 people) Either a Red team (Penetration testing team) or Security audit consultants -- your team will decide). You will be auditing security systems/security controls currently in place and recommending improvements. Select a fictitious critical infrastructure sector company and create a senior executive (CISO/CIO) level report, with accompanying executive briefing, highlighting the "results" of your red team test or security audit. At a minimum cover what may happen to the company if they do not implement your top four (4) recommendations and are hit with malicious software, or a breach, describing the potential security risk in great detail. Include how your team approached/engaged with the company, standard processes you used, tools (software/hardware), social, and/or physical security testing that you used, time period of the testing, potential business impacts of any major issues you identified, cost of the assessment, team skills with estimated costs, and the [critical] reporting process. The length of the report should be less than 20 pages. (One page is a single side of paper) On a separate attachment include your open source references. The report and presentation will be given during our final two sessions. Class Participation (10%): Active participation in weekly lectures, labs, and team assignments. Version 1.0 Page 3 of 6 Fall 2014
4 Lecture Schedule (Tentative): Week 1: Introduction to Information Systems Infrastructure Life Cycle Management, Physical Security, Business/Disaster Recovery, and Best Practices Review NIST Special Publication Revision 4 (April 2013) Chapters 1 and 2 with additional concentration on CM, CP, and PE families NIST Special Publication (October 2006) Chapters 3 and 9 Defensive Section Week 2: Security Systems Overview (Firewall, IDS/IPS, Monitoring Systems, SIEM, etc.) and Threat Vectors Overview Review NIST Special Publication (February 2007) Chapter 2 and 3 Detection and Response, No Starch Press (August 2, 2013) Chapter 1 and 2 Week 3: Defense Methods Against Various Software Vulnerability Attacks and Other Defense Examples Lab Preparation Review SANS 20 Critical Security Controls and MITRE 2011 CWE/SANS Top 25 Most Dangerous Software Errors Read OWASP Top 10 and The Practice of Network Security Monitoring: Understanding Incident Detection and Response, No Starch Press (August 2, 2013) Chapter 3 Week 4: Lab #1 Know Your Network/User Awareness Section (Defense and Offense) Week 5: Know Your Network (Sniffing, Scans, Configurations, Patching, etc.) Review NIST Special Publication (September 2008) Chapter 3 and 4 Detection and Response, No Starch Press (August 2, 2013) Chapter 7 (Current Cyber Event Paper # 1 due) Version 1.0 Page 4 of 6 Fall 2014
5 Know Your Network/User Awareness Section (Defense and Offense) Week 6: Introduction to Offense (Pen Testing, Red Teaming, Auditing) Review NIST Special Publication (September 2008) Chapters 5, 6, 7, and 8 Read Paper readings and Internet resources posted on Blackboard Week 7: (VIRTUAL WEEK testing online class process) User Awareness/Training and Vulnerability and Configuration Management Review NIST Special Publication (October 2006) Chapters 4 and 14 Read Paper readings and Internet resources posted on Blackboard Assignment (due Sunday, October 12 th at midnight) Teams complete handout on User Awareness/Training. (Maximum 5 pages) Week 8: Lab #2 (Quiz opens) Offensive Section Week 9: Evaluation Methods of Security Systems and Metrics on Measuring Security Enhancements Review Paper readings and Internet resources posted on Blackboard Read NIST Special Publication (October 2006) Chapter 7 (Quiz closes) Week 10: Attack Models against Security Systems Review Paper readings and Internet resources posted on Blackboard Detection and Response, No Starch Press (August 2, 2013) Chapter 10 (Current Cyber Event Paper # 2 due) Week 11: Malware against Security Systems (Software Vulnerability Attacks and Analysis) Review Paper readings and Internet resources posted on Blackboard Detection and Response, No Starch Press (August 2, 2013) Chapter 2 Chapter 11 Version 1.0 Page 5 of 6 Fall 2014
