RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 276 Windows Security Management
|
|
- Myrtle Knight
- 8 years ago
- Views:
Transcription
1 RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 276 Windows Security Management I. Basic Course Information A. Course Number & Title: CISY-276 Windows Security Management B. Date of Revision: Spring 2004 C. Sponsoring Department: Computer Science & Educational Technology Department D. Semester Credit Hours: 3 E. Weekly Contact Hours: 4 Lecture: 2 Laboratory: 2 F. Co-requisites: CISY-229 Information Security Fundamentals CISY-253 Advanced Computer Networking G. Laboratory Fees: Yes, at current rate II. Catalog Description Co-requisites: CISY-229 Information Security Fundamentals, CISY-253 Advanced Computer Networking This course provides the student with an understanding of the security issues pertaining to the Windows operating system. Hands-on exercises performing actual operating system management reinforce what is learned in the classroom. Students learn how to implement a secure Windows environment and to monitor and maintain the network to protect from internal and external threats. III. Statement of Course Need Due to the widespread acceptance of both networking and Internet integration into most business models, and widespread personal use of high-speed internet access and home networks, many computers are now vulnerable to a wide range of malicious attacks. The widespread knowledge of this vulnerability, the low threshold of knowledge needed to exploit many of the vulnerabilities, and the funding and/or use of such attacks by many countries and special interest groups as information warfare, has caused a need for comprehensive security measures to be administrated on all networks. This need is being recognized by many small to medium sized businesses that until now 3/24/04 Page 1 of 5
2 have not had a security policy. The increase in companies of all sizes which now are engaged in web based information transfers such as e-business, data mining, and product information distribution has created a large market for security professionals. In addition to the financial risks that security breaches cause, new federal and European Union laws requiring stringent privacy requirements have created legal risks for companies with poor data security. This course will prepare students for entry-level positions in network security in the Windows environment. IV. Place of Course in College Curriculum 1. Required course for the Computer Networking Certificate Homeland Security Emphasis 2. CIS Elective 3. Free Elective for other degrees V. Outline of Course Content 1. Introduction to the networking and security aspects of Windows. Microsoft resources - included utilities, resource kits, on-line resources, upgrades, security bulletins 2. Pre-planning Network Installation security issues Active Directory use in controlling & segregating access File system configuration, trade-off between fast access, data redundancy, and securing data. RAID and backup processes 3. Windows server and client installation and security configuration 4. System Management management tools and consoles administrative procedures and monitoring SNMP security defensive hacking and system vulnerability assessments 5. Additional Security Software firewall configuration and monitoring anti-virus protection and monitoring encryption software configuration and use 6. System Changes risk analysis of upgrades and patch management basics effects of upgrades on security system settings adding and configuring applications including security settings interoperability problems change management documentation 3/24/04 Page 2 of 5
3 7. Account, group, and system management configuring rights configuring file and folder security resource sharing 8. Remote Access and VPN security remote access protocols and communication device configuration VPN server policies, properties, and configuration methods of authentication 9. Specialized server protection & access issues database file IIS 10. Known vulnerabilities and hacking tools 11. Intrusion Detection and Remediation developing a corporate security violation policy legal requirements for documenting information disclosure incident response procedures thresholds and triggers for multiple level response procedures VI. Educational Goals and Learning Outcomes A. General Educational Goals Students will 1. Prepare and communicate information security solutions the reflects critical and creative thought (G.E. 1, 2) 2. Use the Internet for research, information analysis, problem solving, and decision making regarding information security (G.E. 2, 3). 3. Develop the ability to make informed judgments concerning ethical issues (G.E.5) B. Student Learning Outcomes - Students will be able to: 1. Explain the comprehensive, multi-level security implementation necessary for complete Windows Operating System Security 3/24/04 Page 3 of 5
