MW , TU 1-3; and other times by appointment

Size: px
Start display at page:

Download "MW 515-545, TU 1-3; and other times by appointment"

Transcription

1 CSUS, COLLEGE OF ENGINEERING AND COMPUTER SCIENCE Department of Computer Science CSC Computer System Attacks and Countermeasures/ C Sc 254 Network Security (MW 7-8:15p; RVR 1008), Fall 2013 Instructor: Isaac Ghansah Office: RVR 4004 Phone: (916) WWW Office Hours: ghansah@csus.edu, (Please insert "CSc154" or CSc254 somewhere in the subject line); No via WebCT (DATED!!) MW , TU 1-3; and other times by appointment TA Joubin Jabbari, Mike McParland, Texts: McClure, Scambray & Kurtz, Hacking Exposed (Network Security Secrets & Solutions), Osborne McGraw Hill, 6 th Edition, 2009 (Required) References: R. Panko, Corporate Computer and Network Security, Prentice Hall, 2004 Security in Computing, Charles P. Pfleeger, 3Ed, Prentice Hall, 2003 The Art of Deception, Kevin D. Mitnick, William L. Simon, Wiley, 2002 William Stallings, Computer Security, Prentice Hall, 2009 C. Kaufman, R Perlman, M Speciner Network Security: Private Communication in a Public World, 2nd Ed. by, Prentice Hall, 2002 William Stallings, Cryptography and Network Security: Principles and Practice, 4 Ed., Prentice Hall, 2006 Recent articles from technical literatures and Internet Engineering Task Force (IETF) Request for Comments (RFC) 154 & 254 Differences: Even though the classroom lectures will be the same for both courses, the difference will be in some assignments and in some cases, exams. The instructor will use different methods including different projects proposals, homework assignments, examination questions, oral examinations, etc. Course Objectives: 1

2 Main objective of this course is to introduce the computer science student to the career path in Computer and Network Security. Provide experience in performing security assessment of computers and networks. Expose the student to the some of the domains that comprise what the Certified Information Systems Security Professional (CISSP) skills and knowledge require. Catalog Description (CSC 154): An introduction to network and computer security with a focus on how intruders gain access to systems, how they escalate privileges, and what steps can be taken to secure a system against such attacks. Topics include: perimeter defenses, intrusion detection systems, social engineering, distributed denial of service attacks, buffer overflows, race conditions, trojans and viruses. Prerequisite: CSC/CPE 138. Catalog Description (CSC 254): In-depth study of network security problems and discussion of potential solutions. Topics include: network vulnerabilities and attacks, secure communication, Internet security protocols and tools to defend against network attacks, network intrusion detection, and wireless network security. Survey and demonstration of software tools used for network security. Prerequisite: Fully Classified Graduate Status in CSC, SE, or CPE, or permission of instructor Prerequisite Proof: The Computer Science Department has a policy that each instructor will verify the student transcript and ascertain that the student has the prerequisites. You can log on to My Sac State go to "Student Center" and select "Unofficial Transcripts" to print. You also can select and print "Transfer Credit Report" if you have transferred from another institution. You must submit your transcript for verification. Any student who has completed one or more prerequisites at another school must provide similar verification to the instructor. Any student who has not submitted their transcript by the end of the second week will be dropped from the class. Repeat Policy: The department has a policy specifying that students may not repeat a Computer Science course more than once. Any student who wishes to repeat a course more than once (that is, take a course for a third time) must submit a petition requesting permission to do so. Student records will be reviewed to determine whether a student is taking this course for three or more times. Any such student must return an approved petition to the instructor within the first two weeks of class. Any student who does not submit an approved petition will be dropped from the class. Petitions are available in the Department office (RVR 3018) and require the signature of both the Instructor and the Dept. Chair. Course Goals: To provide experience in analyzing, identifying, and addressing vulnerabilities in systems or networks. To provide experience in performing a security audit of computers and networks. To expose the student to the domains of knowledge and skills required for information systems security. 2

3 To develop knowledge of contemporary risks in networks and attacks procedures To analyze Internet protocols in order to protect networks from attack To analyze security protocols which protect networks from attack To provide understanding of how cryptography is used in Internet protocols for secure communication To develop proficiency in use of various software tools for Internet security To develop breadth of knowledge of wireless network security To introduce the computer science student to career paths in Computer and Network Security. Prerequisites by Topic Thorough understanding of: 1. TCP/IP suite of protocols and WAN/LAN Technologies. 2. Distributed computing with client/server programming Basic understanding of: 1. Domain Name System (DNS) and addressing schemes used in internetworking 2. Host and Network Configuration Protocols (ARP, RARP, BOOTP, DHCP) 3. Unix and Windows operating system common services, ports, and sockets. 4. How to compile and run programs in Linux and Windows. Exposure to: 1. IPv6 and IPSec Course Content: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be led into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders attack systems and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, Trojans, Worms, and Viruses. Summary of Outcomes In this course, we will study computer and network security and look at the different requirements for information assurance. You will gain experience with the role of defending hosts and networks from attack as well as learning how the hacker uses tools to attack and penetrate networks. Students will be able to use several open software tools that will analyze host and networks for vulnerabilities and be exposed to the hacker technique of "thinking outside the box". TENTATIVE GRADING POLICY: The following allocation of points is tentative. These may change during the semester. 3

