2021-2022 Catalog [ARCHIVED CATALOG]
|
CSIA 105 - Introduction to Cyber Security/Information Assurance PREREQUISITES: ITSP 135 - Hardware / Software Support or (ITSP 132 - IT Support Essentials I and ITSP 134 - IT Support Essentials II ) or NETI 104 - Introductions to Networking or NETI 109 - Networking I or CSCI 101 - Computer Science I PROGRAM: Cyber Security/Information Assurance CREDIT HOURS: 3 LECTURE HOURS: 3 DATE OF LAST REVISION: Fall, 2020
The students will explore the field of Cyber Security/Information Assurance focusing on the technical and managerial aspects of the discipline. Students will be introduced to the basic terminology, concepts, and best practices of computer/network security and the roles and responsibilities of management/security personnel. The students will learn the technologies used and techniques involved in creating a secure computer networking environment including authentication and the types of attacks against an organization.
MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:
- Use virtual machine technology to test security tools in a sandbox environment.
- Identify security threats to network services, devices, traffic and data.
- Use tools to secure network communications.
- Monitor the security infrastructure with current industry standard utilities.
- Discuss roles and responsibilities of information security personnel.
- Use cryptography and public key infrastructures to secure remote access, wireless, and virtual private networks.
- Implement “defense in depth” to shield against network attacks.
- Discuss computer forensics and incident response.
- Discuss basic characteristics of information.
- Discuss information security as it applies to application guidance, and policies.
- Describe the legal elements of investigative authorities in criminal prosecution, evidence collection, and evidence preservation.
- Understand the concepts of trust through assurance, mechanism, and policy.
- Understand the practical performance measures employed in designing security measures and programs.
- Describe and discuss administrative security procedural controls.
- Discuss the auditing and monitoring of security systems.
COURSE CONTENT: Topical areas of study include - Security reviews
Effectiveness of security programs
Investigation of security breaches
Monitoring systems for accuracy and abnormalities
Privacy
Accountability controls
Audit trails and logs
Software design standards
Denial of service, spoofing, and hijacking
Networking
Defense in depth
Cryptography
Security Technologies
Legal, ethical and professional issues in Information Security
Attribution
Destruction of media Course Addendum - Syllabus (Click to expand)
|