4 2. Identify the types of vulnerabilities of Windows, and which system components may be affected by them 3. Incorporate a Windows system security strategy into the corporate information security policy. 4. Monitor and analyze data generated by Windows management tools and consoles 5. Research appropriate resources regarding Operating System issues, software upgrades and vulnerabilities VII. Modes of Teaching and Learning lecture/discussion small-group work computer-assisted instruction laboratory exercises student oral presentations simulation/role playing VIII. Papers, Examinations, and other Assessment Instruments laboratory products & reports weekly assignments research papers oral presentations exams and quizzes mid-term and final exams classroom participation IX. Grade Determinants 1. Laboratory products & reports- the student will be able to: Implement practical applications of the materials presented in the classroom. work with others in defining, evaluating, and solving problems (G.E. 1,2) 2. Weekly assignments the student will: develop the ability to think critically and communicate effectively (G.E. 1,2) demonstrate a working understanding of the materials presented the previous week 3/24/04 Page 4 of 5
5 3. Research paper the student will: collect, organize and evaluate information to address different kinds of security related problems (G.E. 3) develop the ability to think critically (G.E. 1) analyze and synthesize information regarding an aspect of computer security, and reach conclusions about the issue 4. Oral presentations the student will demonstrate the ability to think critically and communicate effectively (G. E. 1,2) 5. Exams/quizzes the student will demonstrate the ability to comprehend the Knowledge imparted in the classroom (G.E. 7) X. Texts and Materials 1. Suggested Textbooks Hacking Exposed by Joel Scambray, Stuart McClure and George Kurtz, McGraw-Hill Professional Publishing; ISBN: The CISSP Prep Guide: Mastering the Ten Domains of Computer Security by Ronald L. Krutz, Russell Dean Vines, Edward M. Stroz (Foreword), John Wiley & Sons; ISBN: On-line resources the web portal for the certified information systems security professional other on-line materials as researched by students 3. Lab Tools PGP encryption software Zone Alarm firewall software War Dialer automated dialing software NMAP scanner network utility Kaspersky and NOD anti-virus software (evaluation versions) Windows system utilities other freeware and shareware utilities as researched by students XI. Resources library resources technology support network lab for classroom instruction XII. Honors Courses Not an honors course 3/24/04 Page 5 of 5
RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 275 UNIX and Linux Security Management
RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 275 UNIX and Linux Security Management I. Basic Course Information A. Course Number & Title: CISY-275 - UNIX and Linux Security Management B. Date of
More informationRARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics
RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY-274 Privacy, Ethics & Computer Forensics I. Basic Course Information A. Course Number & Title: CISY-274 - Privacy, Ethics, & Computer Forensics B. New
More informationRARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals
RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 229 Information Security Fundamentals I. Basic Course Information A. Course Number & Title: CISY-229 Information Security Fundamentals B. New or Modified
More informationRARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 103 Computer Concepts and Programming
RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 103 Computer Concepts and Programming I. Basic Course Information A. Course Number and Title: CISY-103, Computer Concepts and Programming B. New or
More informationRARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE CISY 233 INTRODUCTION TO PHP
RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE CISY 233 INTRODUCTION TO PHP I. Basic Course Information A. Course Number and Title: CISY 233 Introduction to PHP B. New or Modified Course: Modified
More informationRARITAN VALLEY COMMUNITY COLLEGE COMPUTER SCIENCE (CS) DEPARTMENT. CISY 102 - Computer Literacy
