Course Criteria

Add courses to your favorites to save, share, and find your best transfer school.
  • 3.00 Credits

    This 16-week course provides students with practical, real-world experience with wireless network security with an understanding of wireless fundamentals, wireless network threats, tools to test wireless security, and safeguards. Specifically, this course addresses the most popular hacking, cracking and wireless security network analysis tools and trains students to use them to test and secure wireless networks. Current industry best practices for managing wireless networks in a secure environment are addressed. Students need access to a second computer (for hacking) and will be required to purchase and install wireless network equipment to create a home wireless network for the purpose of conducting experiments on various wireless security vulnerabilities and countermeasures. Students must have access to a computer network they personally own and can modify. Case studies will be used throughout the course. Prerequisite: IAE-670. Corequisite: IAE-682.
  • 3.00 Credits

    This course examines malicious software detection and malicious software defenses including tripwire and signature software techniques. Viruses, worms and Trojan horses, logic bombs, malicious CGI scripts will be discussed. Students will review the anatomy of well-known viruses and worms to understand how they work. Mobile code issues as they apply to web and application technologies and resulting insecurities will be discussed in detail. Students will then review the underlying methodologies used by the anti-virus vendors and freeware offerings to protect electronic assets from harm or other compromise. Corequisites: IAE-682 and IAE-677.
  • 3.00 Credits

    This course explores security terms, definitions, concepts, and issues that face industries today. This course also will examine how the concept of security, and being secure, integrates into the overall enterprise mission. The importance of user involvement, security training, ethics, trust, and informed management will be explored.
  • 3.00 Credits

    This course provides an overview of the legal rights and liabilities associated with operation and use of computers and information, including the legal and regulatory compliance issues critical for chief information security officers. It discusses the key statutes, regulations, treaties, and court cases (in the United States and abroad) that establish legal rights and responsibilities as to computer security and information privacy. The course also helps students to learn how to reduce their risk of potential legal liability for computer security or information privacy failures, and how to enforce their security and privacy rights against other parties. Case studies and lessons learned from information security failures are used throughout the course. Prerequisite: IAE-670. Corequisites: IAE-682 and IAE-677.
  • 3.00 Credits

    This course will provide the student a history of cryptography from Caesar's cipher to elliptic-curve cryptography of today. Students will study public and private key algorithms and understand their functionality, and how they work with network protocols. One-way hashes and digital signatures will be discussed, and used by the students in submissions to the instructor. Public-key infrastructure with certificate authorities and web-of-trust infrastructure methods will be learned. Prerequisite: IAE- 670. Corequisites: IAE-682 and IAE-677.
  • 3.00 Credits

    This course will begin with an understanding of why risk management evaluations are useful. This class will discuss the general methodologies for security risk assessment and security test and evaluation, including the interviews and documentation research necessary. The student will be provided practical lab exercises to provide a hands-on analysis of a fictitious site. Detection, recovery, and damage control methods in contingency/disaster recovery planning research, documentation and training; methods of and procedures for contingency planning and security policy formulation and enforcement. Prerequisites: Completion of at least 24 credit hours, including IAE-670, IAE-677 and IAE-682. Corequisites: IAE-671, IAE-673 and IAE- 675. This course is best completed in the last term.
  • 3.00 Credits

    This course begins with lectures discussing the laws and rights to privacy by individuals and what organizations may or may not do. Online ethics are considered. It then moves on to understanding incident handling and how incident response teams work, managing trouble tickets, and basic analysis of events to determine if an incident has occurred. It concludes with computer forensics issues and practices, and rules of evidence. Prerequisite: IAE-670. Corequisites: IAE-682 and IAE-677.
  • 3.00 Credits

    This "Defense-in-Depth" course providesthe student detailed understanding of the need for internal and external vulnerability assessment. An integral technical part of any risk management program, this course goes hand-in-hand with the more analytical practices in IAE-674. Prerequisite: IAE-670. Corequisites: IAE-682 and IAE-677.
  • 3.00 Credits

    In this "defense-in-depth" course, firewallsand network IDS issues will be discussed. A detailed understanding of firewall configuration and rule sets, load balancing, web farms, wireless access, web security issues and network intrusion detection will be explored to prepare the student with the basic tools to coordinate the design and implementation of perimeter network defenses for a high volume, high access site. Prerequisite: Completion of at least 24 credits hours, including IAE-670, IAE-677 and IAE-682. Corequisites: IAE-671, IAE- 673 and IAE-675. This course is best completed in the last term.
  • 3.00 Credits

    This course explores the protections available to the practitioner through host operating systems and third party equipment and software, to protect the inner network from the attacker who has successfully circumvented the perimeter or from the disgruntled insider. Use of methodologies including host-based intrusion detection methods, audit settings and review PC Firewalls, host operating hardening for Linux and Windows 2000, and Virtual LANs will be reviewed. Corequisite: IAE-670.
To find college, community college and university courses by keyword, enter some or all of the following, then select the Search button.
(Type the name of a College, University, Exam, or Corporation)
(For example: Accounting, Psychology)
(For example: ACCT 101, where Course Prefix is ACCT, and Course Number is 101)
(For example: Introduction To Accounting)
(For example: Sine waves, Hemingway, or Impressionism)
Distance:
of
(For example: Find all institutions within 5 miles of the selected Zip Code)
Privacy Statement   |   Terms of Use   |   Institutional Membership Information   |   About AcademyOne   
Copyright 2006 - 2025 AcademyOne, Inc.