CIS 253. Network Security
|
|
|
- Augustine Tyler
- 10 years ago
- Views:
Transcription
1 CIS 253 Network Security Approved: May 6, 2011 EFFECTIVE DATE: Fall 2011
2 COURSE PACKAGE FORM Team Leader and Members Andra Goldberg, Matt Butcher, Steve Sorden, Dave White Date of proposal to Curriculum Sub-committee: 5/6/2011 Purpose: New _X_Change Retire If this is a change, what is being changed? (Check ALL that apply) Update Prefix Title Learning Units _X Competencies Format Change _X_ Course Description Course Number _X_ Textbook Credits Prerequisite Effective Semester/Year Fall 2011 Spring 20 Summer 20 COURSE INFORMATION Prefix & Number: Title: CIS 253 Network Security Catalog Course Description: This course presents network security concepts and discusses the tools and techniques necessary to safeguard computer stored data. Credit Hours: 3 Prerequisite(s) Lecture Hours: Lab Hours: 3 0 Prerequisite CIS 153 Network Essentials or Permission of Academic Chair Co-requisite(s) Does this course need a separately scheduled lab component? Yes Does this course require additional fees? If so, please explain. Yes X No X No Is there a similar course in the course bank? Yes (Please identify.) _X No Articulation: Is this course or an equivalent offered at other two and four-year universities in Arizona? No _X Yes (Identify the college, subject, prefix, number and title: Elective credit to ASU and NAU
3 Writing Across the Curriculum Rationale: Mohave Community College firmly supports the idea that writing can be used to improve education; students who write in their respective content areas will learn more and retain what they learn better than those who don t. Courses in the core curriculum have been identified as Writing Across the Curriculum courses. Minimum standards for the Writing Across the Curriculum riculum component are: 1. The writing assignments should total words. For example, a single report which is 1500 words in length OR a series of essay questions and short papers (example: four 375-word assignments) which total 1500 words could meet the requirement. 2. The writing component will represent at least 10% of a student s final grade in the course. Is this course identified as a Writing Across the Curriculum course? Yes X No (See addendum for writing rubrics) Intended Course Goals By the end of the semester, students will be able to: 1. Define security principles and recommended security baselines to assist organizations in defending against attacks on their networked computer systems and mobile systems such as tablets, netbooks and smart phones. 2. Through security policy and procedures, protect both internal and external communications from unauthorized access. 3. Identify the types of basic attacks, i.e. password guessing, social engineering, and identity attacks, and the best procedures to guard against these intrusions. 4. Use effective authentication methods including usernames and passwords, biometrics, and multifactor authentication methods. 5. Describe the steps necessary to secure a network infrastructure using security zones and Virtual Local Area Networks (VLANs). 6. Use Cryptography to create digital signatures and encryption so that information cannot be viewed by unauthorized users when it is transmitted or stored. 7. Design a security policy that includes a password management policy, privacy policy, and acceptable use policy (AUP). Course Competencies and Objectives By the end of the semester, students will be able to:
4 Competency 1 Define information security and identify the critical challenges for information security professionals Objective 1.1 List and define information security terminology Objective 1.2 List the challenges for security personnel when protecting a network from attacks including the speed of attacks, distributed attacks, and the need for faster detection of weaknesses Objective 1.3 Describe the general roles available in information security careers including security management, security engineering, and security administration. Competency 2 Describe attackers and their motives for harming systems that store, process, and exchange that information Objective 2.1 Develop attacker profiles Objective 2.2 Describe basic attacks and identity attacks Objective 2.3 Identify denial of service attacks Competency 3 Describe the basic principles for designing a secure system which includes access control, authentication, and auditing Objective 3.1 Describe security principles such as layering and obscuring critical data Objective 3.2 Use effective authentication methods Objective 3.3 Control access to computer systems and audit information security schemes Objective 3.4 List the steps necessary to disable nonessential systems and ensure updates to systems are conducted on a routine basis Competency 4 Create policies to protect the network and organizational infrastructure Objective 4.1 Design and/or document a network topology of an