APPLIED INFORMATION TECHNOLOGY PROGRAM ASSESSMENT REPORT. For

Size: px
Start display at page:

Download "APPLIED INFORMATION TECHNOLOGY PROGRAM ASSESSMENT REPORT. For"

Transcription

1 APPLIED INFORMATION TECHNOLOGY PROGRAM ASSESSMENT REPORT For School of Information Arts and Technologies Yale Gordon College of Liberal Arts University of Baltimore 1.0 INTRODUCTION. The goal of this report is to provide an independent assessment of the proposed Bachelor of Science degree in Applied Information Technology (AIT) to determine if the Program Mission Statement can be successfully achieved. Additionally, this report includes an independent assessment of the program s learning objectives. 2.0 EVALUATION OF APPLIED INFORMATION TECHNOLOGY PROGRAM Overall, the mission statement for this program is clear and practical; however, the program goals identified in the Program Self-Study, dated March 16, 2007, needs to address the broader Information Technology (IT) needs of government and business. Paragraph C.1 is too limited in scope, only addressing databases and web-servers. The program should prepare students to also address the technical challenges of designing and implementing IT enterprises. The lower and upper division University requirements should also include courses that introduce the student to the broad IT challenges facing the global market place and address: Technology trends Ability to understand various IT applications Assess and analyze IT requirements from an operational perspective Software development and system architecture processes It s essential the students understand these fundamentals prior to enrolling in the AIT courses. This section includes an evaluation of each of the Applied Information Technology Requirements categories, with an emphasis on Information Security. 2.1 NETWORKING These three courses (COSC 305, 307, and 401) provide a good foundation of the technologies surrounding IT network issues. For COSC 401, recommend that week 14, Introduction to Network Security, not duplicate course material from COSC 433, Network Security. There s a tendency to repeat textbook information, such as firewall or Page 1

2 Virtual Private Network (VPN) issues. The instructor may want to combine classes from weeks 10 and 14 for COSC 401. This would free one class to spend more time to address systems integration and architecture issues with networking, and improving analytical capabilities of the students. 2.2 DESIGN AND IMPLEMENTATION OF DESKTOP AND SERVER-BASED APPLICATIONS These three courses (COSC 310, 403, and 401) provide a good foundation to help students understand the design and implementation of desktop and database applications. Recommend these courses also include learning objectives to improve the understanding of system and network administration and opportunities for hands-on exercises with Microsoft products to learn how to configure desktop and server applications. 2.3 WEB DEVELOPMENT AND SECURITY These courses will form the foundation for learning about many aspects of IT Security, which should include the fundamental concepts of information security and the principles of conducting a security assessment of an IT enterprise and evaluation of current IT security products. Topics should include understanding system vulnerabilities, threats, and the identification of security solutions, use of cryptography, high assurance system design, secure database design, web security and legal issues, and the risk management process COSC Information Assurance This course will form the foundation of learning about IT security and should be a prerequisite for COSC 430 and 432. The title of the course could be misleading and recommend it be changed to Information Security and Assurance. Information Assurance is a term used by the Department of Defense (DoD) and some federal agencies, but it s not a term adopted throughout industry. For example, the financial sector, the private sector s leader in the use of IT Security products and investment, does not focus on assurance. Rather this sector focuses on risk acceptance. This course should be designed for students preparing to enter the workplace in government or the private sector. There are several textbooks available to teach a course like COSC 432, but there isn t a single textbook that can adequately address all of the required topics and learning objectives. Principles of Information Security and Security in Computing are both very good textbooks, but should be supplemented with other materials. I m more familiar with Charles Pfleeger s textbook, which has a fourth addition release. Each chapter is presented in a simple, easy to understand approach. I particularly like the chapter on Economics of Cybersecurity, which addresses real-world, applications-oriented issues. Many students, both at the undergraduate and graduate levels enter the work place unprepared to address real-world technical challenges. This course and program should help prepare them for this challenge. Page 2

3 Before specific recommendations about the course syllabus are provided, there are a couple of administrative recommendations for this course. First, not allowing students to take a make-up exam should be changed. Obviously, make-up exams should be discouraged and be accompanied with a valid reason. Second, recommend including a course project assigned to a group of students, along with the case studies to reinforce the course material. Reallocation of grading weights should be considered, such as 25% each for quizzes/homework assignments, case study/group project, and mid-term and final exams, instead of weighting the mid-term and final exams so much. Some of the students don t do well with talking exams, but may demonstrate their knowledge of the course material with class participation and written assignments. Based on the tentative schedule, it s difficult to fully understand the topics to be included in each class. List below are topics and learning objectives to be considered in each weekly class and additional resources to be used to supplement the textbook: Week 1 Introduction to Information Security and Assurance Understand what Information Security is and its implications in the global market place Comprehend the history of computer security and how it evolved into Information Security Understand the key terms and critical concepts described in the textbook selected for the course Outline the phases of the security systems development life cycle (review NIST Special Publication , Security Considerations in the Information Systems Development Life Cycle, June 2004, Understand the role Information Security professionals provide in an organization (e.g., Chief Information Security Officer) Critical characteristics of protecting information (Confidentiality, Integrity, and Availability) Useful websites (NIST and SANS Week 2 Combine the Need for Security in the first class Understand the threats posed to Information Security and the more common attack techniques associated with those threats Differentiate threats to information systems from attacks against information systems Understand the classes of threats (Interruption, Interception, and Modification) Understand where to obtain threat information Understand malicious code and the types of attacks (e.g., IP scanning, web browsing, viruses, SNMP attacks) Understand and be able to detect signs of insider threats (may want to consider incorporating week 12, Security and Personnel, into this class) Page 3

