[PORTALNAME]
Toggle menu
Home
Search
Search
Search Transfer Schools
Search for Course Equivalencies
Search for Exam Equivalencies
Search for Transfer Articulation Agreements
Search for Programs
Search for Courses
PA Bureau of CTE SOAR Programs
Transfer Student Center
Transfer Student Center
Adult Learners
Community College Students
High School Students
Traditional University Students
International Students
Military Learners and Veterans
About
About
Institutional information
Transfer FAQ
Register
Login
Course Criteria
Add courses to your favorites to save, share, and find your best transfer school.
IAE 621: Applied Wireless Network Security
3.00 Credits
Capitol Technology University
This 16-week course provides students with practical, real-world experience with wireless network security with an understanding of wireless fundamentals, wireless network threats, tools to test wireless security, and safeguards. Specifically, this course addresses the most popular hacking, cracking and wireless security network analysis tools and trains students to use them to test and secure wireless networks. Current industry best practices for managing wireless networks in a secure environment are addressed. Students need access to a second computer (for hacking) and will be required to purchase and install wireless network equipment to create a home wireless network for the purpose of conducting experiments on various wireless security vulnerabilities and countermeasures. Students must have access to a computer network they personally own and can modify. Case studies will be used throughout the course. Prerequisite: IAE-670. Corequisite: IAE-682.
Share
IAE 621 - Applied Wireless Network Security
Favorite
IAE 67: Malicious Software
3.00 Credits
Capitol Technology University
This course examines malicious software detection and malicious software defenses including tripwire and signature software techniques. Viruses, worms and Trojan horses, logic bombs, malicious CGI scripts will be discussed. Students will review the anatomy of well-known viruses and worms to understand how they work. Mobile code issues as they apply to web and application technologies and resulting insecurities will be discussed in detail. Students will then review the underlying methodologies used by the anti-virus vendors and freeware offerings to protect electronic assets from harm or other compromise. Corequisites: IAE-682 and IAE-677.
Share
IAE 67 - Malicious Software
Favorite
IAE 670: Network Systems Security Concepts
3.00 Credits
Capitol Technology University
This course explores security terms, definitions, concepts, and issues that face industries today. This course also will examine how the concept of security, and being secure, integrates into the overall enterprise mission. The importance of user involvement, security training, ethics, trust, and informed management will be explored.
Share
IAE 670 - Network Systems Security Concepts
Favorite
IAE 671: Legal Aspects of Computer Security and Information Privacy
3.00 Credits
Capitol Technology University
This course provides an overview of the legal rights and liabilities associated with operation and use of computers and information, including the legal and regulatory compliance issues critical for chief information security officers. It discusses the key statutes, regulations, treaties, and court cases (in the United States and abroad) that establish legal rights and responsibilities as to computer security and information privacy. The course also helps students to learn how to reduce their risk of potential legal liability for computer security or information privacy failures, and how to enforce their security and privacy rights against other parties. Case studies and lessons learned from information security failures are used throughout the course. Prerequisite: IAE-670. Corequisites: IAE-682 and IAE-677.
Share
IAE 671 - Legal Aspects of Computer Security and Information Privacy
Favorite
Show comparable courses
IAE 673: Secure Information Transfer and Storage
3.00 Credits
Capitol Technology University
This course will provide the student a history of cryptography from Caesar's cipher to elliptic-curve cryptography of today. Students will study public and private key algorithms and understand their functionality, and how they work with network protocols. One-way hashes and digital signatures will be discussed, and used by the students in submissions to the instructor. Public-key infrastructure with certificate authorities and web-of-trust infrastructure methods will be learned. Prerequisite: IAE- 670. Corequisites: IAE-682 and IAE-677.
Share
IAE 673 - Secure Information Transfer and Storage
Favorite
IAE 674: Security Risk Management
3.00 Credits
Capitol Technology University
This course will begin with an understanding of why risk management evaluations are useful. This class will discuss the general methodologies for security risk assessment and security test and evaluation, including the interviews and documentation research necessary. The student will be provided practical lab exercises to provide a hands-on analysis of a fictitious site. Detection, recovery, and damage control methods in contingency/disaster recovery planning research, documentation and training; methods of and procedures for contingency planning and security policy formulation and enforcement. Prerequisites: Completion of at least 24 credit hours, including IAE-670, IAE-677 and IAE-682. Corequisites: IAE-671, IAE-673 and IAE- 675. This course is best completed in the last term.