6 Week 12: Lab #3 Team Project Delivery/Presentation Week 13: Team and Presentations Week 14: Team Reports and Presentations Honor Code: All work performed in this course will be subject to the GMU s Honor Code. Any violation will be reported to the honor committee. Academic Integrity: GMU is an Honor Code university; please see the Office for Academic Integrity for a full description of the code and the honor committee process. The principle of academic integrity is taken very seriously and violations are treated gravely. What does academic integrity mean in this course? Essentially this: when you are responsible for a task, you will perform that task. When you rely on someone else s work in an aspect of the performance of that task, you will give full credit in the proper, accepted form. Another aspect of academic integrity is the free play of ideas. Vigorous discussion and debate are encouraged in this course, with the firm expectation that all aspects of the class will be conducted with civility and respect for differing ideas, perspectives, and traditions. When in doubt (of any kind) please ask for guidance and clarification. Office of Disability Services: If you are a student with a disability and you need academic accommodations, please see me and contact the Office for Disability Services (ODS) at , All academic accommodations must be arranged through the ODS. Mason e- mail Accounts: Students must use their MasonLIVE account to receive important University information, including messages related to this class. See for more information. Other Useful Campus Resources: Writing Center: A114 Robinson Hall; (703) ; University Libraries Ask a Librarian : Counseling And Psychological Services (CAPS): (703) ; University Policies: The University Catalog, is the central resource for university policies affecting student, faculty, and staff conduct in university academic affairs. Other policies are available at All members of the university community are responsible for knowing and following established policies. Version 1.0 Page 6 of 6 Fall 2014
Syllabus: AIT 671 - Information Systems Infrastructure Lifecycle Management
Syllabus: AIT 671 - Information Systems Infrastructure Lifecycle Management Term: Fall 2013 Instructor: Jay Holcomb, Adjunct Faculty, Department of Applied Information Technology, Volgenau School of Engineering
Syllabus: AIT 673 (Online) - Cyber Incident Handling/Response
Syllabus: AIT 673 (Online) - Cyber Incident Handling/Response Term: Spring 2015 Instructor: Jay Holcomb, Adjunct Faculty, Department of Applied Information Technology, Volgenau School of Engineering GMU
PREREQUISITES Completion or concurrent enrollment in all other required general education courses, GOVT 300, and 18 credits in the major.
George Mason University Department of Public and International Affairs GOVT 490, section 004 Synthesis Seminar Spring 2013 1:30-2:45 PM MW Robinson B 222 Instructor: David F. Ericson Office Phone: 703-993-5119
4ECE 320 Signals and Systems II Department of Electrical and Computer Engineering George Mason University Fall, 2015
ECE 320 1 Fall, 2015 4ECE 320 Signals and Systems II Department of Electrical and Computer Engineering George Mason University Fall, 2015 Class Meeting Information Day and Time: Tuesday and Thursday, 4:30
Looking at the SANS 20 Critical Security Controls
Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of
Fall 2013. Syllabus. College of Health and Human Services. HAP 700: Introduction to Health Informatics. Course information
College of Health and Human Services Fall 2013 Syllabus information placement Instructor description objectives HAP 700: Introduction to Health Informatics Date/time: online, class weeks run from Friday
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
PUAD 502 Administration in Public and Non-Profit Organizations Term Offered Fall, 2015 Syllabus
PUAD 502 Administration in Public and Non-Profit Organizations Term Offered Fall, 2015 Syllabus Instructor Sheldon Edner, PhD Communication with instructor can be by email, telephone or prearranged meeting.
HAP 750 Legal Issues in Health Administration Summer 2014
College of Health and Human Services HAP 750 Legal Issues in Health Administration Summer 2014 Syllabus information placement Instructor HAP 750 Legal Issues in Health Administration Mondays from 7:20pm
I. PREREQUISITES For information regarding prerequisites for this course, please refer to the Academic Course Catalog.
Note: Course content may be changed, term to term, without notice. The information below is provided as a guide for course selection and is not binding in any form, and should not be used to purchase course
This four (4) credit hour. Students will explore tools and techniques used penetrate, exploit and infiltrate data from computers and networks.