4 CSC 254 Students: Exams/Quizzes 25% Final 25% Assignments/Homework 30% Project/Oral-and-Written-Communication 15% Attendance to Oral Presentations 5% CSC 154 Students: Exams/Quizzes 25% Final 30% Assignments/Homework 40% Attendance to Oral Presentations 5% Grading Breakdown (%): A = C = A- = C- = B+ = D+ = B = D = B- = D- = C+ = F = 59 or below You must pass both the assignments/project and the exams in order to obtain a passing grade for the course. Students are required to keep backup (machine-readable) copies of all submitted work, and also to keep all returned (graded) work, until after final grades are posted. INDEPENDENT PROJECTS Independent student projects involving programming (ie. simulation or implementation), or research paper. List of possible projects are provided by the instructor. Students may choose their own topics upon approval of instructor. Joint programming projects are encouraged. Oral and written communication skills are essential for any work environment you find yourself. Therefore, the deliverables for the Projects will include a detailed report and oral PPT presentation (for research papers) or demonstration (programming projects). The final written report should be professional and potentially publishable in a technical magazine/journal such as IEEE Communications, IEEE Network Magazine, IEEE Security and Privacy Magazine, etc. The grading will assess your written and oral communication skills. For details of the specific grading criteria see details of Independent Project call for proposals (to be given later in the semester). COMPUTER ACCOUNTS AND ELECTRONIC COMMUNICATION: a) gaia account You should obtain a UNIX account on the ECS system "gaia" for this class if you do not have one. Though not required you might find it useful for some assignments. These are the steps: a. Use your favorite Browser and Go to b.click on Computing Services -> Network Accounts -> Get a new Account. c. Fill out all required fields You can also obtain an account by getting one from the College IT staff in room

5 b) Mailing List I have established a Mailing List for this course with a web-based maillist interface called Mailman. It is MANDATORY for every student accepted into the course to subscribe to the Mailing List within the first two weeks of classes. The list will be used to facilitate electronic communication for the course. Failure to subscribe to the list in a timely manner could result in your missing important assignments, clarifications, announcements, etc that are sent by . You must check on a regular basis and I will assume that you have received and read all messages I send to the list. The instructor will not be held responsible for your failures. To subscribe to the list go to the following website and fill out appropriate forms there. PLEASE MAKE SURE YOU FILL IN YOUR FULL NAME IN THE SECTION PROVIDED ON THE FORM. This will add your address (the one from which you send the message, hopefully gaia) to the csc254/csc154new mailing list. Subsequently you can send questions or discussion items regarding topics in csc254 or csc154new to everyone on the list. To do this, just send an message to the address csc154new@ecs.csus.edu or csc154new@ecs.csus.edu. This is a good way to send messages to other students in the class regarding clarifications about assignments, lecture, etc. Note that these messages are sent to everyone on the csc254 or csc154new list (including the instructors). If you need to communicate privately with the Instructor, use the instructor s individual address as given above. Note: Do not send HTML to the list. Some mail reader programs do not understand HTML Tags. c) Assignment/Homework Submission You must submit all homework/assignments/project reports electronically via WebCT, which can be reached from mysacstate ( my.csus.edu ). I will not accept a hardcopy. Any file which is placed in WebCT will be named according to one of the formats below (depending on the type of assignment). Please do NOT submit pdf files as I will not be able to make comments on them. Word format is preferable. Your-name_course#_hmwk _hmwk#, your-name_course#_lab_lab#, yourname_course_project_project# For example if a student named John Doe is submitting homework#1 the file name of the attachment should be doe-john_154_hmwk_1, or doe-john_254_hmwk_1 Please note: If the attachment is not according to proper format as stated above, it will not be accepted. COURSE POLICIES: 1. Information in this syllabus is subject to change with notice. 2. Attendance to class and frequent check of is expected. Class roll will not be checked after first week of classes unless the instructor deems it necessary. However, you are 5

6 responsible for material presented and announcements made in class or by . This could include changes to the syllabus, exam dates, etc. 3. Late assignment/project will be penalized by 20% if one lecture late. Nothing will be accepted if more than one lecture late, or if solution has been posted. 4. Make-up exams will only be given under extreme circumstances. The instructor reserves the right to reject make-up requests. There will be no make-up for unannounced quizzes under any circumstances 5. Be aware of the institution policy on drops and incomplete. Drop Policy If you plan to drop this course, please make sure you understand the following information. There is no such thing as an "automatic drop". The instructor can drop you from the course, but this does not happen automatically. If you plan to drop the course, make sure to use MySacState. After the 2nd week, you cannot drop the course through MySacState. At this point, you must provide written verification of a compelling reason. Both the instructor and the Department Chair must approve. After the 4th week, you must fill out a "Petition to Drop after Deadline" form and collect all the necessary signatures. This must be turned into Admission and Records in Lassen Hall. Students with Disabilities If you have a disability and require accommodations, you need to provide disability documentation to SSWD (Services to Students with Disabilities), Lassen Hall 1008, (916) Please discuss your accommodation needs with me after class or in lab early in the semester. Ethics/Academic Honesty Any work submitted is a contractual obligation that the work is the student s and for which he/she could be quizzed in detail. Discussion among students in assignments and projects is part of the educational process and is encouraged. No discussion among students is allowed in any exams/quizzes. However, each student must make an effort to do his/her own work in all assignments and exams. No type of plagiarism will be tolerated except in the case of group work. In that case each student should indicate the part of the work, which was their major responsibility in their final joint submission. Nevertheless, I emphasize any work submitted is a contractual obligation that the work is the student s and for which he/she could be quizzed in detail. The minimum penalty for even a single incident of cheating brought to the attention of the instructor in this course is automatic failure of the course; additional more severe penalties may also be applied. Note that cheating is grounds for dismissal from the University. Please refer to the Computer Science Dept. document entitled Policy on Academic Integrity (available online via the Computer Science department, home page) and to the University Policy Manual section on Academic Honesty (all available online via the instructor s home page. Please visit for additional information. IT IS THE RESPONSIBILITY OF EACH STUDENT TO BE FAMILIAR WITH, AND TO COMPLY WITH, THE POLICIES STATED IN THESE DOCUMENTS In 6