Share
IAE 674 - Security Risk Management
Favorite
IAE 675: Computer Forensics and Incident Handling
3.00 Credits
Capitol Technology University
This course begins with lectures discussing the laws and rights to privacy by individuals and what organizations may or may not do. Online ethics are considered. It then moves on to understanding incident handling and how incident response teams work, managing trouble tickets, and basic analysis of events to determine if an incident has occurred. It concludes with computer forensics issues and practices, and rules of evidence. Prerequisite: IAE-670. Corequisites: IAE-682 and IAE-677.
Share
IAE 675 - Computer Forensics and Incident Handling
Favorite
IAE 679: Vulnerability Mitigation
3.00 Credits
Capitol Technology University
This "Defense-in-Depth" course providesthe student detailed understanding of the need for internal and external vulnerability assessment. An integral technical part of any risk management program, this course goes hand-in-hand with the more analytical practices in IAE-674. Prerequisite: IAE-670. Corequisites: IAE-682 and IAE-677.
Share
IAE 679 - Vulnerability Mitigation
Favorite
IAE 680: Perimeter Protection
3.00 Credits
Capitol Technology University
In this "defense-in-depth" course, firewallsand network IDS issues will be discussed. A detailed understanding of firewall configuration and rule sets, load balancing, web farms, wireless access, web security issues and network intrusion detection will be explored to prepare the student with the basic tools to coordinate the design and implementation of perimeter network defenses for a high volume, high access site. Prerequisite: Completion of at least 24 credits hours, including IAE-670, IAE-677 and IAE-682. Corequisites: IAE-671, IAE- 673 and IAE-675. This course is best completed in the last term.
Share
IAE 680 - Perimeter Protection
Favorite
IAE 682: Internal Protection
3.00 Credits
Capitol Technology University
This course explores the protections available to the practitioner through host operating systems and third party equipment and software, to protect the inner network from the attacker who has successfully circumvented the perimeter or from the disgruntled insider. Use of methodologies including host-based intrusion detection methods, audit settings and review PC Firewalls, host operating hardening for Linux and Windows 2000, and Virtual LANs will be reviewed. Corequisite: IAE-670.
Share
IAE 682 - Internal Protection
Favorite
First
Previous
16
17
18
19
20
Next
Last
Results Per Page:
10
20
30
40
50
Search Again
To find college, community college and university courses by keyword, enter some or all of the following, then select the Search button.
College:
(Type the name of a College, University, Exam, or Corporation)
Course Subject:
(For example: Accounting, Psychology)
Course Prefix and Number:
(For example: ACCT 101, where Course Prefix is ACCT, and Course Number is 101)
Course Title:
(For example: Introduction To Accounting)
Course Description:
(For example: Sine waves, Hemingway, or Impressionism)
Distance:
Within
5 miles
10 miles
25 miles
50 miles
100 miles
200 miles
of
Zip Code
Please enter a valid 5 or 9-digit Zip Code.
(For example: Find all institutions within 5 miles of the selected Zip Code)
State/Region:
Alabama
Alaska
American Samoa
Arizona
Arkansas
California
Colorado
Connecticut
Delaware
District of Columbia
Federated States of Micronesia
Florida
Georgia
Guam
Hawaii
Idaho
Illinois
Indiana
Iowa
Kansas
Kentucky
Louisiana
Maine
Marshall Islands
Maryland
Massachusetts
Michigan
Minnesota
Minor Outlying Islands
Mississippi
Missouri
Montana
Nebraska
Nevada
New Hampshire
New Jersey
New Mexico
New York
North Carolina
North Dakota
Northern Mariana Islands
Ohio
Oklahoma
Oregon
Palau
Pennsylvania
Puerto Rico
Rhode Island
South Carolina
South Dakota
Tennessee
Texas
Utah
Vermont
Virgin Islands
Virginia
Washington
West Virginia
Wisconsin
Wyoming
American Samoa
Guam
Northern Marianas Islands
Puerto Rico
Virgin Islands