Integrated Science & Technology 457 Network Penetration and Attack Course Syllabus Spring 2014 MWF 10:00 10:50, W 12:00 12:50 Morrow Library 121 Instructor: Bill Gardner, Assistant Professor Office: 213
ITS425: Ethical Hacking and Penetration Testing
ITS425: Ethical Hacking and Penetration Testing Credit Hours: 3 Contact Hours: This is a 3-credit course, offered in accelerated format. This means that 16 weeks of material is covered in 8 weeks. The
George Mason University Electrical and Computer Engineering Department ECE 201: Introduction to Signal Analysis Syllabus Fall 2015
1 George Mason University Electrical and Computer Engineering Department ECE 201: Introduction to Signal Analysis Syllabus Fall 2015 Professor: Dr. Kathleen E. Wage (section 001) Class: Tues./Thurs. 7:30-8:45am
CS4320 Computer and Network Security. Fall 2015 Syllabus
CS4320 Computer and Network Security Instructor: Lopamudra Roychoudhuri E-mail: [email protected] Office: MCS 205E Campus Phone: (325) 486-5448 Class Times: MWF 1:00-1:50pm Classroom: MCS 111A Course
Psychological Testing (PSYCH 149) Syllabus
Psychological Testing (PSYCH 149) Syllabus Psychological Testing (PSYCH 149) is held on Mondays, Wednesdays, and Fridays from 11:45 a.m. 12:50 p.m., in Science 2, Room 107. This 4-unit course is designed
Common Syllabus Revised 01.17.2015
Department of Applied Information Technology Volgenau School of Engineering IT 366 Information Security Fundamentals Common Syllabus Revised 01.17.2015 This syllabus contains information common to all
HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline
HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 210 COURSE NUMBER: CIS 210 COURSE NAME: MEETING PLACE: Random On-Line DIVISION: Business, Computing & Applied Technology
WAYLAND BAPTIST UNIVERSITY VIRTUAL CAMPUS SCHOOL OF BUSINESS SYLLABUS
WAYLAND BAPTIST UNIVERSITY VIRTUAL CAMPUS SCHOOL OF BUSINESS SYLLABUS 1. Mission Statement: Wayland Baptist University exists to educate students in an academically challenging, learning-focused and distinctively
WAYLAND BAPTIST UNIVERSITY ONLINE CAMPUS SCHOOL OF BUSINESS SYLLABUS
WAYLAND BAPTIST UNIVERSITY ONLINE CAMPUS SCHOOL OF BUSINESS SYLLABUS 1. Mission Statement: Wayland Baptist University exists to educate students in an academically challenging, learning-focused and distinctively
IT 342 Operating Systems Fundamentals Fall 2014 Syllabus
Tuesday 7:20 to 10:00 Bull Run Hall Room 258 James F. Holdener, P.E. Phone: 703 983-2343 (I check this number daily during the week) Email: [email protected] Email is the best method to get hold of me.
COURSE SYLLABUS BMIS 342 CYBER SECURITY
Note: Course content may be changed, term to term, without notice. The information below is provided as a guide for course selection and is not binding in any form, and should not be used to purchase course
ITS425: Ethical Hacking and Penetration Testing
ITS425: Ethical Hacking and Penetration Testing Credit Hours: 3 Contact Hours: This is a 3-credit course, offered in accelerated format. This means that 16 weeks of material is covered in 8 weeks. The
COURSE SYLLABUS FIREWALLS & NETWORK SECURITY. ITSY-2301 Number. 2-3-3 Lecture - Lab - Credit. ITSY-1342 Prerequisites. April 16, 2015 Revision Date
COURSE SYLLABUS FIREWALLS & NETWORK SECURITY ITSY-2301 Number 2-3-3 Lecture - Lab - Credit ITSY-1342 Prerequisites April 16, 2015 Revision This syllabus has been reviewed and is current on the date indicated.