7 addition, unless otherwise stated, the use of the following devices during exams/quizzes is prohibited: cell phones, pagers, laptops, and PDAs. Legal Policy: Every student that enrolls in this course will be required to sign a "Legal Policy" that reads: Computer and Network Security course mission is to educate, introduce and demonstrate hacking tools for penetration testing and education purposes only. I will not use the newly acquired skills for illegal or malicious attacks and you will not use such tools in an attempt to compromise any computer system, and to indemnify California State University, Sacramento and College of Engineering and Computer Science with respect to the use or misuse of these tools, regardless of intent. Expected Learning Outcomes: At the end of the course you will be expected to acquire 1. Thorough understanding of: 1. The fundamental steps that a hacker performs. 2. Major software security design flaws such as buffer overflow and race conditions. 3. Common tools hackers use in conducting attacks and how they work. 4. Best practices for defending against attacks. 2. Basic understanding of: 1. Host and network intrusion detection systems. 2. Tools and methods of protecting computers and networks against hacker attacks. 3. Major types of malicious code such as Trojans, viruses, and worms. 4. Legal and ethical practices in security. 3. Exposure to: 1. Acceptable methods of security incident investigation. C SC 154/254 - TENTATIVE SCHEDULE SUBJECT TO CHANGE WEEK TOPICS READING 1 Introduction, Attacker s Process, Ethics, and law, Internet Security. Principles of computer Security. Security Goals: Confidentiality, Integrity, Availability. Secrecy, Authentication, Authorization, Accountability, Availability, Integrity, Trust (SAAAAINT) MSK Case Study:, Notes 2 Introduction to cryptography. Secure System Design Principles. Least Privilege, Separation of Privilege, Isolation, Usability, etc. Risk Assessment MSK Ch, Class Notes 3 Footprinting, scanning, enumeration. Tools. MSK 4-5 System Hacking: Password Attacks and Defenses. Password Hacking tools. Privilege escalation, Rootkits, and Defenses. Keystroke loggers. Covering tracks, hiding files. Steganography. Buffer overflow attacks and defenses. Social engineering MSK Ch, 6 Firewalls, intrusion detection systems, and honeypots Notes 7 Malware: Trojans, backdoors, viruses, worms. Conficker Worm MSK 8 Intro to Reverse Engineering: Malware Analysis, static and dynamic Notes analysis. Tools. 7

8 9 Secure Communication: IPSec, SSL/TLS, VPNs, etc Notes 10 Denial of service. Attack Methods. Tools. DDoS. MSK Ch,, Countermeasures. Session hijacking, Covert Channels Notes 10 Wireless and Mobile Network Security (Wifi) Security; GSM, Notes 2G/3G/4G Security; Bluetooth, RFID security. Attacks and Defenses 11 Sensor Networks and SCADA System Security and sensor Notes networks (eg. Zigbee) security; Attacks (eg. Stuxnet) and Defenses. 12 Access Control, biometrics, separation of duties, Physical Security, Notes TEMPEST Security. Security Policies. 13 Penetration Testing: Introduction, Risks, benefits, methodology Notes 14 Other Topics, 15 Independent Project Presentations IMPORTANT DATES: Veterans Holiday: Nov 11, 2013 Thanksgiving Break: Nov 28-29, 2013; Last Day of Instruction: Dec 13, 2013 FINAL EXAM: 8

CSUS COLLEGE OF ENGINEERING AND COMPUTER SCIENCE Department of Computer Science (RVR 3018; 278-4238/6834)

CSUS COLLEGE OF ENGINEERING AND COMPUTER SCIENCE Department of Computer Science (RVR 3018; 278-4238/6834) CSUS COLLEGE OF ENGINEERING AND COMPUTER SCIENCE Department of Computer Science (RVR 3018; 278-4238/6834) C Sc 250 Computer Security and Privacy, Spring 2012 (TR 4-5:15p; RVR 2010) INSTRUCTOR: Martin Nicholes

More information

EC Council Certified Ethical Hacker V8

EC Council Certified Ethical Hacker V8 Course Code: ECCEH8 Vendor: Cyber Course Overview Duration: 5 RRP: 2,445 EC Council Certified Ethical Hacker V8 Overview This class will immerse the delegates into an interactive environment where they

More information

CIS 4204 Ethical Hacking Fall, 2014

CIS 4204 Ethical Hacking Fall, 2014 CIS 4204 Ethical Hacking Fall, 2014 Course Abstract: The purpose of this course is to provide a basic understanding of computing, networking, programming concepts, and exploitation techniques, as they

More information

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun CSCI 454/554 Computer and Network Security Instructor: Dr. Kun Sun About Instructor Dr. Kun Sun, Assistant Professor of Computer Science http://www.cs.wm.edu/~ksun/ Phone: (757) 221-3457 Email: ksun@wm.edu

More information

CS 450/650 Fundamentals of Integrated Computer Security

CS 450/650 Fundamentals of Integrated Computer Security CS 450/650 Fundamentals of Integrated Computer Security Course Information Department of Computer Science & Engineering UNR, Fall 2014 Class hours Tuesday & Thursday, 1:00 2:15am @ PE 101 Instructor E

More information

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. Ethical Hacking and Countermeasures Course Description: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.