4 Week 3 Risk Management Process Understand the risk management process Understand various risk assessment methodologies. Recommend reviewing the NIST website and using a GAO report, Information Security Risk Assessment Practices of Leading Organizations, dated November 1999 (GAO/AIMD-00-33) Introduce a case study in class where students demonstrate their knowledge of the risk management process. Another good source of information is the Risk Management Principles for Electronic Banking, Basel Committee Publications No. 82, May Week 4/5 Planning for Security and Physical Security This is a broad topic that can include the development of security policy and continuity of operations/disaster recovery. Security in Computing devoted an entire chapter on this topic, which includes developing a security plan, incident response plans, and physical security. Recommend moving the topic for week 10, Physical Security, to week 5. Recommend including a case study that addresses Incident Response Planning. An excellent article to use is called Outbreak Security Special Attack, from CIO Magazine, dated June 1, 2001 (http// Week 6/7 Cryptography and Public Key Technology Recommend introducing the topic of cryptography before Firewalls, VPNs, and Intrusion Detection Systems (IDS), since many of these security products use encryption and Public Key technology. Students will be better prepared to understand the capabilities of these security products if they understand the concepts of symmetric and asymmetric key cryptography. Emphasize the importance of good/strong authentication Understand terminology (e.g., clear-text, cipher codes, algorithms, key size and key management issues) Understand methods of encryption (e.g., stream cipher, block cipher, transposition, substitution) Understand and discuss various types of algorithms (e.g., DES, AES, PGP, RSA, Kerberos) Understand Public Key technology and the use of public/private keys Recommend including a case study focusing on Public Key technology. A case study that compares and contrasts two widely used PKI providers (Entrust and Verisign) Recommended reading for students that want to learn more about cryptography is Dr. Dobb s Essential Book on Cryptography and Security Week 8 Introduce the topic of Access Control, Authentication, and Biometrics Recommend moving the topics of Firewalls, VPNs, and IDS after the mid-term Page 4

5 Understand authorization and privileges, such as the use of access control lists, the concept of least privilege and separation of duties, and access control methods Understand the three types of authentication (passwords, tokens, Biometrics) Understand the threats to passwords and the need to encrypt (e.g., spoofing, session hijacking and replay, social attacks) Understand strong forms of authentication and the concerns of DNS poisoning, masquerading, and use of one-time passwords Understand the uses of tokens (e.g., Secure ID), badges, ATM cards, and its limitations Understand Biometric methods (e.g., fingerprints, iris, hand, facial, voice) and how Biometric systems work The Biometrics Consortium is an excellent Website to visit, as well as reviewing commercial products at Week 9 Mid-Term The syllabus should clarify if this is an open or closed book exam. Week 10 Firewalls, VPNs and IDS Combine these three topics into one class. Implementation details should be taught in COSC 433 Week 11 High Assurance Standards and Solutions This topic is not currently included in the syllabus, but recommends it be added. Both the private sector and government (US and foreign) are placing more emphasis on the importance of testing, software reliability, and the use of international standards and criteria. Understand the existence of the Common Criteria and the use of its security requirements syntax Understand how to find a Protection Profile or Security Target for a specific product or category of technology, and translate security requirements and capabilities/functionality. Many commercial sectors are demanding higher assurance security products, such as Firewalls or secure DBMS products. Review the Common Criteria Evaluation and Validation Scheme (CCEVS), which can be accessed at the NIST website ( Week 12 Wireless Security Understand various authentication and encryption protocols (e.g., WEP, SSID, MAC, TTLS, PEAP, WTLS) Introduce a case study or homework assignment where students demonstrate their knowledge of a wireless application and the use of the Common Criteria. For example, the student will identify the applicable security functional classes/requirements using a wireless PDA in a hospital environment. Understand wireless threats and attack techniques (e.g., passive eavesdropping, man-in-the-middle, session high-jacking) Page 5

