|
|
|
|
|
|
|
Course Criteria
Add courses to your favorites to save, share, and find your best transfer school.
-
3.00 Credits
No course description available.
-
3.00 Credits
No course description available.
-
3.00 Credits
No course description available.
-
3.00 Credits
No course description available.
-
3.00 Credits
Provides an understanding of IT infrastructure and services, their vulnerabilities as well as the size and complexity of security threats faced by enterprises. Course will focus on the tenets of cybersecurity of confidentiality, integrity, availability and governance. Building on an understanding of these infrastructures, the development of security practices, policies, awareness and compliance programs, and legal and regulatory issues will be examined. Development of a threat assessment mapped to a solution that is supported with a cost/benefit analysis will also be developed. Formerly TECH 5350.
-
3.00 Credits
Provides students with a working knowledge of fundamental data protection techniques for protecting data at rest, data in motion, and data in processing. Techniques include encryption algorithms and systems (symmetric, asymmetric, standard, digital certificates, and hashes), Steganography, data masking, and data obfuscation. The course will also examine access controls, availability, authentication, confidentiality, data integrity, and non-repudiation are covered and defenses against DDOS and other data attacks. Security by diversity and security in depth will be presented as fundamental requirements.
-
3.00 Credits
This course examines the current topics of cybersecurity attacks and defenses from a global perspective. Security incidents (cases) will be analyzed and technologies and processes studied to better understand how to prevent or minimize a similar threat in the future. Course will be a mixture of traditional concerns around virus protection and spam prevention mixed with new threats introduced by technology such as mobile devices and cloud computing.
-
3.00 Credits
This course focuses on operational cybersecurity management issues such as business continuity planning, disaster recovery, identity management, change management, metrics, accreditation, certification, and validation. Examines in detail effective risk assessment programs, disaster recovery planning, how to interpret the sources and levels of risk, how to apply appropriate defensive systems employing security in depth and diversity concepts, and back-up and recovery procedures.
-
3.00 Credits
Students are required to examine cybersecurity at a program and architectural level regarding issues such as risk management, audit, privacy, Information Security Management System (ISMS), and identity management within an organizational context; and be able to define a risk assessment, security awareness, metrics and education strategy; and then present it to the executive board.
-
1.00 Credits
No course description available.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Privacy Statement
|
Terms of Use
|
Institutional Membership Information
|
About AcademyOne
Copyright 2006 - 2024 AcademyOne, Inc.
|
|
|