More information

[CEH]: Ethical Hacking and Countermeasures

[CEH]: Ethical Hacking and Countermeasures [CEH]: Ethical Hacking and Countermeasures Length Audience(s) Delivery Method : 5 days : This course will significantly benefit security officers, auditors, security professionals, site administrators,

More information

Weighted Total Mark. Weighted Exam Mark

Weighted Total Mark. Weighted Exam Mark CMP4103 Computer Systems and Network Security Period per Week Contact Hour per Semester Weighted Total Mark Weighted Exam Mark Weighted Continuous Assessment Mark Credit Units LH PH TH CH WTM WEM WCM CU

More information

CSC 474 Information Systems Security

CSC 474 Information Systems Security CSC 474 Information Systems Security Introduction About Instructor Dr. Peng Ning, assistant professor of computer science http://www.csc.ncsu.edu/faculty/ning pning@ncsu.edu (919)513-4457 Office: Room

More information

EC-Council. Program Brochure. EC-Council. Page 1

EC-Council. Program Brochure. EC-Council. Page 1 Program Brochure Page 1 Certified Ethical Hacker Version 7 Revolutionary Product releases the most advanced ethical hacking program in the world. This much anticipated version was designed by hackers and

More information

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification 1. Module Title Information Security 2. Module Code: CS403INS 3. Module Level - Forth Stage 4. Module Leader Safwan M. 5. Teaching Semester 7 and 8 Soran University Faculty of Science and Engineering Computer

More information

CS 391-950 Ethical Hacking Spring 2016

CS 391-950 Ethical Hacking Spring 2016 CS 391-950 Ethical Hacking Spring 2016 Instructor: Shahriar Nick Rahimi Office: Faner 2136 Office Hours: MW 8:30 am-11 am Friday 10 am- 11 am E-Mail: nick@cs.siu.edu Course Web Site: https://online.siu.edu/

More information

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)

More information

CIS 6930/4930 Computer and Network Security. Dr. Yao Liu

CIS 6930/4930 Computer and Network Security. Dr. Yao Liu CIS 6930/4930 Computer and Network Security Dr. Yao Liu About Instructor Dr. Yao Liu, Office: ENB 336 Phone: 813-974-1079 Email: yliu@cse.usf.edu URL: http://www.cse.usf.edu/~yliu/ Office hour: TR 2:00pm

More information

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)

More information

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker EC-Council Hacking Technology C Certified E Ethical Hacker Certified Ethical Hacker v8 Certified Ethical Hacker Course Description CEHv8 is a comprehensive Ethical Hacking and Information Systems Security

More information

Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison

Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation

More information

EC-Council. Certified Ethical Hacker. Program Brochure

EC-Council. Certified Ethical Hacker. Program Brochure EC-Council C Certified E Ethical Hacker Program Brochure Course Description The (CEH) program is the core of the most desired information security training system any information security professional

More information

CEH Version8 Course Outline

CEH Version8 Course Outline CEH Version8 Course Outline Module 01: Introduction to Ethical Hacking Information Security Overview Information Security Threats and Attack Vectors Hacking Concepts Hacking Phases Types of Attacks Information

More information

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses

More information

CS 464/564 Networked Systems Security SYLLABUS

CS 464/564 Networked Systems Security SYLLABUS CS 464/564 Networked Systems Security SYLLABUS College: College of Science Department: Department of Computer Science Syllabus Title: CS 464/564 Networked Systems Security Call Number: 1. Meet the Professor

More information

Applied Network Security Course Syllabus Spring 2015

Applied Network Security Course Syllabus Spring 2015 Course Syllabus Spring 2015 Course Information Instructor: Dr. Mike Jochen Phone: 570.422.3036 Email: mjochen@esu.edu Office: 337 SCITECH Building Office Hours: Mon 5:15 7:00 p.m. Weds 5:45 7:00 p.m. Tues/Thurs

More information

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming. Elective course in Computer Science University of Macau Faculty of Science and Technology Department of Computer and Information Science SFTW498 Information Security Syllabus 2nd Semester 2011/2012 Part

More information

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus Department of Computer & Information Sciences INFO-450: Information Systems Security Syllabus Course Description This course provides a deep and comprehensive study of the security principles and practices

More information

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus Department of Computer & Information Sciences CSCI-445: Computer and Network Security Syllabus Course Description This course provides detailed, in depth overview of pressing network security problems

More information

Network Security ITP 457 (4 Units)

Network Security ITP 457 (4 Units) Network Security ITP 457 (4 Units) Description Objectives Prerequisites/ Recommended Preparation Instructor Contacting the Instructor Lecture Required Textbooks Web Site Due to the emergence of the internet

More information

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led Course Description This class will immerse the student into an interactive environment where they will

More information

Certified Ethical Hacker (CEH)

Certified Ethical Hacker (CEH) Certified Ethical Hacker (CEH) Course Number: CEH Length: 5 Day(s) Certification Exam This course will help you prepare for the following exams: Exam 312 50: Certified Ethical Hacker Course Overview The

More information

UVic Department of Electrical and Computer Engineering

UVic Department of Electrical and Computer Engineering UVic Department of Electrical and Computer Engineering COURSE OUTLINE Elec 567 Advanced Network Security and Forensics Spring 2014 Instructor: Office Hours: Dr. Issa Traore Days: Monday, Thursday Phone:

More information

CENTRAL TEXAS COLLEGE ITSY 2401 FIREWALLS AND NETWORK SECURITY. Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS:

CENTRAL TEXAS COLLEGE ITSY 2401 FIREWALLS AND NETWORK SECURITY. Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS: CENTRAL TEXAS COLLEGE ITSY 2401 FIREWALLS AND NETWORK SECURITY Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS: I. INTRODUCTION A. Identify elements of firewall design, types of security threats and

More information

Professor s Contact Information Office Phone 972 883 2337 Other Phone n/a Office Location ECS South 4.207 Email Address

Professor s Contact Information Office Phone 972 883 2337 Other Phone n/a Office Location ECS South 4.207 Email Address Course CS 6349 001 Network Security Professor Dr. Kamil Sarac Term Fall 2014 Meetings Monday/Wednesday at 11:30am in ECS South 2.203 Professor s Contact Information Office Phone 972 883 2337 Other Phone

More information

Computer Science 3CN3 Computer Networks and Security. Software Engineering 4C03 Computer Networks and Computer Security. Winter 2008 Course Outline

Computer Science 3CN3 Computer Networks and Security. Software Engineering 4C03 Computer Networks and Computer Security. Winter 2008 Course Outline Computer Science 3CN3 Computer Networks and Security and Software Engineering 4C03 Computer Networks and Computer Security Winter 2008 Course Outline Revised: 5 March 2008 Note: This course outline contains

More information

CYBERTRON NETWORK SOLUTIONS

CYBERTRON NETWORK SOLUTIONS CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified

More information

Security + Certification (ITSY 1076) Syllabus

Security + Certification (ITSY 1076) Syllabus Security + Certification (ITSY 1076) Syllabus Course: ITSY 1076 Security+ 40 hours Course Description: This course is targeted toward an Information Technology (IT) professional who has networking and

More information

CSCI 4250/6250 Fall 2015 Computer and Network Security. Instructor: Prof. Roberto Perdisci perdisci@cs.uga.edu

CSCI 4250/6250 Fall 2015 Computer and Network Security. Instructor: Prof. Roberto Perdisci perdisci@cs.uga.edu CSCI 4250/6250 Fall 2015 Computer and Network Security Instructor: Prof. Roberto Perdisci perdisci@cs.uga.edu CSCI 4250/6250! What is the purpose of this course?! Combined Undergrad/Graduate Intro to Computer

More information

LINUX / INFORMATION SECURITY

LINUX / INFORMATION SECURITY LINUX / INFORMATION SECURITY CERTIFICATE IN LINUX SYSTEM ADMINISTRATION The Linux open source operating system offers a wide range of graphical and command line tools that can be used to implement a high-performance,

More information

Applied Information Technology Department

Applied Information Technology Department Applied Information Technology Department IT 328: Health Information Emerging Technologies Course Syllabus Spring 2015 This syllabus contains information common to all sections of IT 328 for the Spring

More information

Monfort College of Business Semester Course Syllabus (2015-2016) COURSE PREFIX/TITLE: BACS 382 TCP/IP Network Security Sem. Hrs. 3 Ed.

Monfort College of Business Semester Course Syllabus (2015-2016) COURSE PREFIX/TITLE: BACS 382 TCP/IP Network Security Sem. Hrs. 3 Ed. Monfort College of Business Semester Course Syllabus (2015-2016) COURSE PREFIX/TITLE: BACS 382 TCP/IP Network Security Sem. Hrs. 3 Ed. Cap: 40 CATALOG DESCRIPTION: Prerequisite: BACS 380 or consent of

More information

CHIPOLA COLLEGE COURSE SYLLABUS Chipola s website: www.chipola.edu

CHIPOLA COLLEGE COURSE SYLLABUS Chipola s website: www.chipola.edu CHIPOLA COLLEGE COURSE SYLLABUS Chipola s website: www.chipola.edu COURSE TITLE: COURSE NUMBER: Introduction to Server and Network Security CIS 1352 COURSE DESCRIPTION (with prerequisites): This course

More information

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus CSCI - 440 Network Security and Perimeter Protection 3-0-3 CATALOG DESCRIPTION This

More information

CS 340 Cyber Security Weisberg Division of Computer Science College of Information Technology & Engineering Marshall University

CS 340 Cyber Security Weisberg Division of Computer Science College of Information Technology & Engineering Marshall University Weisberg Division of Computer Science College of Information Technology & Engineering Marshall University Course Description: Concepts and issues in physical and cyber security; technological vulnerabilities

More information

BBM 461: SECURE PROGRAMMING INTRODUCTION. Ahmet Burak Can

BBM 461: SECURE PROGRAMMING INTRODUCTION. Ahmet Burak Can BBM 461: SECURE PROGRAMMING INTRODUCTION 1 Ahmet Burak Can COURSE MATERIAL Counter Hack Reloaded:A Step-by- Step Guide to Computer Attacks and Effective Defenses, Edward Skoudis, Tom Liston, Prentice Hall

More information

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings Computer Security Principles and Practice Second Edition William Stailings Lawrie Brown University ofnew South Wales, Australian Defence Force Academy With Contributions by Mick Bauer Security Editor,

More information

MS Information Security (MSIS)

MS Information Security (MSIS) MS Information Security (MSIS) Riphah Institute of Systems Engineering (RISE) Riphah International University, Islamabad, Pakistan 1. Program Overview: The program aims to develop core competencies in

More information

CS 5490/6490: Network Security Fall 2015

CS 5490/6490: Network Security Fall 2015 CS 5490/6490: Network Security Fall 2015 Professor Sneha Kumar Kasera School of Computing 1 What is this course about? Comprehensive introduction to network security Ø learn principles of network security