I. PREREQUISITES For information regarding prerequisites for this course, please refer to the Academic Course Catalog.
Note: Course content may be changed, term to term, without notice. The information below is provided as a guide for course selection and is not binding in any form, and should not be used to purchase course
CS 464/564 Networked Systems Security SYLLABUS
CS 464/564 Networked Systems Security SYLLABUS College: College of Science Department: Department of Computer Science Syllabus Title: CS 464/564 Networked Systems Security Call Number: 1. Meet the Professor
Brazosport College Syllabus for PSYC 2301 General Psychology
Brazosport College Syllabus for PSYC 2301 General Psychology Instructor: Cassandra D. Gonzalez Office Hours: Monday-Thursday 1:00-2:00 pm Office Phone: 979.230.3667 Other times by appointment Office Location:
Borough of Manhattan Community College Department of Social Science. POL 100-036 American Government Spring 2014
Borough of Manhattan Community College Department of Social Science POL 100-036 American Government Spring 2014 Online 3 credits Prof. Melissa T. Brown [email protected] Office: N-669 Office Phone:
Applied Network Security Course Syllabus Spring 2015
Course Syllabus Spring 2015 Course Information Instructor: Dr. Mike Jochen Phone: 570.422.3036 Email: [email protected] Office: 337 SCITECH Building Office Hours: Mon 5:15 7:00 p.m. Weds 5:45 7:00 p.m. Tues/Thurs
IT 101 Introduction to Information Technology
Applied Information Technology Department Course Syllabus IT 101 Introduction to Information Technology Catalog Description Introduces students to the fundamental concepts in information technology (IT)
Collin College Business and Computer Systems
Collin College Business and Computer Systems COURSE INFORMATION Course Number: ITSW 1304.P70 CRN 17101 Course Title: Introduction to Spreadsheets - Excel Course Description: Instruction in the concepts,
POFT 1309 Administrative Office Procedures I COURSE SYLLABUS
POFT 1309 Administrative Office Procedures I COURSE SYLLABUS COURSE NUMBER AND TITLE: POFT 1309 Administrative Office Procedures I (Online Lecture Course) COURSE (CATALOG) DESCRIPTION: Study of current
ITM 641: Information Security Policies Syllabus Sanjay Goel School of Business University at Albany, State University of New York
INSTRUCTOR INFORMATION Name: Sanjay Goel Email: [email protected] Phone: (518) 442-4925 Office Location: BA 310b, University at Albany Office Hours: TBD CLASS INFORMATION Time: N/A Location: Online Dates:
PSYCH 105S: General Psychology Tuesdays and Thursdays 11:00 12:50 CERAS, Room 300
Instructor: Kody Manke Email: [email protected] Office: Jordan Hall 392 (Bldg 420) Office Hours: After class T/Th or by appt. PSYCH 105S: General Psychology Tuesdays and Thursdays 11:00 12:50 CERAS,
TOUR 412 Tourism and Events Marketing Spring 2016
GEORGE MASON UNIVERSITY Department of Recreation, Health & Tourism TOUR 412 Tourism and Events Marketing Spring 2016 DAY/TIME: DE LOCATION: DE PROFESSOR: Rebecca Kelley EMAIL ADDRESS: [email protected]
IST359 - INTRODUCTION TO DATABASE MANAGEMENT SYSTEMS
IST359 - INTRODUCTION TO DATABASE MANAGEMENT SYSTEMS 1. COURSE DETAILS Revised: 1/13/2012 COURSE (SECTION): IST359 (M001) TERM: Spring 2012 INSTRUCTOR: Deborah Nosky FINAL EXAM: Tuesday, May 8 th 10:15
CENTRAL TEXAS COLLEGE ITSY 2401 FIREWALLS AND NETWORK SECURITY. Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS:
CENTRAL TEXAS COLLEGE ITSY 2401 FIREWALLS AND NETWORK SECURITY Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS: I. INTRODUCTION A. Identify elements of firewall design, types of security threats and
MSIS 630 Project and Change Management (Fall 2014) Course Syllabus
MSIS 630 Project and Change Management (Fall 2014) Course Syllabus 1. Instructor Information o Professor: One-Ki (Daniel) Lee MS&IS Department, College of Management E-mail: [email protected] (preferred)
COURSE TEXTBOOK [Insert required course text academic format for book listing with ISBN# and edition]