organization Objective 4.2 Secure removable media by establishing security policies and procedures Objective 4.3 Define a VLAN Virtual Local Area Network and its advantages and disadvantages when addressing security concerns Objective 4.4 Construct a security zone to separate secure users from outsiders Objective 4.5 Describe security provisions and unique security features needed for tablets, netbooks, smart phones, and other mobile devices. Competency 5 Develop the procedures necessary to protect electronic communication Objective 5.1 Define the common attacks of systems including malware, spam, and hoaxes Objective 5.2 Define repurposed programming or using programming tools in ways more harmful than for what they were originally intended as it relates to Web attacks Objective 5.3 Describe the steps necessary to protect Web communications using Secure Sockets Layer/Transport Layer Security protocol Objective 5.4 Define tunneling protocols as the technique of encapsulating one packet of data within another type to create a secure link of transportation, Competency 6 Explain cryptography concepts and define the terminology of encryption Objective 6.1 Define cryptography and security procedures using hashing algorithms Objective 6.2 List the steps to protect data with symmetric and asymmetric encryption algorithms Objective 6.3 Develop a digital signature to secure communication data Objective 6.4 Explain cryptography strengths and vulnerabilities Competency 7 Develop an operational security plan Objective 7.1 List the three most important procedures for developing a security plan, 1) establish a physical security perimeter, 2) establish a business continuity plan, and 3) plan for disaster recovery Objective 7.2 Define two types of defenses that are commonly referenced when shielding wireless signals: Telecommunications Electronics Material Protected from Emanating Spurious Transmissions, or TEMPEST and Faraday cage. Objective 7.3 Construct a disaster recovery plan (DRP) that addresses what to do if a major catastrophe occurs that could cause the organization to cease functioning
5 Competency 8 Develop a security policy for protecting computer information systems in an organization Objective 8.1 Design a security policy and that includes compliance monitoring and evaluation Objective 8.2 Describe the security policy cycle Objective 8.3 Define types of security policies including acceptable use policy, human resource policy, password management policy, privacy policy, disposal and destruction policy, and service-level agreement Competency 9 Develop a security management plan Objective 9.1 Define identity management and digital rights management Objective 9.2 Develop an effective training and education program for users Objective 9.3 Create a plan that considers changes in system architecture and classifications of sensitive documents Competency 10 Describe security careers and the skills necessary to become a security professional Objective 10.1 Define computer forensics and the proper response to an incident Objective 10.2 List information security jobs and skills Objective 10.3 Describe host intrusion prevention (HIP) and behavior blocking as two of the latest defenses in network security Teacher s Guide Course Textbook, Materials and Equipment Textbook(s) Title Security + Guide to Network Security Fundamentals, 4th ed. or most recent edition Author(s) Ciampa Publisher Course Technology ISBN Software/ Equipment Textbook Costs Title Author(s) Publisher ISBN Please indicate how much the textbook would cost if purchased through Barnes & Noble: $ Modality _X On-ground _X On-line Course Assessments Description of Possible Course Assessments (Essays, multiple choice, etc.) Exams standardized for this course? Midterm Final Other (Please specify): Are exams required by the department? Yes _X No If Yes, please specify: Where can faculty members locate or access the required
6 standardized exams for this course? (Contact Person and Location) Example: NCK Academic Chair Office Student Outcomes: Identify the general education goals for student learning that is a component of this course. Check all that apply: 1. Communicate effectively. a. Read and comprehend at a college level. b. Write effectively in a college setting. Method of Assessment Create a security procedures document for institutional policy. 2. Demonstrate effective quantitative reasoning and problem solving skills. 3. Demonstrate effective qualitative reasoning skills. Present solutions to case problems involving data security policies and procedures. 4. Apply effective methods of inquiry. a. Generate research paper by gathering information from varied sources, analyzing data and organizing information into a coherent structure. b. Employ the scientific method. 5. Demonstrate sensitivity to diversity a. Experience the creative products of humanity. b. Describe alternate historical, cultural, global perspectives.