More information

CCA CYBER SECURITY TRACK

CCA CYBER SECURITY TRACK CCA CYBER SECURITY TRACK 2013-2014 CCA Advanced Cyber Security Track A detailed description of the advanced cyber security track. Courses to be offered in the CCA Advanced Cyber Security Track 2013-2014

More information

Boston University MET CS 690. Network Security

Boston University MET CS 690. Network Security Boston University MET CS 690 Network Security Course Overview This course will cover advanced network security issues and solutions. The main focus on the first part of the course will be on Security basics,

More information

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY-274 Privacy, Ethics & Computer Forensics I. Basic Course Information A. Course Number & Title: CISY-274 - Privacy, Ethics, & Computer Forensics B. New

More information

HOWARD. UNIVERSITY School of Business

HOWARD. UNIVERSITY School of Business HOWARD UNIVERSITY School of Business FALL 2009 COURSE SYLLABUS NETWORK/INTERNET SECURITY MANAGEMENT Faculty: Dr. Kamal Nayan Agarwal, Associate Professor Semester: Fall 20 Department : Information Systems

More information

CS4320 Computer and Network Security. Fall 2015 Syllabus

CS4320 Computer and Network Security. Fall 2015 Syllabus CS4320 Computer and Network Security Instructor: Lopamudra Roychoudhuri E-mail: lroychoudhuri@angelo.edu Office: MCS 205E Campus Phone: (325) 486-5448 Class Times: MWF 1:00-1:50pm Classroom: MCS 111A Course

More information

CIS 250 NETWORK SECURITY JACKSON STATE COMMUNITY COLLEGE COURSE SYLLABUS

CIS 250 NETWORK SECURITY JACKSON STATE COMMUNITY COLLEGE COURSE SYLLABUS CIS 250 NETWORK SECURITY JACKSON STATE COMMUNITY COLLEGE COURSE SYLLABUS Prerequisites: CIS 175 Course Description This course is designed to give students a fundamental understanding of computer and network

More information

ITSY-2459-8001 Security Assessment/Auditing Spring 2010 Professor: Zoltan Szabo D111 LEC TR 11:20AM 12:45PM D111 LAB TR 12:50PM 02:15PM

ITSY-2459-8001 Security Assessment/Auditing Spring 2010 Professor: Zoltan Szabo D111 LEC TR 11:20AM 12:45PM D111 LAB TR 12:50PM 02:15PM ITSY-2459-8001 Security Assessment/Auditing Spring 2010 Professor: Zoltan Szabo D111 LEC TR 11:20AM 12:45PM D111 LAB TR 12:50PM 02:15PM CATALOG DESCRIPTION: Capstone experience for the security curriculum.

More information

Information Systems Security Certificate Program

Information Systems Security Certificate Program Information Technologies Programs Information Systems Security Certificate Program Accelerate Your Career extension.uci.edu/infosec University of California, Irvine Extension s professional certificate

More information

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013 City University of Hong Kong Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 01/013 Part I Course Title: Course Code: Course Duration: Cryptography

More information

Page: Designed & Executed By: Presents Cyber Security Training

Page: Designed & Executed By: Presents Cyber Security Training Page: 1 Designed & Executed By: TM S I v8 RAINNVESTIGATOR Cyber Security Training Presents T CCE TechBharat Certified Cyber Expert TechBharat Certified Cyber Expert EC-Council Computer Hacking Forensic

More information

San José State University College of Engineering/Computer Engineering Department CMPE 206, Computer Network Design, Section 1, Fall 2015

San José State University College of Engineering/Computer Engineering Department CMPE 206, Computer Network Design, Section 1, Fall 2015 San José State University College of Engineering/Computer Engineering Department CMPE 206, Computer Network Design, Section 1, Fall 2015 Course and Contact Information Instructor: Dr. Rod Fatoohi Office

More information

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

San José State University CS160, Software Engineering, Sections 1, 2, and 4, Fall, 2015

San José State University CS160, Software Engineering, Sections 1, 2, and 4, Fall, 2015 San José State University CS160, Software Engineering, Sections 1, 2, and 4, Fall, 2015 Course and Contact Information Instructor: Office Location: H. Chris Tseng MH213 Telephone: (408) 924-7255 Email:

More information

OFFICE LOCATION: OFFICE HOURS:

OFFICE LOCATION: OFFICE HOURS: SYLLABUS INSTRUCTOR: Carolyn Gibbs OFFICE LOCATION: Office location: Mariposa 5005 Phone: 278-3948 Email: carolyng@csus.edu OFFICE HOURS: Mondays 10:30 am to 11:30 am Tuesdays 1:15 pm to 2:15 pm Wednesdays

More information

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed Venue Nairobi Kenya (exact hotel name to be confirmed before course) Dates March 31, 2014 April 4, 2014 Inovatec College Certified Ethical Hacker (CEH) boot camp The Certified Ethical Hacker (CEH) Certification

More information

CPSC 467: Cryptography and Computer Security

CPSC 467: Cryptography and Computer Security CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 1 September 2, 2015 CPSC 467, Lecture 1 1/13 Protecting Information Information security Security principles Crypto as a security

More information

A Systems Engineering Approach to Developing Cyber Security Professionals

A Systems Engineering Approach to Developing Cyber Security Professionals A Systems Engineering Approach to Developing Cyber Security Professionals D r. J e r r y H i l l Approved for Public Release; Distribution Unlimited. 13-3793 2013 The MITRE Corporation. All rights reserved.