New York University Tisch School of the Arts [COURSE TITLE] Course Syllabus [COURSE NUMBER] / [NUMBER OF CREDITS] Office of Special Programs [DATE] Instructor Name: COURSE DESCRIPTION [The description
ERP 5210 Performance Dashboards, Scorecard, and Data Visualization Course Syllabus Spring 2015
ERP 5210 Performance Dashboards, Scorecard, and Data Visualization Course Syllabus Spring 2015 Department of Business & Information Technology Mission Capitalizing on the strong technological emphasis
FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the
Solving the CIO s Cybersecurity Dilemma: 20 Critical Controls for Effective Cyber Defense
Solving the CIO s Cybersecurity Dilemma: 20 Critical Controls for Effective Cyber Defense John M. Gilligan Information systems Security Association National Capital Chapter January 19, 2010 1 Topics Background
DSCI 3710 Syllabus: Spring 2015
DSCI 3710 Syllabus: Spring 2015 CLASS (DAY/TIME): 090 Thursday 1:00 3:50 pm in Room 101, Founders Hall (Dal #2) 091 Monday 7:00 9:50 pm in Room 243, Founders Hall (Dal #2) INSTRUCTOR: Daniel D. Friesen
CS 340 Cyber Security Weisberg Division of Computer Science College of Information Technology & Engineering Marshall University
Weisberg Division of Computer Science College of Information Technology & Engineering Marshall University Course Description: Concepts and issues in physical and cyber security; technological vulnerabilities
ITSY1342 Section 151 (I-Net) Information Technology Security
ITSY1342 Section 151 (I-Net) Information Technology Security Fall 2015 (151S) Instructor: Ben Walton Phone: 716-4602 Location: 108 ATC Office Hours: See Additional Handout Class Time: Section 151: INTERNET
Course Syllabus CAD 140 Computer-Aided Drafting I 3 Semester Hours
Fall 2015 Course Syllabus CAD 140 Computer-Aided Drafting I 3 Semester Hours Faculty: Ms. Kintz Office: MTC 313 Telephone: 302-236-9598 E-mail: [email protected] Office Hours: By appointment Class Time:
PSYCHOLOGY 101 ONLINE. Course Information and Syllabus Summer 2014
PSYCHOLOGY 101 ONLINE Course Information and Syllabus Summer 2014 Professor: Shelly Fichtenkort, Ph.D. Phone: (209) 575-6898 E-mail: Please use e-mail within Blackboard Web page: http://fichtenkorts.faculty.mjc.edu
Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute
Wasting Money on the Tools? Automating the Most Critical Security Controls Bonus: Gaining Support From Top Managers for Security Investments Mason Brown Director, The SANS Institute The Most Trusted Name
MIS 7381 Syllabus_Spring 2016_Cooper.doc 1 02/08/16 2:44 PM
MIS 7381 Management of Information Security Spring 2016: Tuesday 6-9PM Room: 114 MH Professor: R. Cooper Office: MH 280B Phone: 713-743-4732 E-mail: [email protected] (Rather than phone, e-mail is my preferred
Leveraging SANS and NIST to Evaluate New Security Tools
Leveraging SANS and NIST to Evaluate New Security Tools Agenda About TaaSera A Problem to Solve Overview of NIST Cybersecurity Framework Overview of SANS CSC-20 Call to Action Conclusion Q&A Company Founded
TCOM 562 Network Security Fundamentals
TCOM 562 Network Security Fundamentals George Mason University Fall 2009 Jerry Martin Fairfax Campus Tel: (703) 993-3810 Email: [email protected] Office Hours: by appointment only 1. Announcements The class
Earth Science 102 Introduction to Physical Geology Fall 2015 Online
Parkland College Earth Science Courses Natural Sciences Courses 2015 Earth Science 102 Introduction to Physical Geology Fall 2015 Online Julie Angel Parkland College, [email protected] Recommended Citation
Introduction to Personality Psychology 2320, Spring 2013 TTh 5:30-6:45 Arts and Science 110 (Allen Auditorium)
Introduction to Personality Psychology 2320, Spring 2013 TTh 5:30-6:45 Arts and Science 110 (Allen Auditorium) Instructor: Wendy Slutske, Ph.D. Office: 212A McAlester Hall Office Hours: by appointment
Psychology 2510: Survey of Abnormal Psychology (Section 2) Fall 2015