CIS 156. Firewalls and Intrusion Detection
CIS 156 Firewalls and Intrusion Detection Approved: May 6, 2011 EFFECTIVE DATE: Fall 2011 COURSE PACKAGE FORM Team Leader and Members Andra Goldberg, Matt Butcher, Dave White, Steve Sorden Date of proposal
CIS 270. Systems Analysis and Design
CIS 270 Systems Analysis and Design Approved: May 6, 2011 EFFECTIVE DATE: Fall 2011 COURSE PACKAGE FORM Team Leader and Members Andra Goldberg, Matt Butcher, Steve Sorden, Dave White Date of proposal to
MEA 116. Electronic Medical Records. Course Package
MEA 116 Electronic Medical Records Course Package Approved: December 3, 2010 EFFECTIVE DATE: Spring 2011 COURSE PACKAGE FORM Team Leader and Members Carol Elledge, Lori Howell, Jeff Turner, Lori Hogue
CIS 241 INTRODUCTION TO E-COMMERCE
CIS 241 INTRODUCTION TO E-COMMERCE APPROVED 11/09/2011 EFFECTIVE FALL 2012-13 Prefix & Number CIS 241 Course Title: E-Commerce Technology Purpose of this submission: New Change/Updated Retire If this is
PAR 201. Legal Research and Writing II. Course Package
PAR 201 Legal Research and Writing II Course Package Approved November 5, 2010 Effective Spring 2011 COURSE PACKAGE FORM Team Leader and Members Date of proposal to Curriculum Sub-committee: Candace Hofstadler
MEA 141. Medical Billing. Course Package
MEA 141 Medical Billing Course Package Approved: December 3, 2010 EFFECTIVE DATE: Fall 2011 COURSE PACKAGE FORM Team Leader and Members Carol Elledge, Lori Howell, Jeff Turner, Lori Hogue Date of proposal
MEA 130 MEDICAL CODING I (ICD-10-CM)
MEA 130 MEDICAL CODING I (ICD-10-CM) PRESENTED FEBRUARY 3, 2012 EFFECTIVE: FALL 2012-13 Prefix & Number MEA 130 Course Title: Medical Coding I ICD-10-CM Purpose of this submission: New Change/Updated Retire
CHD 270 CLINICAL STRATEGIES IN SUBSTANCE ABUSE TREATMENT
CHD 270 CLINICAL STRATEGIES IN SUBSTANCE ABUSE TREATMENT PRESENTED AND APPROVED: DECEMBER 7, 2012 EFFECTIVE: FALL 2013-14 Prefix & Number CHD 270 Course Title: Clinical Strategies in Substance Abuse Treatment
CHD 246 CO-OCCURRING DISORDERS
CHD 246 CO-OCCURRING DISORDERS PRESENTED AND APPROVED: DECEMBER 7, 2012 EFFECTIVE: FALL 2013-14 Prefix & Number CHD 246 Course Title: Co-Occurring Disorders Purpose of this submission: New Change/Updated
CIS 280. Computer Information Systems Internship. Course Package
1 CIS 280 Computer Information Systems Internship Course Package Approved August 6, 2009 2 COURSE PACKAGE FORM Contact person(s) Andra Goldberg & Matt Butcher Date of proposal to Fall 2009 Curriculum Committee
BUE 130 FINANCIAL MANAGEMENT FOR ENTREPRENEURS
BUE 130 FINANCIAL MANAGEMENT FOR ENTREPRENEURS PRESENTED AND APPROVED: MAY 4, 2012 EFFECTIVE: FALL 2012-13 Prefix & Number BUE130 Course Title: Financial Management for Entrepreneurs Purpose of this submission:
BUS 221 FINANCIAL ACCOUNTING