6 Understand wireless security mechanisms (e.g., authentication, encryption, integrity checking) Week 13 Database and Web Security Building on the concepts learned from COSC 425, understand the security requirements for databases, such as physical database security, logical database security, element integrity, auditability, access control, partitioning, and user authentication Understand security for object-oriented databases (e.g., models for mandatory access control, Clark-Wilson Integrity Interpretation) Understand Inference by Direct Attack, which is discussed in Pfleeger s textbook Understand client and server web security issues Understand security protocols, such as Secure HTTP and SSL Understand vulnerabilities, such as active content (e.g., JAVA and Active X) Understand web privacy and Cookies Week 14 Legal and Ethical Issues in Information Security Understand the implications of the First Amendment On-Line Understand US and International laws dealing with cyber security and the differences Discuss various case studies dealing with cyber censorship, cyber privacy, privacy strategies in the workplace, and computer crimes Introduce the concept of search and seizure and the use of computer forensics to help prosecute computer hackers and to protect information assets Week 15 Review/Group Presentations Group presentations should focus on one of the topics discussed during the semester and help prepare students for COSC 433 and 416 Week 16 Final Exam The syllabus should clarify if this is an open or closed book exam COSC 433 Network Security This course should expand the students knowledge of Firewalls, VPNs, and IDS introduced in COSC 432. Recommend expanding the course description to include configuring Firewalls, and the installing, maintaining, and configuring VPNs and IDS. This course should be more hands-on and spend time in a lab. The school must be able to accommodate the students with lab facilities with various commercial security products already installed. Additionally, there should be a lab administrator to assist the professor and students with achieving the course goals. Recommend adding COSC 432, Information Assurance, as a prerequisite. Page 6

7 Recommend modifying the learning objectives, to include installation and configuration of Firewalls, VPNs, and IDS. These skills will help prepare students to enter the workplace as an IT professional. Mastering Network Security is an excellent textbook, which also includes a CD to help the students understand network security products, such as Firewall-1, NT Manage, NetAlert, Guardian Firewall, Real Secure, and Internet Scanner. Case studies should be incorporated into this course using this CD, as well as the products installed in the lab. The syllabus should include a list of commercial products in the lab and the expectations of demonstrating knowledge and use of these products. Students may also be required to understand basic Unix commands to use these products. The syllabus should be expanded to include topics to be discussed each week, assignments, and the grading policy. Recommend adding this statement to the assessment strategy, item 14: Demonstrate the ability to install tools, execute and analyze the results of these tools. Other suggested textbooks include: Firewalls and Internet Security Repelling the Wily Hack, William Cheswick and Steve Bellovin, ISBN Building Internet Firewalls, Brent Chapman and Elizabeth Zwickly, ISBN COSC 416 Advanced Web Development Expand the course description to include web security topics and clearly identify the learning objectives for the course. Additionally, the descriptions of each lesson are well planned, but recommend incorporating web security topics into the lesson plan. For example, the class on February 8 th, Request/Response, should also include discussion of Secure-HTTP. Recommend continuing to build upon the learning objectives introduced in COSC 432, Week 13, and include hands-on experience with commercial tools. Additional learning objectives should include: Understand the concept of Secure web applications Become familiar with some of the commands used with the Windows and Linux operating systems and gain experience with security tools that use these operating systems Become familiar with common vulnerabilities that are leveraged by attackers and countermeasures used to protect against future attacks Be able to test existing web applications against common exploitation techniques Understand the principles of designing and developing more secure web applications Page 7

8 2.4 CAPSTONE EXPERIENCE There was minimal information in the packet of documents reviewed that addressed COSC 490, Practicum in Information Technology. I like the idea of an IT project that supports local non-profit organizations, but I would also include other organizations that benefit the community and society. Organizations such as state and local government, as well as not-for-profit organizations (e.g., Federal Funded Research and Development Centers) also support the University s mission statement. These types of organizations can also better prepare students after graduation. This type of experience should include a topic or career field the student is interested in pursuing after graduation. The topic should be approved by a faculty member, as well as the organization being supported. Recommend including information about course prerequisites and course expectations for the student and faculty advisor. Example Information Security projects include: Installing software firewalls and instructing system administrators (most likely people that donate their time and may not be familiar with computers) how to review the audit trail reports to determine if their system has been compromised Develop procedures for an organization to implement secure web applications Conduct a risk assessment of an organization s IT enterprise 3.0 CENTER OF ACADEMIC EXCELLENCE IN INFORMATION ASSURANCE EDUCATION The School of Information Arts and Technologies may want to consider becoming one of the dozens of schools in the country that already have become certified as a Center of Academic Excellence in Information Assurance. There are several schools in the Baltimore-Washington area that have been certified, such as Johns Hopkins University, Towson University, and George Mason University. In March 2005, the U.S. National Security Agency (NSA) and the Department of Homeland Security designated Nova Southeastern University (NSU) a National Center of Academic Excellence in Information Assurance Education for the academic years Official letters of notification from NSA were sent to NSU s President Ray Ferrero, Florida s Governor Jeb Bush, Florida Members of Congress, and appropriate Congressional Committees. Securing cyberspace and information infrastructures are more important now than ever before. NSA s goal in establishing centers of academic excellence is to reduce vulnerability in our national information infrastructure by promoting higher education in Information Assurance (IA) and producing more professionals with Information Security expertise in various disciplines. This designation applies to the entire university. Page 8

