|
Nov 21, 2024
|
|
|
|
2022-2023 Catalog [ARCHIVED CATALOG]
|
CSIA 105 - Introduction to Cyber Security/Information Assurance PREREQUISITES: ITSP 135 - Hardware / Software Support or (ITSP 132 - IT Support Essentials I and ITSP 134 - IT Support Essentials II ) or NETI 104 - Introduction to Networking or NETI 109 - Networking I or CSCI 101 - Computer Science I PROGRAM: Cyber Security/Information Assurance CREDIT HOURS MIN: 3 LECTURE HOURS MIN: 3 DATE OF LAST REVISION: Fall, 2020
The students will explore the field of Cyber Security/Information Assurance focusing on the technical and managerial aspects of the discipline. Students will be introduced to the basic terminology, concepts, and best practices of computer/network security and the roles and responsibilities of management/security personnel. The students will learn the technologies used and techniques involved in creating a secure computer networking environment including authentication and the types of attacks against an organization.
MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:
- Use virtual machine technology to test security tools in a sandbox environment.
- Identify security threats to network services, devices, traffic and data.
- Use tools to secure network communications.
- Monitor the security infrastructure with current industry standard utilities.
- Discuss roles and responsibilities of information security personnel.
- Use cryptography and public key infrastructures to secure remote access, wireless, and virtual private networks.
- Implement “defense in depth” to shield against network attacks.
- Discuss computer forensics and incident response.
- Discuss basic characteristics of information.
- Discuss information security as it applies to application guidance, and policies.
- Describe the legal elements of investigative authorities in criminal prosecution, evidence collection, and evidence preservation.
- Understand the concepts of trust through assurance, mechanism, and policy.
- Understand the practical performance measures employed in designing security measures and programs.
- Describe and discuss administrative security procedural controls.
- Discuss the auditing and monitoring of security systems.
COURSE CONTENT: Topical areas of study include -
- Security reviews
- Effectiveness of security programs
- Investigation of security breaches
- Monitoring systems for accuracy and abnormalities
- Privacy
- Accountability controls
- Audit trails and logs
- Software design standards
- Denial of service, spoofing, and hijacking
- Networking
- Defense in depth
- Cryptography
- Security Technologies
- Legal, ethical and professional issues in Information Security
- Attribution
- Destruction of media
Course Addendum - Syllabus (Click to expand)
|
|