Psychology 2510: Survey of Abnormal Psychology (Section 2) Fall 2015 Instructor: Julianne Gray Ludlam, Ph.D. Class Location: Psychology Building 313 Class Time: MWF, 9:00-9:50 AM CST Office Location: 25
SOCI 1301 Online Introduction to Sociology COURSE SYLLABUS
COURSE NUMBER AND TITLE SOCI 1301 Online Introduction to Sociology COURSE SYLLABUS SOCI. 1301 Introduction to Sociology On-Line Course COURSE (CATALOG) DESCRIPTION Focuses on the concepts and principles
Security and Computer Forensics ITP 477 (4 Units)
Security and Computer Forensics ITP 477 (4 Units) Description Objective Prerequisites/ Recommended Preparation Instructor Contacting the Instructor Lecture/Lab Required Textbooks Web Site Grading In 2007,
BIOL 2409- FUNDAMENTALS OF HUMAN ANATOMY & PHYSIOLOGY II, Fall 2015
Biology 2409 Fundamentals of Human Anatomy & Physiology II Online 1 Virtual Campus School of Mathematics & Sciences WAYLAND MISSION STATEMENT: Wayland Baptist University exists to educate students in an
PSYCHOLOGY 101 ONLINE. Course Information and Syllabus Fall 2012
PSYCHOLOGY 101 ONLINE Course Information and Syllabus Fall 2012 Professor: Shelly Fichtenkort, Ph.D. Phone: (209) 575-6898 E-mail: Please use e-mail within Blackboard Web page: course http://virtual.mjc.edu/fichtenkorts
Syllabus Systems Analysis and Design Page 1 of 6
Syllabus Systems Analysis and Design Page 1 of 6 Austin Community College Department of Computer Studies and Advanced Technology Systems Analysis and Design ITSE1450-543 (capstone course) Syllabus Spring
CIS 56 (CRN: 33372) Hybrid Course Winter, 2016
Date of last update: 12/13/2015 Network security CIS 56 (CRN: 33372) Hybrid Course Winter, 2016 Fisk, Thursdays 3:30-5:20 in ATC 205, Office hours: Thursday 3:00-3:30 & 5:30-6:00 PM in ATC 203b, 5:00-6:00
CSC 474 Information Systems Security
CSC 474 Information Systems Security Introduction About Instructor Dr. Peng Ning, assistant professor of computer science http://www.csc.ncsu.edu/faculty/ning [email protected] (919)513-4457 Office: Room
FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
Information Security and Risk Management
Information Security and Risk Management COSO and COBIT Standards and Requirements Page 1 Topics Information Security Industry Standards and COBIT Framework Relation to COSO Internal Control Risk Management
CEDAR CREST COLLEGE Psychological Assessment, PSY - 312 Spring 2010. Dr. Diane M. Moyer [email protected] Office: Curtis 123
CEDAR CREST COLLEGE Psychological Assessment, PSY - 312 Spring 2010 Dr. Diane M. Moyer [email protected] Office: Curtis 123 Course Description: The goal of this course is to expose students to the
MG430: Sports Management
MG430: Sports Management Spring 2011 Instructor Information Instructor Name: Office Location: Office Hours: Email: Dr. Barbara Wech (pronounced way ) 317 D BEC Tuesday 2:00 p.m. 4:00 p.m.; Friday 10:00
CMJ 256 - CRIME SCENE INVESTIGATION Spring Syllabus 2015
INSTRUCTOR INFORMATION Associate Professor David Striegel Guerrieri Hall, Room 202D Office Phone: 410-572-8755 Office Hours: CMJ 256 - CRIME SCENE INVESTIGATION Spring Syllabus 2015 Monday 10:45 11:45
Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services
Managing Vulnerabilities for PCI Compliance White Paper Christopher S. Harper Managing Director, Agio Security Services PCI STRATEGY Settling on a PCI vulnerability management strategy is sometimes a difficult
San José State University Department of Hospitality Management HSPM 108 Hospitality Information Systems. Fall 2013
San José State University Department of Hospitality Management HSPM 108 Hospitality Information Systems Fall 2013 Instructor: Dr. Pi-Shin Wey Office Location: SPX 49 Telephone: (408) 924-3292 (Leave message
CS 391-950 Ethical Hacking Spring 2016
CS 391-950 Ethical Hacking Spring 2016 Instructor: Shahriar Nick Rahimi Office: Faner 2136 Office Hours: MW 8:30 am-11 am Friday 10 am- 11 am E-Mail: [email protected] Course Web Site: https://online.siu.edu/
CS 1361-D10: Computer Science I
CS 1361-D10: Computer Science I Instructor Name: Lopamudra Roychoudhuri Instructor Phone Number: (325) 486-5448 Instructor email: [email protected] Instructor Office: MCS 205E Class Times: Online,