BUS 221 FINANCIAL ACCOUNTING PRESENTED AND APPROVED: AUGUST 9, 2012 EFFECTIVE: FALL 2013-14 Prefix & Number BUS 221 Course Title: Financial Accounting Purpose of this submission: New X Change/Updated Retire
MEA 110 ADMINISTRATIVE MEDICAL ASSISTING
MEA 110 ADMINISTRATIVE MEDICAL ASSISTING PRESENTED: FEBRUARY 3, 2012 EFFECTIVE: FALL 2012-13 Prefix & Number MEA 110 Course Title: Administrative Medical Assisting Purpose of this submission: New Change/Updated
AJS 101 INTRODUCTION TO ADMINISTRATION OF JUSTICE
AJS 101 INTRODUCTION TO ADMINISTRATION OF JUSTICE Presented and Approved: December 7, 2012 Effective: Fall 2013-14 Prefix & Number AJS 101 Course Title: Introduction to Administration of Justice Purpose
ASE 133 AUTO HVAC SYSTEMS
ASE 133 AUTO HVAC SYSTEMS PRESENTED AND APPROVED: DECEMBER 7, 2012 EFFECTIVE: FALL 2013-14 Prefix & Number ASE 133 Course : Auto HVAC Systems Purpose of this submission: New Change/Updated Retire If this
BUS 204 BUSINESS COMMUNICATIONS
BUS 204 BUSINESS COMMUNICATIONS PRESENTED AND APPROVED: MAY 4, 2012 EFFECTIVE: FALL 2012-13 Prefix & Number BUS 204 Course Title: Business Communications Purpose of this submission: New Change/Updated
ENG 136 TECHNICAL PROFESSIONAL WRITING
ENG 136 TECHNICAL PROFESSIONAL WRITING PRESENTED AND APPROVED: MAY 4, 2012 EFFECTIVE - FALL 2012-13 Prefix & Number ENG 136 Course Title: Technical/Professional Writing Purpose of this submission: Update
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals
RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 229 Information Security Fundamentals I. Basic Course Information A. Course Number & Title: CISY-229 Information Security Fundamentals B. New or Modified
Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification
1. Module Title Information Security 2. Module Code: CS403INS 3. Module Level - Forth Stage 4. Module Leader Safwan M. 5. Teaching Semester 7 and 8 Soran University Faculty of Science and Engineering Computer
ACC 135. Course Package
1 ACC 135 Accounting Systems and Procedures Course Package Approved August 6, 2009 2. COURSE PACKAGE FORM Contact person(s) Dr. Eric Aurand, Dr. James Childe Date of proposal to Fall 2009 Curriculum Committee
HVA 120 RESIDENTIAL HVAC INSTALLATION
HVA 120 RESIDENTIAL HVAC INSTALLATION PRESENTED AND APPROVED: AUGUST 9, 2012 EFFECTIVE: FALL 2013-14 Prefix & Number HVA 120 Course Title: Residential HVAC Installation Purpose of this submission: New
DAE 115. Office Management for the Dental Assistant. Course Package
DAE 115 Office Management for the Dental Assistant Course Package Approved February 12, 2010 COURSE PACKAGE FORM Contact Person (s) Date of proposal to Curriculum Sub-committee: Kathleen R. Baleno February
INSTRUCTION. Course Package AJS 225 CRIMINOLOGY PRESENTED AND APPROVED: DECEMBER 7, 2012 EFFECTIVE: FALL 2013-14. MCC Form EDU 0007 (rev.