9 Benefits and features of the program are: Prestige: national recognition for NSU in information assurance/security NSU will be expected to serve as a regional center of expertise in IA NSU students will be eligible for scholarships and grants under two programs: - DoD Information Assurance Scholarship Program - Federal Cyber Service Scholarship for Service Program (SFS) Eligibility of NSU faculty/staff for grants and contracts from NSA and DoD At the date of NSU s designation NSA has established 55 such national centers of excellence in the U.S. Examples of other centers of excellence include: Stanford University Georgia Institute of Technology Johns Hopkins University University of Illinois University of North Carolina Carnegie Mellon University of Pennsylvania University of Virginia University of Massachusetts In order to apply, institutions must first obtain certification by NSA of their curriculum in information security. NSA s website for the Centers of Academic Excellence: RECOMMENDATIONS. Overall, the lower and upper level courses, and the Applied Information Technology courses prepare the students to enter the workplace to meet today s IT challenges. Specific recommendations were made in Section 2 of this assessment report that can improve the program. Additionally, recommend the school review the benefits and features of NSA s Center of Excellence Program for Information Assurance and determine if this program supports the school s mission statement. Page 9

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013 City University of Hong Kong Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 01/013 Part I Course Title: Course Code: Course Duration: Cryptography

More information

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification 1. Module Title Information Security 2. Module Code: CS403INS 3. Module Level - Forth Stage 4. Module Leader Safwan M. 5. Teaching Semester 7 and 8 Soran University Faculty of Science and Engineering Computer

More information

Security + Certification (ITSY 1076) Syllabus

Security + Certification (ITSY 1076) Syllabus Security + Certification (ITSY 1076) Syllabus Course: ITSY 1076 Security+ 40 hours Course Description: This course is targeted toward an Information Technology (IT) professional who has networking and

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)

More information

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)

More information

Networking: EC Council Network Security Administrator NSA

Networking: EC Council Network Security Administrator NSA coursemonster.com/uk Networking: EC Council Network Security Administrator NSA View training dates» Overview The EC-Council's NSA certification looks at network security from a defensive view. The NSA

More information

Weighted Total Mark. Weighted Exam Mark

Weighted Total Mark. Weighted Exam Mark CMP4103 Computer Systems and Network Security Period per Week Contact Hour per Semester Weighted Total Mark Weighted Exam Mark Weighted Continuous Assessment Mark Credit Units LH PH TH CH WTM WEM WCM CU

More information

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Professional Penetration Testing Techniques and Vulnerability Assessment ... Course Introduction Today Hackers are everywhere, if your corporate system connects to internet that means your system might be facing with hacker. This five days course Professional Vulnerability Assessment

More information

CIS 4204 Ethical Hacking Fall, 2014

CIS 4204 Ethical Hacking Fall, 2014 CIS 4204 Ethical Hacking Fall, 2014 Course Abstract: The purpose of this course is to provide a basic understanding of computing, networking, programming concepts, and exploitation techniques, as they

More information

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings Computer Security Principles and Practice Second Edition William Stailings Lawrie Brown University ofnew South Wales, Australian Defence Force Academy With Contributions by Mick Bauer Security Editor,

More information

Introduction to Cyber Security / Information Security

Introduction to Cyber Security / Information Security Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be

More information

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming. Elective course in Computer Science University of Macau Faculty of Science and Technology Department of Computer and Information Science SFTW498 Information Security Syllabus 2nd Semester 2011/2012 Part

More information

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0 EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single

More information

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2.

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2. CSET 4850 Computer Network Security (4 semester credit hours) CSET Elective IT Elective Current Catalog Description: Theory and practice of network security. Topics include firewalls, Windows, UNIX and

More information

CNA 432/532 OSI Layers Security

CNA 432/532 OSI Layers Security CNA 432/532 OSI Layers Location: ECC 116 Days: Thursday Semester: Fall 2012 Times: 5:00-7:50 pm Professor: Dr. Amos Olagunju E-mail: aoolagunju@stcloudstate.edu Office Hrs: 3-4 MW, Office: ECC256 Other

More information

Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions

Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions Information Science & Systems Courses INFO 101 - Introduction to Information Technology Introduces

More information

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses

More information

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 275 UNIX and Linux Security Management

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 275 UNIX and Linux Security Management RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 275 UNIX and Linux Security Management I. Basic Course Information A. Course Number & Title: CISY-275 - UNIX and Linux Security Management B. Date of

More information

NETWORK SECURITY (W/LAB) Course Syllabus

NETWORK SECURITY (W/LAB) Course Syllabus 6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information

More information

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led Certification: ENSA Exam 312-38 Course Description This course looks at the network security in defensive view.