More information

IT 101 Introduction to Information Technology

IT 101 Introduction to Information Technology Applied Information Technology Department Course Syllabus IT 101 Introduction to Information Technology Catalog Description Introduces students to the fundamental concepts in information technology (IT)

More information

CNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan

CNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan CNT5412/CNT4406 Network Security Course Introduction Zhenhai Duan 1 Instructor Professor Zhenhai Duan (duan@cs.fsu.edu) Office: 162 LOV Office hours: 1:00PM to 2:00PM, T/Th Or by appointment Email: duan@cs.fsu.edu

More information

CS 458 / 658 Computer Security and Privacy. Course mechanics. Course website. Module 1 Introduction to Computer Security and Privacy.

CS 458 / 658 Computer Security and Privacy. Course mechanics. Course website. Module 1 Introduction to Computer Security and Privacy. CS 458 / 658 Computer Security and Privacy Module 1 Introduction to Computer Security and Privacy Spring 2013 Course mechanics Instructor: Ian Goldberg https://cs.uwaterloo.ca/ iang/ Office hours: Thursdays

More information

Course Design Document. IS403: Advanced Information Security and Trust

Course Design Document. IS403: Advanced Information Security and Trust Course Design Document IS403: Advanced Information Security and Trust Version 1.3 05/10/ 2008 Xuhua Ding Table of Content 1 Review Summary...3 2 Overview of Advanced Information Security and Trust Course...

More information

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker ALL ElNis ONE CEH Certified Ethical Hacker EXAM GUIDE Matt Walker Mc Grain/ New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto McGraw-Hill

More information

NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS. Division: Applied Science (AS) Liberal Arts (LA) Workforce Development (WD)

NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS. Division: Applied Science (AS) Liberal Arts (LA) Workforce Development (WD) NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS COURSE IDENTIFICATION Course Code/Number: ETEC 275 Course Title: Computer and Network Security Division: Applied Science (AS) Liberal Arts (LA) Workforce

More information

Networked Systems Security

Networked Systems Security Unit 32: Networked Systems Security Unit code: QCF Level 3: Credit value: 10 Guided learning hours: 60 Aim and purpose J/601/7332 BTEC National The aim of this unit is to ensure learners know about the

More information

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education COURSE OF STUDY 2015-2016 (C)ITM 820 - Information Systems Security and Privacy

More information

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.

More information

SONDRA SCHNEIDER JOHN NUNES

SONDRA SCHNEIDER JOHN NUNES TECHNOLOGY TRANSFER PRESENTS SONDRA SCHNEIDER JOHN NUNES CERTIFIED ETHICAL HACKER TM THE ONLY WAY TO STOP A HACKER IS TO THINK LIKE ONE MAY 21-25, 2007 VISCONTI PALACE HOTEL - VIA FEDERICO CESI, 37 ROME

More information

CS 425 Software Engineering. Course Syllabus

CS 425 Software Engineering. Course Syllabus Department of Computer Science and Engineering College of Engineering, University of Nevada, Reno Fall 2013 CS 425 Software Engineering Course Syllabus Lectures: Instructor: Office hours: Catalog description:

More information

CSC574 - Computer and Network Security Module: Introduction

CSC574 - Computer and Network Security Module: Introduction CSC574 - Computer and Network Security Module: Introduction Prof. William Enck Spring 2013 1 Some bedtime stories 2 Some bedtime stories 2 Some bedtime stories 2 Some bedtime stories 2 This course We are

More information

MIS 4336 Networks and Data Communication. Spring 2016

MIS 4336 Networks and Data Communication. Spring 2016 MIS 4336 Networks and Data Communication Spring 2016 Provides an in-depth knowledge of data communications and networking requirements including networking and telecommunications technologies, hardware,

More information

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 210 COURSE NUMBER: CIS 210 COURSE NAME: MEETING PLACE: Random On-Line DIVISION: Business, Computing & Applied Technology

More information

Lecture 1 - Overview

Lecture 1 - Overview Lecture 1 - Overview CMPSC 443 - Spring 2012 Introduction to Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ From small vulnerabilities come... 2 People are part of

More information

Common Syllabus Revised 01.17.2015

Common Syllabus Revised 01.17.2015 Department of Applied Information Technology Volgenau School of Engineering IT 366 Information Security Fundamentals Common Syllabus Revised 01.17.2015 This syllabus contains information common to all

More information

Information Security. Training

Information Security. Training Information Security Training Importance of Information Security Training There is only one way to keep your product plans safe and that is by having a trained, aware and a conscientious workforce. - Kevin

More information

Systems and Internet Marketing Syllabus Spring 2011 Department of Management, Marketing and International Business

Systems and Internet Marketing Syllabus Spring 2011 Department of Management, Marketing and International Business Systems and Internet Marketing Syllabus Spring 2011 Department of Management, Marketing and International Business MKT 425.022 (3 credit hour class) Wednesday, 4:00 6:30 pm, BU 465 Instructor: Dr. Charlotte

More information

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

If you know the enemy and know yourself, you need not fear the result of a hundred battles. Rui Pereira,B.Sc.(Hons),CIPS ISP/ITCP,CISSP,CISA,CWNA/CWSP,CPTE/CPTC Principal Consultant, WaveFront Consulting Group ruiper@wavefrontcg.com 1 (604) 961-0701 If you know the enemy and know yourself, you