AJS 225 CRIMINOLOGY PRESENTED AND APPROVED: DECEMBER 7, 2012 EFFECTIVE: FALL 2013-14 Prefix & Number AJS 225 Purpose of this submission: To update format, add Writing Across the Curriculum component, and
Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits)
Page 1 of 5 Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description:
CIS 250 NETWORK SECURITY JACKSON STATE COMMUNITY COLLEGE COURSE SYLLABUS
CIS 250 NETWORK SECURITY JACKSON STATE COMMUNITY COLLEGE COURSE SYLLABUS Prerequisites: CIS 175 Course Description This course is designed to give students a fundamental understanding of computer and network
City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013
City University of Hong Kong Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 01/013 Part I Course Title: Course Code: Course Duration: Cryptography
Implementing Cisco IOS Network Security v2.0 (IINS)
Implementing Cisco IOS Network Security v2.0 (IINS) Course Overview: Implementing Cisco IOS Network Security (IINS) v2.0 is a five-day instructor-led course that is presented by Cisco Learning Partners
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing
RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education
RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education COURSE OF STUDY 2015-2016 (C)ITM 820 - Information Systems Security and Privacy
Table of Contents. Introduction. Audience. At Course Completion
Table of Contents Introduction Audience At Course Completion Prerequisites Certified Professional Exams Student Materials Course Outline Introduction This four-day, instructor-led course provides students
Security + Certification (ITSY 1076) Syllabus
Security + Certification (ITSY 1076) Syllabus Course: ITSY 1076 Security+ 40 hours Course Description: This course is targeted toward an Information Technology (IT) professional who has networking and
How To Pass A Credit Course At Florida State College At Jacksonville
Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CTS 2658 COURSE TITLE: PREREQUISITE(S): COREQUISITE(S): Managing Network Security CNT 2210 with grade
NAP 117 MEDICATION ASSISTANT COURSE
NAP 117 MEDICATION ASSISTANT COURSE APPROVED: JANUARY 12, 2012 EFFECTIVE: FALL 2012-13 Prefix & Number NAP 117 Course Title: Medication Assistant Course Purpose of this submission: New Course New Change/Updated
Network Security Course Specifications2011-2012
Assiut University Faculty of Computers & Information Department of Information Technology Quality Assurance Unit Network Security Course Specifications2011-2012 Relevant program B.Sc. in Computers and
Curran, K. Tutorials. Independent study (including assessment) N/A
MODULE TITLE: MODULE CODE: Systems Security COM535 YEAR OF REVISION: 2013/14 MODULE LEVEL: 6 CREDIT POINTS: 20 MODULE STATUS: SEMESTER: 1 LOCATION: E-LEARNING: PREREQUISITE(S): CO-REQUISITE(S): MODULE
Introduction to Cyber Security / Information Security
Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be
The Information Security Problem
Chapter 10 Objectives Describe the major concepts and terminology of EC security. Understand phishing and its relationship to financial crimes. Describe the information assurance security principles. Identify
EUCIP - IT Administrator. Module 5 IT Security. Version 2.0
EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected]
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected] Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security
NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus
NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus CSCI - 440 Network Security and Perimeter Protection 3-0-3 CATALOG DESCRIPTION This
NETWORK SECURITY (W/LAB) Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information
---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---
---Information Technology (IT) Specialist (GS-2210) IT Security Model--- TECHNICAL COMPETENCIES Computer Forensics Knowledge of tools and techniques pertaining to legal evidence used in the analysis of
BIO 201 ANATOMY AND PHYSIOLOGY I with LAB
BIO 201 ANATOMY AND PHYSIOLOGY I with LAB (Title change ONLY Oct. 2013) Presented and Approved: January 12, 2012 Effective: 2012-13 FA Prefix & Number BIO 201 Course Title: Anatomy and Physiology I Purpose
CISA TIMETABLE (4 DAYS)
CISA TIMETABLE (4 DAYS) ISACA-CISA Day 1 9.00 9.30 Welcome, Introductions, Coffee 9.30 11.00 About the CISA Exam Domain 1 - The Process of Auditing Information Systems Auditing Types of Audits Audit Methodology
University of Wisconsin-Whitewater Curriculum Proposal Form #3 New Course
Effective Term: 2147 (Fall 2014) University of Wisconsin-Whitewater Curriculum Proposal Form #3 New Course Subject Area - Course Number: COMPSCI 462 (See Note #1 below) Cross-listing: N/A Course Title:(Limited
IT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer
COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus
COMP-530 Cryptographic Systems Security *Requires Programming Background University of Nicosia, Cyprus Course Code Course Title ECTS Credits COMP-530 Cryptographic Systems 10 Security Department Semester
Chapter 1 The Principles of Auditing 1
Chapter 1 The Principles of Auditing 1 Security Fundamentals: The Five Pillars Assessment Prevention Detection Reaction Recovery Building a Security Program Policy Procedures Standards Security Controls
Weighted Total Mark. Weighted Exam Mark
CMP4103 Computer Systems and Network Security Period per Week Contact Hour per Semester Weighted Total Mark Weighted Exam Mark Weighted Continuous Assessment Mark Credit Units LH PH TH CH WTM WEM WCM CU
DRAFT Standard Statement Encryption
DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held
Eleventh Hour Security+
Eleventh Hour Security+ Exam SYO-201 Study Guide I do Dubrawsky Technical Editor Michael Cross AMSTERDAM BOSTON HEIDELBERG LONDON NEWYORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO SYNGRESS.