More information

COMPUTER SCIENCE/ COMPUTER NETWORKING AND TECHNOLOGIES (COSC)

COMPUTER SCIENCE/ COMPUTER NETWORKING AND TECHNOLOGIES (COSC) COMPUTER SCIENCE/ COMPUTER NETWORKING AND TECHNOLOGIES (COSC) Computer Science (COSC) courses are offered by the School of Information Arts and Technologies within the Yale Gordon College of Liberal Arts.

More information

NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS. Division: Applied Science (AS) Liberal Arts (LA) Workforce Development (WD)

NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS. Division: Applied Science (AS) Liberal Arts (LA) Workforce Development (WD) NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS COURSE IDENTIFICATION Course Code/Number: ETEC 275 Course Title: Computer and Network Security Division: Applied Science (AS) Liberal Arts (LA) Workforce

More information

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

CNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan

CNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan CNT5412/CNT4406 Network Security Course Introduction Zhenhai Duan 1 Instructor Professor Zhenhai Duan (duan@cs.fsu.edu) Office: 162 LOV Office hours: 1:00PM to 2:00PM, T/Th Or by appointment Email: duan@cs.fsu.edu

More information

CS 464/564 Networked Systems Security SYLLABUS

CS 464/564 Networked Systems Security SYLLABUS CS 464/564 Networked Systems Security SYLLABUS College: College of Science Department: Department of Computer Science Syllabus Title: CS 464/564 Networked Systems Security Call Number: 1. Meet the Professor

More information

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus Department of Computer & Information Sciences CSCI-445: Computer and Network Security Syllabus Course Description This course provides detailed, in depth overview of pressing network security problems

More information

Tim Bovles WILEY. Wiley Publishing, Inc.

Tim Bovles WILEY. Wiley Publishing, Inc. Tim Bovles WILEY Wiley Publishing, Inc. Contents Introduction xvii Assessment Test xxiv Chapter 1 Introduction to Network Security 1 Threats to Network Security 2 External Threats 3 Internal Threats 5

More information

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13 COURSE TITLE : INFORMATION SECURITY COURSE CODE : 5136 COURSE CATEGORY : ELECTIVE PERIODS/WEEK : 4 PERIODS/SEMESTER : 52 CREDITS : 4 TIME SCHEDULE MODULE TOPICS PERIODS 1 Introduction to Computer Security

More information

Cyber Security at NSU

Cyber Security at NSU Cyber Security at NSU Aurelia T. Williams, Ph.D. Chair, Department of Computer Science Associate Professor of Computer Science June 9, 2015 Background Undergraduate computer science degree program began

More information

Information Security Services

Information Security Services Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual

More information

Course Outline Computing Science Department Faculty of Science. COMP 3260 3 Credits Computer Network Security (3,1,0) Fall 2015

Course Outline Computing Science Department Faculty of Science. COMP 3260 3 Credits Computer Network Security (3,1,0) Fall 2015 Course Outline Computing Science Department Faculty of Science COMP 30 3 Credits Computer Network Security (3,,0) Fall 05 Instructor: E-Mail: Phone/Voice Mail: Office: Office Hours: CALENDAR DESCRIPTION

More information

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education COURSE OF STUDY 2015-2016 (C)ITM 820 - Information Systems Security and Privacy

More information

Wireless Network Security

Wireless Network Security Wireless Network Security Bhavik Doshi Privacy and Security Winter 2008-09 Instructor: Prof. Warren R. Carithers Due on: February 5, 2009 Table of Contents Sr. No. Topic Page No. 1. Introduction 3 2. An

More information

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing

More information

Bachelor of Information Technology (Network Security)

Bachelor of Information Technology (Network Security) Bachelor of Information Technology (Network Security) Course Structure Year 1: Level 100 Foundation knowledge subjects SEMESTER 1 SEMESTER 2 ITICT101A Fundamentals of Computer Organisation ITICT104A Internetworking

More information

EC-Council. Certified Ethical Hacker. Program Brochure

EC-Council. Certified Ethical Hacker. Program Brochure EC-Council C Certified E Ethical Hacker Program Brochure Course Description The (CEH) program is the core of the most desired information security training system any information security professional

More information

MS Information Security (MSIS)

MS Information Security (MSIS) MS Information Security (MSIS) Riphah Institute of Systems Engineering (RISE) Riphah International University, Islamabad, Pakistan 1. Program Overview: The program aims to develop core competencies in

More information

EC Council Certified Ethical Hacker V8

EC Council Certified Ethical Hacker V8 Course Code: ECCEH8 Vendor: Cyber Course Overview Duration: 5 RRP: 2,445 EC Council Certified Ethical Hacker V8 Overview This class will immerse the delegates into an interactive environment where they

More information

Information Security Curriculum Creation: A Case Study

Information Security Curriculum Creation: A Case Study Information Security Curriculum Creation: A Case Study Bradley Bogolea College of Engineering The Pennsylvania State University University Park, Pa 16802 bdb194@cse.psu.edu Kay Wijekumar School of Information