I. Basic Course Information RARITAN VALLEY COMMUNITY COLLEGE COMPUTER SCIENCE (CS) DEPARTMENT CISY 102 - Computer Literacy A. Course Number and Title: CISY-102, Computer Literacy B. Date of Proposal or
More informationCourse Title: ITAP 3471: Web Server Management
Course Title: ITAP 3471: Web Server Management Semester Credit Hours: 4 (3,1) I. Course Overview The primary objective of this course is to give students a comprehensive overview of the tools and techniques
More informationRARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE. Accounting Systems and Software ACCT-225
RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE Accounting Systems and Software ACCT-225 I. Basic Course Information A. Course Number and Title: Accounting Systems and Software B. New or Modified
More informationRARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE MRKT-101 PRINCIPLES OF MARKETING
I. Basic Course Information RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE MRKT-101 PRINCIPLES OF MARKETING A. Course Number and Title: Mrkt-101 Principles of Marketing B. New or Modified Course:
More informationCIS 156. Firewalls and Intrusion Detection
CIS 156 Firewalls and Intrusion Detection Approved: May 6, 2011 EFFECTIVE DATE: Fall 2011 COURSE PACKAGE FORM Team Leader and Members Andra Goldberg, Matt Butcher, Dave White, Steve Sorden Date of proposal
More informationRARITAN VALLEY COMMUNITY COLLEGE COMPUTER SCIENCE (CS) DEPARTMENT. CISY-294, Oracle: Database Administration Fundamentals Part I
RARITAN VALLEY COMMUNITY COLLEGE COMPUTER SCIENCE (CS) DEPARTMENT CISY-294, Oracle: Database Administration Fundamentals Part I I. Basic Course Information A. Course Number and Title: CISY-294, ORACLE:
More informationRARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE CISY 102 COMPUTER LITERACY
RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE CISY 102 COMPUTER LITERACY I. Basic Course Information A. Course Number and Title: CISY-102 Computer Literacy B. New or Modified Course: Modified
More informationRaritan Valley Community College Academic Course Outline. CISY 253 - Advanced Computer Networking
Raritan Valley Community College Academic Course Outline CISY 253 - Advanced Computer Networking I. Basic Course Information A. Course number and Title: CISY 253- Advanced Computer Networking (TCP/IP)
More informationRARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE MATH 102 PROBLEM SOLVING STRATEGIES IN MATHEMATICS
RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE MATH 102 PROBLEM SOLVING STRATEGIES IN MATHEMATICS I. Basic Course Information A. Course Number and Title: MATH 102 Problem Solving Strategies in
More informationRARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE INTRODUCTION TO HEALTH INFORMATION TECHNOLOGY HITC - 105
RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE INTRODUCTION TO HEALTH INFORMATION TECHNOLOGY HITC - 105 I. Basic Course Information A. Course Number and Title: HITC105 Introduction to Health
More informationRARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE REAL ESTATE TRANSACTIONS LEGL-122
1 RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE REAL ESTATE TRANSACTIONS LEGL-122 I. Basic Course Information A. Course Title and Number: Real Estate Transactions LEGL-122 B. New or Modified
More informationRARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE. HLTH 102 Certified Nurse Aide (CNA)
RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE HLTH 102 Certified Nurse Aide (CNA) I. Basic Course Information A. Course Number and Title: HLTH 102 Certified Nurse Aide (CNA) B. New or Modified
More informationNetwork Security Course Specifications2011-2012
Assiut University Faculty of Computers & Information Department of Information Technology Quality Assurance Unit Network Security Course Specifications2011-2012 Relevant program B.Sc. in Computers and
More informationRARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE. CISY 222 Content Management Systems
RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE CISY 222 Content Management Systems I. Basic Course Information A. Course Number and Title: CISY 222 Content Management Systems B. New or Modified
More informationCIS 4204 Ethical Hacking Fall, 2014
CIS 4204 Ethical Hacking Fall, 2014 Course Abstract: The purpose of this course is to provide a basic understanding of computing, networking, programming concepts, and exploitation techniques, as they
More informationMonfort College of Business Semester Course Syllabus (2015-2016) COURSE PREFIX/TITLE: BACS 382 TCP/IP Network Security Sem. Hrs. 3 Ed.