More information

CIT 217 Security + Network Security Fall 2015

CIT 217 Security + Network Security Fall 2015 CIT 217 Security + Network Security Fall 2015 Instructor: Laura Pike Email: laura.pike@gbcnv.edu Phone: 775-753-2288 Office: HTC 131 Office Hours: Mon & Wed. 1:30 2:30pm via Cranium Café Tus. 7-8pm via

More information

INFORMATION TECHNOLOGY EDUCATION PROGRAMMING & ANALYSIS COURSE SYLLABUS. Instructor: Debbie Reid. Course Credits: Office Location:

INFORMATION TECHNOLOGY EDUCATION PROGRAMMING & ANALYSIS COURSE SYLLABUS. Instructor: Debbie Reid. Course Credits: Office Location: Course Title and Number: Database Management with SQL, CGS2540 all sections Year and Term: Fall 2015 Office Phone: (352)395-4402 Meeting Time/Days: Sections 0M1/0M2: online Web Page Address: http://home.ite.sfcollege.edu/~debbie.reid

More information

Course Syllabus for Commercial Photography 1

Course Syllabus for Commercial Photography 1 Course Syllabus for Commercial Photography 1 Course: Commercial Photography 1 Semester: Fall 2011 Number: Art 138 Section(s): 6201 Day(s): Th. Time: 5:00 10:00 pm Location: AB 133 INSTRUCTOR Name: Geoff

More information

Evaluation of Pace University's Master's Degree Program for BNY Mellon Employees

Evaluation of Pace University's Master's Degree Program for BNY Mellon Employees Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 4 th, 2012 Evaluation of Pace University's Master's Degree Program for BNY Mellon Employees Scott Cruzan, Raymond K Ho, Inna Kolbovskaya,

More information

Principles of Information Assurance Syllabus

Principles of Information Assurance Syllabus Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information

More information

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 275 UNIX and Linux Security Management

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 275 UNIX and Linux Security Management RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 275 UNIX and Linux Security Management I. Basic Course Information A. Course Number & Title: CISY-275 - UNIX and Linux Security Management B. Date of

More information

Network Security. Text. Administrative. My Information. Course Focus. Evaluation CEN 5542-01

Network Security. Text. Administrative. My Information. Course Focus. Evaluation CEN 5542-01 Network Security CEN 5542-01 formerly CIS 5357 Administrative TR, 8:00-9:15 am 103 James Jay Love Building www.cs.fsu.edu/~yasinsac/ns03/main.html Will establish and use a class mailing list 1 2 My Information

More information

Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100

Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Course Description: Introduction to Cybersecurity is designed to provide students the basic concepts and terminology

More information

Syllabus: IST451. Division of Business and Engineering. Penn State Altoona

Syllabus: IST451. Division of Business and Engineering. Penn State Altoona Syllabus: IST451 Division of Business and Engineering Penn State Altoona Course Title 1. IST451: Network Security-Spring 2012 2. Section 001 3. Credits: 3 Meeting Times 1. Lectures: Mondays and Wednesdays

More information

CRYPTUS DIPLOMA IN IT SECURITY

CRYPTUS DIPLOMA IN IT SECURITY CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information

More information

Networking: EC Council Network Security Administrator NSA

Networking: EC Council Network Security Administrator NSA coursemonster.com/uk Networking: EC Council Network Security Administrator NSA View training dates» Overview The EC-Council's NSA certification looks at network security from a defensive view. The NSA

More information

1 Culminating project

1 Culminating project 1 Culminating project The project is meant for you to delve into a specific topic of computer security that interests you. Projects are meant to be instructive and fun. We encourage and expect you to apply

More information

Systems and Internet Marketing Syllabus Fall 2012 Department of Management, Marketing and International Business

Systems and Internet Marketing Syllabus Fall 2012 Department of Management, Marketing and International Business Systems and Internet Marketing Syllabus Fall 2012 Department of Management, Marketing and International Business MKT 425.001 (3 credit hour class) Monday and Wednesday, 11:00 am 12:15 m, BU 127 Instructor:

More information

MKTG 330 FLORENCE: MARKET RESEARCH Syllabus Spring 2011 (Tentative)

MKTG 330 FLORENCE: MARKET RESEARCH Syllabus Spring 2011 (Tentative) INSTRUCTOR: Ta Tao Chuang, Ph.D. OFFICE and OFFICE HOURS: tba and by appointment EMAIL: chuang@jepson.gonzaga.edu BLACKBOARD: http://learn.gonzaga.edu DAYS, TIMES & ROOM: M, W 5:15 6:45 pm (15 weeks) IMPORTANT

More information

Detailed Description about course module wise:

Detailed Description about course module wise: Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference

More information

CIS 213 PENETRATION TESTING 3 cr. (2-2)

CIS 213 PENETRATION TESTING 3 cr. (2-2) JOHN A. LOGAN COLLEGE M. Rogers SP 15 CIS 213 PENETRATION TESTING 3 cr. (2-2) COURSE DESCRIPTION: This course teaches students the underlying principles and many of the techniques associated with the cybersecurity

More information

Penetration testing & Ethical Hacking. Security Week 2014

Penetration testing & Ethical Hacking. Security Week 2014 Penetration testing & Ethical Hacking Security Week 2014 Agenda Penetration Testing Vulnerability Scanning Social engineering Security Services offered by Endava 2 3 Who I am Catanoi Maxim Information

More information

e-code Academy Information Security Diploma Training Discerption

e-code Academy Information Security Diploma Training Discerption e-code Academy Information Security Diploma Training 2015 I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. OBJECTIVE... 3 LIST OF POSTGRADUATE COURSES... 3 FIRST SEMESTER

More information