More information

CYBERTRON NETWORK SOLUTIONS

CYBERTRON NETWORK SOLUTIONS CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified

More information

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun CSCI 454/554 Computer and Network Security Instructor: Dr. Kun Sun About Instructor Dr. Kun Sun, Assistant Professor of Computer Science http://www.cs.wm.edu/~ksun/ Phone: (757) 221-3457 Email: ksun@wm.edu

More information

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

CH ENSA EC-Council Network Security Administrator Detailed Course Outline CH ENSA EC-Council Network Security Administrator Detailed Course Outline Summary Duration Vendor Audience 5 Days hands-on training EC-Council Security Professionals Level Technology Category Advance Ethical

More information

e-code Academy Information Security Diploma Training Discerption

e-code Academy Information Security Diploma Training Discerption e-code Academy Information Security Diploma Training 2015 I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. OBJECTIVE... 3 LIST OF POSTGRADUATE COURSES... 3 FIRST SEMESTER

More information

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 210 COURSE NUMBER: CIS 210 COURSE NAME: MEETING PLACE: Random On-Line DIVISION: Business, Computing & Applied Technology

More information

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months MODULE: INTRODUCTION TO INFORMATION SECURITY INFORMATION SECURITY ESSENTIAL TERMINOLOGIES SECURITY

More information

CIS 250 NETWORK SECURITY JACKSON STATE COMMUNITY COLLEGE COURSE SYLLABUS

CIS 250 NETWORK SECURITY JACKSON STATE COMMUNITY COLLEGE COURSE SYLLABUS CIS 250 NETWORK SECURITY JACKSON STATE COMMUNITY COLLEGE COURSE SYLLABUS Prerequisites: CIS 175 Course Description This course is designed to give students a fundamental understanding of computer and network

More information

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 276 Windows Security Management

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 276 Windows Security Management RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 276 Windows Security Management I. Basic Course Information A. Course Number & Title: CISY-276 Windows Security Management B. Date of Revision: Spring

More information

Boston University MET CS 690. Network Security

Boston University MET CS 690. Network Security Boston University MET CS 690 Network Security Course Overview This course will cover advanced network security issues and solutions. The main focus on the first part of the course will be on Security basics,

More information

TCOM 562 Network Security Fundamentals

TCOM 562 Network Security Fundamentals TCOM 562 Network Security Fundamentals George Mason University Fall 2009 Jerry Martin Fairfax Campus Tel: (703) 993-3810 Email: gmartin@gmu.edu Office Hours: by appointment only 1. Announcements The class

More information

Information Systems Security Certificate Program

Information Systems Security Certificate Program Information Technologies Programs Information Systems Security Certificate Program Accelerate Your Career extension.uci.edu/infosec University of California, Irvine Extension s professional certificate

More information

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶 Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course

More information

Principles of Information Assurance Syllabus

Principles of Information Assurance Syllabus Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus Department of Computer & Information Sciences INFO-450: Information Systems Security Syllabus Course Description This course provides a deep and comprehensive study of the security principles and practices

More information

TEACHING COMPUTER SECURITY TO UNDERGRADUATES A Hands-On Approach

TEACHING COMPUTER SECURITY TO UNDERGRADUATES A Hands-On Approach TEACHING COMPUTER SECURITY TO UNDERGRADUATES A Hands-On Approach Rahul V. Tikekar Southern Oregon University Abstract: Increasing awareness of the vulnerabilities of computer systems has led to the introduction

More information

ITSY-2459-8001 Security Assessment/Auditing Spring 2010 Professor: Zoltan Szabo D111 LEC TR 11:20AM 12:45PM D111 LAB TR 12:50PM 02:15PM

ITSY-2459-8001 Security Assessment/Auditing Spring 2010 Professor: Zoltan Szabo D111 LEC TR 11:20AM 12:45PM D111 LAB TR 12:50PM 02:15PM ITSY-2459-8001 Security Assessment/Auditing Spring 2010 Professor: Zoltan Szabo D111 LEC TR 11:20AM 12:45PM D111 LAB TR 12:50PM 02:15PM CATALOG DESCRIPTION: Capstone experience for the security curriculum.

More information

Course Title: ITAP 3471: Web Server Management

Course Title: ITAP 3471: Web Server Management Course Title: ITAP 3471: Web Server Management Semester Credit Hours: 4 (3,1) I. Course Overview The primary objective of this course is to give students a comprehensive overview of the tools and techniques

More information

Information Assurance Curricula and Certifications

Information Assurance Curricula and Certifications Information Assurance Curricula and Certifications Abstract Victor Piotrowski Department of Mathematics and Computer Science University of Wisconsin-Superior vpiotrow@uwsuper.edu Although there have been

More information

FBLA Cyber Security aligned with Common Core 6.14. FBLA: Cyber Security RST.9-10.4 RST.11-12.4 RST.9-10.4 RST.11-12.4 WHST.9-10.4 WHST.11-12.