Monfort College of Business Semester Course Syllabus (2015-2016) COURSE PREFIX/TITLE: BACS 382 TCP/IP Network Security Sem. Hrs. 3 Ed. Cap: 40 CATALOG DESCRIPTION: Prerequisite: BACS 380 or consent of
More informationSAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE
SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE COURSE TITLE: Network Certification I CODE NO. : SEMESTER: Fall 2011 PROGRAM: AUTHOR: Computer Engineering Technologist
More informationRaritan Valley Community College Academic Course Outline MUSC 190 - DIGITAL MUSIC COMPOSITION I
Raritan Valley Community College Academic Course Outline I. Basic Course Information MUSC 190 - DIGITAL MUSIC COMPOSITION I A. Course Number and Title: MUSC 190: DIGITAL MUSIC COMPOSITION I B. New or Modified
More informationRARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE OCCUPATIONAL SAFETY AND HEALTH FOR EMERGENCY SERVICES FIRE 204
RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE OCCUPATIONAL SAFETY AND HEALTH FOR EMERGENCY SERVICES FIRE 204 I. Basic Course Information A. Course Number and Title: Occupational Safety and Health
More informationOpen Source Security Tools for Information Technology Professionals
Open Source Security Tools for Information Technology Professionals CUNY SPS Course Syllabus Aron Trauring May 23, 2005 (rev October 21, 2005) Course Description Information security is a top priority
More informationRARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE COMPUTER APPLICATIONS IN THE LAW OFFICE LEGL-130
1 RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE COMPUTER APPLICATIONS IN THE LAW OFFICE LEGL-130 I. Basic Course Information A. Course Title and Number: Computer Applications in the Law Office
More informationRARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE HIST 202 H UNITED STATES HISTORY: 1877 TO PRESENT (HONORS)
RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE HIST 202 H UNITED STATES HISTORY: 1877 TO PRESENT (HONORS) I. Basic Course Information A. Course Number and Title: HIST-202H United States History:
More informationInformation Security Course Specifications2011-2012
Assiut University Faculty of Computers & Information Information Systems Department Quality Assurance Unit Information Security Course Specifications2011-2012 Relevant program Department offers the program
More informationRARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE. BIOL 125 - Human Anatomy and Physiology II
RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE BIOL 125 - Human Anatomy and Physiology II I. Basic Course Information A. Course Number and Title: BIOL 125 Human Anatomy and Physiology II B. New
More information167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College
167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,
More informationRaritan Valley Community College Academic Course Outline. HMNS 207 Social Policy and Politics
Raritan Valley Community College Academic Course Outline HMNS 207 Social Policy and Politics I. Basic Course Information A. Course Number and Title: HMNS 207 Social Policy & Politics [Formerly Social Welfare
More informationSoran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification
1. Module Title Information Security 2. Module Code: CS403INS 3. Module Level - Forth Stage 4. Module Leader Safwan M. 5. Teaching Semester 7 and 8 Soran University Faculty of Science and Engineering Computer
More informationNEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS. Division: Applied Science (AS) Liberal Arts (LA) Workforce Development (WD)
NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS COURSE IDENTIFICATION Course Code/Number: ETEC 275 Course Title: Computer and Network Security Division: Applied Science (AS) Liberal Arts (LA) Workforce
More informationRARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE NURS 130: NURSING TRANSITIONS
RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE NURS 130: NURSING TRANSITIONS I. Basic Course Information A. Course Number and Title: NURS 130 Nursing Transition B. New or Modified Course: Modified
More informationCOURSE SYLLABUS FIREWALLS & NETWORK SECURITY. ITSY-2301 Number. 2-3-3 Lecture - Lab - Credit. ITSY-1342 Prerequisites. April 16, 2015 Revision Date
COURSE SYLLABUS FIREWALLS & NETWORK SECURITY ITSY-2301 Number 2-3-3 Lecture - Lab - Credit ITSY-1342 Prerequisites April 16, 2015 Revision This syllabus has been reviewed and is current on the date indicated.
More informationRARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE. MATC-121 Clinical Medical Assistant Principles
RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE I. Basic Course Information MATC-121 Clinical Medical Assistant Principles A. Course Number and Title: MATC-121 Clinical Medical Assistant Principles
More informationRARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE. BIOL 124 - Human Anatomy and Physiology I
RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE BIOL 124 - Human Anatomy and Physiology I I. Basic Course Information A. Course Number and Title: BIOL 124 Human Anatomy and Physiology I B. New
More informationExternal Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
More informationRemote Access and Mobile Working Policy. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.1. Approval. Review By June 2012
Remote Access and Mobile Working Policy Document Status Security Classification Version 1.1 Level 4 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst
More informationCENTRAL TEXAS COLLEGE ITSY 2401 FIREWALLS AND NETWORK SECURITY. Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS:
CENTRAL TEXAS COLLEGE ITSY 2401 FIREWALLS AND NETWORK SECURITY Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS: I. INTRODUCTION A. Identify elements of firewall design, types of security threats and
More informationRARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE. ARTS 284 News Production for the Web
RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE ARTS 284 News Production for the Web I. Basic Course Information A. Course Number and Title: ARTS 284 News Production for the Web B. New or Modified
More informationNetwork Security ITP 457 (4 Units)
Network Security ITP 457 (4 Units) Description Objectives Prerequisites/ Recommended Preparation Instructor Contacting the Instructor Lecture Required Textbooks Web Site Due to the emergence of the internet
More informationRARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE. CISY 105 Foundations of Computer Science
I. Basic Course Information RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE CISY 105 Foundations of Computer Science A. Course Number and Title: CISY-105, Foundations of Computer Science B. New
More informationMERCER COUNTY COMMUNITY COLLEGE. Division of Business and Technology NET 240
MERCER COUNTY COMMUNITY COLLEGE Division of Business and Technology COURSE DESCRIPTION: Course Description: Students learn, in depth, the various network security principles, features, protocols, and implementations
More informationRARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE HMNS 213 ADVANCED COUNSELING SKILLS
I. BASIC COURSE INFORMATION RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE HMNS 213 ADVANCED COUNSELING SKILLS A. Course Number and Title: ADVANCED COUNSELING (HMNS 213) B. New or Modified course:
More information"Charting the Course... ... to Your Success!" MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary
Description Course Summary This course provides students with the knowledge and skills needed to isolate, document and resolve problems on a Windows 7 desktop or laptop computer. It will also help test
More information167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College
167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,
More informationInformation Security @ Blue Valley Schools FEBRUARY 2015
Information Security @ Blue Valley Schools FEBRUARY 2015 Student Data Privacy & Security Blue Valley is committed to providing an education beyond expectations to each of our students. To support that
More informationTable of Contents. Introduction. Audience. At Course Completion
Table of Contents Introduction Audience At Course Completion Prerequisites Certified Professional Exams Student Materials Course Outline Introduction This four-day, instructor-led course provides students
More informationWindows Server 2008: Server Administration (ITMT 2351)
Windows Server 2008: Server Administration (ITMT 2351) Credit: 3 semester credit hours (2 hours lecture, 4 hours lab) Prerequisite/Co-requisite: None Course Description Knowledge and skills for the entry-level
More informationRARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE LAW OFFICE MANAGEMENT LEGL-127. A. Course Title and Number: Law Office Management LEGL-127
1 RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE LAW OFFICE MANAGEMENT LEGL-127 I. Basic Course Information A. Course Title and Number: Law Office Management LEGL-127 B. New or Modified Course:
More informationRaritan Valley Community College Academic Course Outline. HMNS 240 Introduction to Special Education
Raritan Valley Community College Academic Course Outline HMNS 240 Introduction to Special Education I. Basic Course Information A. Course Number and Title: HMNS 240 Introduction to Special Education B.
More informationTextbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2.