Fundamentals of Network Security - Theory and Practice-
Fundamentals of Network Security - Theory and Practice- Program: Day 1... 1 1. General Security Concepts... 1 2. Identifying Potential Risks... 1 Day 2... 2 3. Infrastructure and Connectivity... 2 4. Monitoring
Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester
Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering Sixth Semester Subject: Network Security & Management Contact Hrs / week: 4 Total hrs: 64 Table of Contents
Commercial/Industrial Electricity
1 ELC 210 Commercial/Industrial Electricity Course Package Presented and Approved July 31, 2008 2 Contact person(s) DAVE WHITE Date of proposal to JULY 31, 2008 Curriculum Committee NEW COURSE PACKAGE
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College
167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,
CNA 432/532 OSI Layers Security
CNA 432/532 OSI Layers Location: ECC 116 Days: Thursday Semester: Fall 2012 Times: 5:00-7:50 pm Professor: Dr. Amos Olagunju E-mail: [email protected] Office Hrs: 3-4 MW, Office: ECC256 Other
Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.
Elective course in Computer Science University of Macau Faculty of Science and Technology Department of Computer and Information Science SFTW498 Information Security Syllabus 2nd Semester 2011/2012 Part
7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11.
Content 1.Introduction to Data and Network Security. 2. Why secure your Network 3. How Much security do you need, 4. Communication of network systems, 5. Topology security, 6. Cryptosystems and Symmetric
Section 12 MUST BE COMPLETED BY: 4/22
Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege
FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE. CTS 2655 and CNT 2102 with grade of C or higher in both courses
Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CTS 2662 COURSE TITLE: PREREQUISITE(S): COREQUISITE(S): Voice Over IP CTS 2655 and CNT 2102 with grade
New York City College of Technology Computer Systems Technology Department
New York City College of Technology Computer Systems Technology Department CST 3507/CS507: Advanced Single-LAN Concepts (3 credits, 2 class hours, 2 lab hours) Instructor: Office Phone: Office Hours: Virtual
(Instructor-led; 3 Days)
Information Security Manager: Architecture, Planning, and Governance (Instructor-led; 3 Days) Module I. Information Security Governance A. Introduction to Information Security Governance B. Overview of
Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2.
CSET 4850 Computer Network Security (4 semester credit hours) CSET Elective IT Elective Current Catalog Description: Theory and practice of network security. Topics include firewalls, Windows, UNIX and
IT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software powered by Calibrate www.medallionlearning.com
Networking: EC Council Network Security Administrator NSA
coursemonster.com/uk Networking: EC Council Network Security Administrator NSA View training dates» Overview The EC-Council's NSA certification looks at network security from a defensive view. The NSA
Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus
Department of Computer & Information Sciences CSCI-445: Computer and Network Security Syllabus Course Description This course provides detailed, in depth overview of pressing network security problems
Exam 1 - CSIS 3755 Information Assurance
Name: Exam 1 - CSIS 3755 Information Assurance True/False Indicate whether the statement is true or false. 1. Antiquated or outdated infrastructure can lead to reliable and trustworthy systems. 2. Information
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Course Design Document. IS403: Advanced Information Security and Trust
Course Design Document IS403: Advanced Information Security and Trust Version 1.3 05/10/ 2008 Xuhua Ding Table of Content 1 Review Summary...3 2 Overview of Advanced Information Security and Trust Course...
HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations
HIPAA 203: Security An Introduction to the Draft HIPAA Security Regulations Presentation Agenda Security Introduction Security Component Requirements and Impacts Administrative Procedures Physical Safeguards
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
BUY ONLINE FROM: http://www.itgovernance.co.uk/products/497
CISSP EXAM CRAM 2 1. The CISSP Certification Exam. Assessing Exam Readiness. Taking the Exam. Multiple-Choice Question Format. Exam Strategy. Question-Handling Strategies. Mastering the Inner Game. 2.
Information Security Course Specifications2011-2012
Assiut University Faculty of Computers & Information Information Systems Department Quality Assurance Unit Information Security Course Specifications2011-2012 Relevant program Department offers the program
FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE
Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CET 2600 COURSE TITLE: Network Fundamentals PREREQUISITE(S): CTS 1131 and CTS 1133 COREQUISITE(S): STUDENT
CIS 6930/4930 Computer and Network Security. Dr. Yao Liu
CIS 6930/4930 Computer and Network Security Dr. Yao Liu About Instructor Dr. Yao Liu, Office: ENB 336 Phone: 813-974-1079 Email: [email protected] URL: http://www.cse.usf.edu/~yliu/ Office hour: TR 2:00pm
FBLA Cyber Security aligned with Common Core 6.14. FBLA: Cyber Security RST.9-10.4 RST.11-12.4 RST.9-10.4 RST.11-12.4 WHST.9-10.4 WHST.11-12.
Competency: Defend and Attack (virus, spam, spyware, Trojans, hijackers, worms) 1. Identify basic security risks and issues to computer hardware, software, and data. 2. Define the various virus types and
CS 464/564 Networked Systems Security SYLLABUS
CS 464/564 Networked Systems Security SYLLABUS College: College of Science Department: Department of Computer Science Syllabus Title: CS 464/564 Networked Systems Security Call Number: 1. Meet the Professor
Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings
Computer Security Principles and Practice Second Edition William Stailings Lawrie Brown University ofnew South Wales, Australian Defence Force Academy With Contributions by Mick Bauer Security Editor,
Lecture II : Communication Security Services
Lecture II : Communication Security Services Internet Security: Principles & Practices John K. Zao, PhD (Harvard) SMIEEE Computer Science Department, National Chiao Tung University 2 What is Communication
167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College
167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,
Computer Network Engineering
208 Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Certificate of Achievement: Skills Competency Award: Cisco Networking Associate Program Description The field of
HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline
HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 210 COURSE NUMBER: CIS 210 COURSE NAME: MEETING PLACE: Random On-Line DIVISION: Business, Computing & Applied Technology
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
Privacy + Security + Integrity
Privacy + Security + Integrity Docufree Corporation Data Security Checklist Security by Design Docufree is very proud of our security record and our staff works diligently to maintain the greatest levels
Physical Development for Preschool, Toddlers and Their Parents
CDA 102A Physical Development Course Package/Modification/Retirement NEW Approved: December 3, 2010 EFFECTIVE DATE: Spring 2011 COURSE PACKAGE FORM Contact Person (s) Date of proposal to Curriculum Sub-committee:
An expert s tips for cracking tough CISSP exam
35 / 83 Chapter 6 An expert s tips for cracking tough CISSP exam Rahul Kokcha, an experienced instructor for CISSP explains how to prepare for the CISSP exam, what are important topics, and what you do