FBLA Cyber Security aligned with Common Core 6.14. FBLA: Cyber Security RST.9-10.4 RST.11-12.4 RST.9-10.4 RST.11-12.4 WHST.9-10.4 WHST.11-12. Competency: Defend and Attack (virus, spam, spyware, Trojans, hijackers, worms) 1. Identify basic security risks and issues to computer hardware, software, and data. 2. Define the various virus types and

More information

University of Wisconsin-Whitewater Curriculum Proposal Form #3 New Course

University of Wisconsin-Whitewater Curriculum Proposal Form #3 New Course Effective Term: 2147 (Fall 2014) University of Wisconsin-Whitewater Curriculum Proposal Form #3 New Course Subject Area - Course Number: COMPSCI 462 (See Note #1 below) Cross-listing: N/A Course Title:(Limited

More information

CS 391-950 Ethical Hacking Spring 2016

CS 391-950 Ethical Hacking Spring 2016 CS 391-950 Ethical Hacking Spring 2016 Instructor: Shahriar Nick Rahimi Office: Faner 2136 Office Hours: MW 8:30 am-11 am Friday 10 am- 11 am E-Mail: nick@cs.siu.edu Course Web Site: https://online.siu.edu/

More information

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

If you know the enemy and know yourself, you need not fear the result of a hundred battles. Rui Pereira,B.Sc.(Hons),CIPS ISP/ITCP,CISSP,CISA,CWNA/CWSP,CPTE/CPTC Principal Consultant, WaveFront Consulting Group ruiper@wavefrontcg.com 1 (604) 961-0701 If you know the enemy and know yourself, you

More information

Implementing Cisco IOS Network Security v2.0 (IINS)

Implementing Cisco IOS Network Security v2.0 (IINS) Implementing Cisco IOS Network Security v2.0 (IINS) Course Overview: Implementing Cisco IOS Network Security (IINS) v2.0 is a five-day instructor-led course that is presented by Cisco Learning Partners

More information

PRINCE GEORGE'S COMMUNITY COLLEGE OFFICE OF INSTRUCTION MASTER COURSE SYLLABUS

PRINCE GEORGE'S COMMUNITY COLLEGE OFFICE OF INSTRUCTION MASTER COURSE SYLLABUS PRINCE GEORGE'S COMMUNITY COLLEGE OFFICE OF INSTRUCTION MASTER COURSE SYLLABUS CIS 162 Computer Security, Security+ Michael Burt 12/19/2006 Course Designator and Title Prepared by Date Barry Bugg Dr. Aaron

More information

Course Design Document. IS403: Advanced Information Security and Trust

Course Design Document. IS403: Advanced Information Security and Trust Course Design Document IS403: Advanced Information Security and Trust Version 1.3 05/10/ 2008 Xuhua Ding Table of Content 1 Review Summary...3 2 Overview of Advanced Information Security and Trust Course...

More information

Information Systems and Tech (IST)

Information Systems and Tech (IST) California State University, San Bernardino 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey

More information

Information Security and Privacy

Information Security and Privacy IS 2150 / TEL 2810 Information Security and Privacy James Joshi Associate Professor, SIS Introduction Aug 28, 2013 1 Contact Instructor: James B. D. Joshi 706A, IS Building Phone: 412-624-9982 E-mail:

More information

CIS 253. Network Security

CIS 253. Network Security CIS 253 Network Security Approved: May 6, 2011 EFFECTIVE DATE: Fall 2011 COURSE PACKAGE FORM Team Leader and Members Andra Goldberg, Matt Butcher, Steve Sorden, Dave White Date of proposal to Curriculum

More information

Access FedVTE online at: fedvte.usalearning.gov

Access FedVTE online at: fedvte.usalearning.gov FALL 2015 Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk her e or email the Help Desk at support@usalearning.net. To speak with a Help Desk

More information

Information Security Policy

Information Security Policy Information Security Policy Steve R. Hutchens, CISSP EDS, Global Leader, Homeland Security Agenda Security Architecture Threats and Vulnerabilities Design Considerations Information Security Policy Current

More information

CCA CYBER SECURITY TRACK

CCA CYBER SECURITY TRACK CCA CYBER SECURITY TRACK 2013-2014 CCA Advanced Cyber Security Track A detailed description of the advanced cyber security track. Courses to be offered in the CCA Advanced Cyber Security Track 2013-2014

More information

Network Security Administrator

Network Security Administrator Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze

More information

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code

More information

Higher National Unit specification: general information

Higher National Unit specification: general information Higher National Unit specification: general information Unit code: H17V 34 Superclass: CB Publication date: March 2012 Source: Scottish Qualifications Authority Version: 01 Unit purpose This Unit is designed