Tuskegee University Department of Computer Science Course No: CSCI 390 (Computer Forensics) Fall 2011 - MWF 1:00-2:300, BRIM 301
Tuskegee University Department of Computer Science Course No: CSCI 390 (Computer Forensics) Fall 2011 - MWF 1:00-2:300, BRIM 301 Instructor: Dr. C. L. Chen Office: In the office complex Phone: 727-8554
PSYCHOLOGY 101 ONLINE. Course Information and Syllabus Summer 2016
PSYCHOLOGY 101 ONLINE Course Information and Syllabus Summer 2016 Professor: Shelly Fichtenkort, Ph.D. Phone: (209) 575-6898 E-mail: [email protected] Web page: http://fichtenkorts.faculty.mjc.edu WELCOME
CIT 217 Security + Network Security Fall 2015
CIT 217 Security + Network Security Fall 2015 Instructor: Laura Pike Email: [email protected] Phone: 775-753-2288 Office: HTC 131 Office Hours: Mon & Wed. 1:30 2:30pm via Cranium Café Tus. 7-8pm via
George Mason University Graduate School of Education Special Education Program
George Mason University Graduate School of Education Special Education Program EDSE 517: Computer Applications for Special Populations Course Syllabus Fall 2011 Instructor: Jeff Sisk Section #658: 4:30
ITNW 2305 Network Administration COURSE SYLLABUS
COURSE NUMBER AND TITLE: ITNW 2305 Network Administration ITNW 2305 Network Administration COURSE SYLLABUS COURSE (CATALOG) DESCRIPTION: Topics include network components, user accounts and groups, network
Jumpstarting Your Security Awareness Program
Jumpstarting Your Security Awareness Program Michael Holcomb Director, Information Security HO20110473 1 Jumpstarting Your Security Awareness Program Classification: Confidential Owner: Michael Holcomb
CSC-310 Introduction to Geographic Information Systems
The American University College of Arts and Sciences Department of Computer Science CSC-310 Introduction to Geographic Information Systems Semester: Fall 2011 Section: 001 Meeting Time(s): Monday 5:30
HRPO 2301 HUMAN RESOURCES MANAGEMENT COURSE SYLLABUS
HRPO 2301 HUMAN RESOURCES MANAGEMENT COURSE SYLLABUS COURSE NUMBER AND TITLE: HRPO 2301 Human Resources Management (2-3-3) COURSE (CATALOG) DESCRIPTION: Behavioral and legal approaches to the management
How To Pass A Customer Service Course At Tstc
MRKG 1301 Customer Relationship Management COURSE SYLLABUS COURSE NUMBER AND TITLE: MRKG 1301 Customer Relationship Management (Online Lecture Class) COURSE (CATALOG) DESCRIPTION: Study of general principles
Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus
Department of Computer & Information Sciences INFO-450: Information Systems Security Syllabus Course Description This course provides a deep and comprehensive study of the security principles and practices
SYST 371 SYSTEMS ENGINEERING MANAGEMENT
SYST 371 SYSTEMS ENGINEERING MANAGEMENT Prof. Paulo C. G. Costa, PhD Department of Systems Engineering and Operations Research George Mason University http://mason.gmu.edu/~pcosta Teacher Assistant: Ms.
Government 2305 Federal Government Fall 2015 ONLINE
Government 2305 Federal Government Fall 2015 ONLINE Dr. Alicja Jac-Kucharski Office: CLA 200-G [email protected] Telephone: (281) 318-4390 Office Hours: By appointment. Skype: Prof._Jac-Kucharski
ACNT 1311 Intro to Computerized Accounting COURSE SYLLABUS
ACNT 1311 Intro to Computerized Accounting COURSE SYLLABUS COURSE NUMBER AND TITLE: ACNT 1311 Introduction to Computerized Accounting (2-3-3) COURSE (CATALOG) DESCRIPTION: Introduction to utilizing the
COURSE SYLLABUS PSYCHOLOGY 201 GENERAL PSYCHOLOGY (CRN #34981) WINTER 2010 TR 9:30 10:50 a.m. NSH-109
COURSE SYLLABUS PSYCHOLOGY 201 GENERAL PSYCHOLOGY (CRN #34981) WINTER 2010 TR 9:30 10:50 a.m. NSH-109 Instructor: Darci Dance Office: SSH 107 Phone: (541)917-4538 E-Mail: [email protected] Office
ISM527 - Cyber Security Management
ISM527 - Cyber Security Management Credit Hours: 3 Contact Hours: This is a 3-credit course, offered in accelerated format. This means that 16 weeks of material is covered in 8 weeks. The exact number