CSET 4850 Computer Network Security (4 semester credit hours) CSET Elective IT Elective Current Catalog Description: Theory and practice of network security. Topics include firewalls, Windows, UNIX and
More informationCIS 253. Network Security
CIS 253 Network Security Approved: May 6, 2011 EFFECTIVE DATE: Fall 2011 COURSE PACKAGE FORM Team Leader and Members Andra Goldberg, Matt Butcher, Steve Sorden, Dave White Date of proposal to Curriculum
More informationRARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE ROLE OF THE PARALEGAL LEGL-101
1 RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE ROLE OF THE PARALEGAL LEGL-101 I. Basic Course Information A. Course Title and Number: Role of the Paralegal LEGL-101 B. New or Modified Course:
More informationNEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus
NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus CSCI - 440 Network Security and Perimeter Protection 3-0-3 CATALOG DESCRIPTION This
More informationCOURSE NUMBER: CTS 2371
Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CTS 2371 COURSE TITLE: Virtual Infrastructure: Deployment, Security, and Analysis PREREQUISITE(S): CTS
More informationCIS 270. Systems Analysis and Design
CIS 270 Systems Analysis and Design Approved: May 6, 2011 EFFECTIVE DATE: Fall 2011 COURSE PACKAGE FORM Team Leader and Members Andra Goldberg, Matt Butcher, Steve Sorden, Dave White Date of proposal to
More informationNetworked Systems Security
Unit 32: Networked Systems Security Unit code: QCF Level 3: Credit value: 10 Guided learning hours: 60 Aim and purpose J/601/7332 BTEC National The aim of this unit is to ensure learners know about the
More informationDepartment of Computer Science and Technology, UTU 2014
M.Sc. (CA) Semester 3 Course Name & Code: Penetration Testing (040020305) Tedi Heriyanto, Shakeel Ali, BackTrack 4: Assuring Security By Penetration Testing, Shroff/Packt Publishing is abbreviated as ST,
More informationCS 391-950 Ethical Hacking Spring 2016
CS 391-950 Ethical Hacking Spring 2016 Instructor: Shahriar Nick Rahimi Office: Faner 2136 Office Hours: MW 8:30 am-11 am Friday 10 am- 11 am E-Mail: nick@cs.siu.edu Course Web Site: https://online.siu.edu/
More information"Charting the Course... MOC 20411 D Administering Windows Server 2012. Course Summary
Course Summary Description Get hands-on instruction and practice administering Windows Server 2012, including Windows Server 2012 R2, in this five-day Microsoft Official Course. This course is part two
More informationHackers are here. Where are you?
1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.
More informationIntroduction Open Source Security Tools for Information Technology Professionals
Introduction Open Source Security Tools for Information Technology Professionals School of Professional Studies (SPS) The City University of New York (CUNY) Aron Trauring Adjunct Professor CEO, Zoteca
More informationCS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
More informationUniversity of Wisconsin-Whitewater Curriculum Proposal Form #3 New Course
Effective Term: 2147 (Fall 2014) University of Wisconsin-Whitewater Curriculum Proposal Form #3 New Course Subject Area - Course Number: COMPSCI 462 (See Note #1 below) Cross-listing: N/A Course Title:(Limited
More informationANNE ARUNDEL COMMUNITY COLLEGE ARNOLD, MARYLAND COURSE OUTLINE CATALOG DESCRIPTION
ANNE ARUNDEL COMMUNITY COLLEGE ARNOLD, MARYLAND COURSE OUTLINE COURSE: Windows 2003 Server COURSE NO: CSI 265 CREDIT HOURS: 3 hours of lecture weekly DEPARTMENT: CATALOG DESCRIPTION CSI 265 Windows 2003
More informationSTATE UNIVERSITY OF NEW YORK COLLEGE OF TECHNOLOGY CANTON, NEW YORK COURSE OUTLINE JUST 355 PUBLIC SAFETY CRITICAL INCIDENT RESPONSE
STATE UNIVERSITY OF NEW YORK COLLEGE OF TECHNOLOGY CANTON, NEW YORK COURSE OUTLINE JUST 355 PUBLIC SAFETY CRITICAL INCIDENT RESPONSE Prepared By: Paul R. Bowdre SCHOOL OF SCIENCE, HEALTH AND CRIMINAL JUSTICE
More informationComputer Network Engineering
226 Computer Network Engineering Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Computer Network Engineering Certificate of Achievement: Computer Network Engineering
More informationCourse Title: ITAP 4371: E-Commerce. Semester Credit Hours: 3 (3,0)
Course Title: ITAP 4371: E-Commerce Semester Credit Hours: 3 (3,0) I. Course Overview The primary objective of this course is to expose students to the advanced use of information technology in the design
More informationRARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE HITC 290 MEDICAL CODING INTERNSHIP
RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE HITC 290 MEDICAL CODING INTERNSHIP I. Basic Course Information A. Course Number and Title: HITC-290 Medical Coding Internship B. Date of Proposal:
More informationBBM 461: SECURE PROGRAMMING INTRODUCTION. Ahmet Burak Can
BBM 461: SECURE PROGRAMMING INTRODUCTION 1 Ahmet Burak Can COURSE MATERIAL Counter Hack Reloaded:A Step-by- Step Guide to Computer Attacks and Effective Defenses, Edward Skoudis, Tom Liston, Prentice Hall
More informationIntroduction to Cyber Security / Information Security
Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be
More informationTitle of Course: Cyberlaw New Course: 10/25/02
Department: Accounting and Management Information Systems Course No. IU300 Title of Course: Cyberlaw New Course: 10/25/02 I. Catalog Description and Credit Hours of Course: Provides a foundation in law
More informationImplementing and Supporting Microsoft Windows XP Professional
Implementing and Supporting Microsoft Windows XP Professional Key Data Course #: 2272C Number of Days: 5 Format: Instructor-led The purpose of this course is to address the implementation and desktop support
More informationINCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
More informationRARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE FREN 201 INTERMEDIATE FRENCH I
RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE FREN 201 INTERMEDIATE FRENCH I I. Basic Course Information A. Course Number and Title: FREN-201: Intermediate French I B. Date of Revision: Spring
More informationBellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
More informationKENNESAW STATE UNIVERSITY GRADUATE COURSE PROPOSAL OR REVISION, Cover Sheet (10/02/2002)
KENNESAW STATE UNIVERSITY GRADUATE COURSE PROPOSAL OR REVISION, Cover Sheet (10/02/2002) Course Number/Program Name ACS 7420 Algorithm Design for Big Data Department Computer Science Degree Title (if applicable)
More informationPrerequisite: CIS 271 with a minimum grade of C or consent of department.
CIS 272 Windows Server I Proposed Start: Fall 2013 Instructor's Name: Office Location: Office Hours: Office Phone: E-mail: Course Description: This course prepares students for Microsoft certification.
More informationHow To Pass A Credit Course At Florida State College At Jacksonville
Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CTS 2658 COURSE TITLE: PREREQUISITE(S): COREQUISITE(S): Managing Network Security CNT 2210 with grade
More informationITNW 2305 Network Administration COURSE SYLLABUS
COURSE NUMBER AND TITLE: ITNW 2305 Network Administration ITNW 2305 Network Administration COURSE SYLLABUS COURSE (CATALOG) DESCRIPTION: Topics include network components, user accounts and groups, network
More informationUpon successful completion of this course, a student will meet the following outcomes:
College of San Mateo Official Course Outline 1. COURSE ID: CIS 364 TITLE: Enterprise Data Warehousing Semester Units/Hours: 4.0 units; a minimum of 48.0 lecture hours/semester; a minimum of 48.0 lab hours/semester
More informationEC-Council Certified Security Analyst (ECSA)
EC-Council Certified Security Analyst (ECSA) v8 Eğitim Tipi ve Süresi: 5 Days VILT 5 Day VILT EC-Council Certified Security Analyst (ECSA) v8 Learn penetration testing methodologies while preparing for
More informationNetwork Security Policy
Network Security Policy Policy Contents I. POLICY STATEMENT II. REASON FOR POLICY III. SCOPE IV. AUDIENCE V. POLICY TEXT VI. PROCEDURES VII. RELATED INFORMATION VIII. DEFINITIONS IX. FREQUENTLY ASKED QUESTIONS
More informationNational Cyber League Certified Ethical Hacker (CEH) TM Syllabus
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)
More informationNetworking: EC Council Network Security Administrator NSA
coursemonster.com/uk Networking: EC Council Network Security Administrator NSA View training dates» Overview The EC-Council's NSA certification looks at network security from a defensive view. The NSA
More informationELEN 115 Computer Components and Peripherals
Course Outline Professor: Philip Ashman, M.Sc., P.Eng., CCAI Prerequisite: None Office: C330 Co-requisite: None Phone: (250) 762-5445 ext 4364 Lecture: 3 hrs/wk, Lab: 2.5 hrs/wk E-mail: pashman@okanagan.bc.ca
More informationCourse Title: ITAP 2431: Network Management. Semester Credit Hours: 4 (3,1)
Course Title: ITAP 2431: Network Management Semester Credit Hours: 4 (3,1) I. Course Overview This course introduces students to business data communications and networking concepts, tools and methods.
More informationRARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE. ARTH 223 - History of Photography
RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE ARTH 223 - History of Photography I. Basic Course Information A. Course Number and Title: ARTH-223 History of Photography B. New or Modified Course:
More informationCENTRAL TEXAS COLLEGE ITNW 1316 NETWORK ADMINISTRATION. Semester Hours Credit: 3
CENTRAL TEXAS COLLEGE ITNW 1316 NETWORK ADMINISTRATION INSTRUCTOR: Semester Hours Credit: 3 OFFICE HOURS: I. INTRODUCTION A. An introduction to the basic concepts of network administration, this course
More informationDesigning and Implementing a Server Infrastructure
Course Code: M20413 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Designing and Implementing a Server Infrastructure Overview Get hands-on instruction and practice planning, designing and deploying
More informationIT Security Procedure
IT Security Procedure 1. Purpose This Procedure outlines the process for appropriate security measures throughout the West Coast District Health Board (WCDHB) Information Systems. 2. Application This Procedure
More informationITSY-2459-8001 Security Assessment/Auditing Spring 2010 Professor: Zoltan Szabo D111 LEC TR 11:20AM 12:45PM D111 LAB TR 12:50PM 02:15PM
ITSY-2459-8001 Security Assessment/Auditing Spring 2010 Professor: Zoltan Szabo D111 LEC TR 11:20AM 12:45PM D111 LAB TR 12:50PM 02:15PM CATALOG DESCRIPTION: Capstone experience for the security curriculum.
More informationPREREQUISITE(S): CTS 1131, CTS 1133 and CTS 1120
Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CAP 2140 COURSE TITLE: Data Forensics I PREREQUISITE(S): CTS 1131, CTS 1133 and CTS 1120 COREQUISITE(S):
More informationCOURSE 20413C: DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE
ABOUT THIS COURSE This 5 day course covers the knowledge and skills needed to provide an enterprise solution that supports manual and automated server installations in a physical and virtual environment
More informationRARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE. ENVI-102: Environmental Science and Sustainability
I. Basic Course Information RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE ENVI-102: Environmental Science and Sustainability A. Course Number and Title: ENVI-102: Environmental Science and Sustainability
More informationIntroduction. Acknowledgments Support & Feedback Preparing for the Exam. Chapter 1 Plan and deploy a server infrastructure 1
Introduction Acknowledgments Support & Feedback Preparing for the Exam xv xvi xvii xviii Chapter 1 Plan and deploy a server infrastructure 1 Objective 1.1: Design an automated server installation strategy...1
More informationDesigning and Implementing a Server Infrastructure
WINDOWS 2012 COURSE OUTLINE Visit Our Website to Enroll Now Www.ITBigBang.Com/IT-Training Designing and Implementing a Server Infrastructure Course Title Designing and Implementing a Server Infrastructure
More informationComputer Network Engineering
208 Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Certificate of Achievement: Skills Competency Award: Cisco Networking Associate Program Description The field of
More information