More information

Design and Configuration of a Network Security and Forensics Lab

Design and Configuration of a Network Security and Forensics Lab Design and Configuration of a Network Security and Forensics Lab Billy Harris Billy-Harris@utc.edu Joseph Kizza Joseph-Kizza@utc.edu Mike Ward Mike-Ward@utc.edu ABSTRACT This paper describes the design

More information

UVic Department of Electrical and Computer Engineering

UVic Department of Electrical and Computer Engineering UVic Department of Electrical and Computer Engineering COURSE OUTLINE Elec 567 Advanced Network Security and Forensics Spring 2014 Instructor: Office Hours: Dr. Issa Traore Days: Monday, Thursday Phone:

More information

NETWORK ADMINISTRATION AND SECURITY

NETWORK ADMINISTRATION AND SECURITY NETWORK ADMINISTRATION AND SECURITY Unit I (NAS) (W- 10) Q. 1) What is Security Attack? Explain general categories of attack with examples. 7 Q. 2) List and define the five security services. 5 Q. 3) Define

More information

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of

More information

Computer Network Engineering

Computer Network Engineering 226 Computer Network Engineering Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Computer Network Engineering Certificate of Achievement: Computer Network Engineering

More information

InfoSec Academy Application & Secure Code Track

InfoSec Academy Application & Secure Code Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

Network Security Course Specifications2011-2012

Network Security Course Specifications2011-2012 Assiut University Faculty of Computers & Information Department of Information Technology Quality Assurance Unit Network Security Course Specifications2011-2012 Relevant program B.Sc. in Computers and

More information

Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison

Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation

More information

Priority III: A National Cyberspace Security Awareness and Training Program

Priority III: A National Cyberspace Security Awareness and Training Program Priority III: A National Cyberspace Security Awareness and Training Program Everyone who relies on part of cyberspace is encouraged to help secure the part of cyberspace that they can influence or control.

More information

CESG Certification of Cyber Security Training Courses

CESG Certification of Cyber Security Training Courses CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security

More information

Network Security: A Practical Approach. Jan L. Harrington

Network Security: A Practical Approach. Jan L. Harrington Network Security: A Practical Approach Jan L. Harrington ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Morgan Kaufmann is an imprint of

More information

CCNA Security v1.0 Scope and Sequence

CCNA Security v1.0 Scope and Sequence CCNA Security v1.0 Scope and Sequence Last updated April 7, 2011 Target Audience The Cisco CCNA Security course is designed for Cisco Networking Academy students seeking career-oriented, entry-level security

More information

LINUX / INFORMATION SECURITY

LINUX / INFORMATION SECURITY LINUX / INFORMATION SECURITY CERTIFICATE IN LINUX SYSTEM ADMINISTRATION The Linux open source operating system offers a wide range of graphical and command line tools that can be used to implement a high-performance,

More information

Computer Security. Introduction to. Michael T. Goodrich Department of Computer Science University of California, Irvine. Roberto Tamassia PEARSON

Computer Security. Introduction to. Michael T. Goodrich Department of Computer Science University of California, Irvine. Roberto Tamassia PEARSON Introduction to Computer Security International Edition Michael T. Goodrich Department of Computer Science University of California, Irvine Roberto Tamassia Department of Computer Science Brown University

More information

Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology

Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology Testimony of Eunice Santos Before the House Oversight and Government Affairs Committee Subcommittee on Information Technology Federal Efforts to Improve Cybersecurity June 20 th, 2016 Chicago, Illinois

More information

MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY

MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY 1) Awareness Programme on Cyber Security for Users of Computer Awareness Programme on Cyber Security for Users of Computer 1 day To make the users of computers

More information

Monfort College of Business Semester Course Syllabus (2015-2016) COURSE PREFIX/TITLE: BACS 382 TCP/IP Network Security Sem. Hrs. 3 Ed.

Monfort College of Business Semester Course Syllabus (2015-2016) COURSE PREFIX/TITLE: BACS 382 TCP/IP Network Security Sem. Hrs. 3 Ed. Monfort College of Business Semester Course Syllabus (2015-2016) COURSE PREFIX/TITLE: BACS 382 TCP/IP Network Security Sem. Hrs. 3 Ed. Cap: 40 CATALOG DESCRIPTION: Prerequisite: BACS 380 or consent of

More information

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please

More information

CSC 474 Information Systems Security

CSC 474 Information Systems Security CSC 474 Information Systems Security Introduction About Instructor Dr. Peng Ning, assistant professor of computer science http://www.csc.ncsu.edu/faculty/ning pning@ncsu.edu (919)513-4457 Office: Room

More information

information security and its Describe what drives the need for information security.

information security and its Describe what drives the need for information security. Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business.

More information

Fundamentals of Network Security - Theory and Practice-

Fundamentals of Network Security - Theory and Practice- Fundamentals of Network Security - Theory and Practice- Program: Day 1... 1 1. General Security Concepts... 1 2. Identifying Potential Risks... 1 Day 2... 2 3. Infrastructure and Connectivity... 2 4. Monitoring

More information