Course Criteria

Add courses to your favorites to save, share, and find your best transfer school.
  • 3.00 Credits

    In-depth coverage of incident response and incident handling, including identifying sources of attacks and security breaches; analyzing security logs; recovering the system to normal; performing postmortem analysis; and implementing and modifying security measures. This course is cross-listed as ITSY 2442. The student may register for either ITSY 2342 or ITSY 2442, but may receive credit for only one of the two. (2 Lec., 4 Lab.)
  • 3.00 Credits

    In-depth study of system forensics including methodologies used for analysis of computer security breaches. Gather and evaluate evidence to perform postmortem analysis of a security breach. This course is cross-listed as ITSY 2443. The student may register for either ITSY 2343 or ITSY 2443, but may receive credit for only one of the two. (2 Lec., 4 Lab.)
  • 3.00 Credits

    Capstone experience for the security curriculum. Synthesizes technical material covered in prior courses to monitor, audit, analyze, and revise computer and network security systems to ensure appropriate levels of protection are in place to assure regulatory compliance. This course is cross-listed as ITSY 2459. The student may register for either ITSY 2359 or ITSY 2459, but may receive credit for only one of the two. (2 Lec., 4 Lab.)
  • 4.00 Credits

    Safeguard computer operating systems by demonstrating server support skills and designing and implementing a security system. Identify security threats and monitor network security implementations. Use best practices to configure operating systems to industry security standards. This course is cross-listed as ITSY 2300. The student may register for either ITSY 2300 or ITSY 2400, but may receive credit for only one of the two. (3 Lec., 4 Lab.)
  • 4.00 Credits

    Identify elements of firewall design, types of security threats and responses to security attacks. Use best practices to design, implement, and monitor a network security plan. Examine security incident postmortem reporting and ongoing network security activities. This course is cross-listed as ITSY 2301. The student may register for either ITSY 2301 or ITSY 2401, but may receive credit for only one of the two. (3 Lec., 4 Lab.)
  • 4.00 Credits

    Development of information security policies, standards, and guidelines for an organization. Includes Demilitarized Zone (DMZ), antivirus, Virtual Private Network (VPN), wireless communications, remote access, and other critical administrative and operational security policies. Identification of exposures and vulnerabilities and appropriate countermeasures are addressed. Emphasizes wireless security goals of availability, integrity, accuracy, and confidentiality in the design, planning, implementing, operating, and troubleshooting of wireless LAN along with appropriate planning and administrative controls. (3 Lec., 2 Lab.)
  • 4.00 Credits

    Computer information systems security monitoring, intrusion detection, and crisis management. Includes alarm management, signature configuration, sensor configuration, and troubleshooting components. Emphasizes identifying, resolving, and documenting network crises and activating the response team. This course is cross-listed as ITSY 2330. The student may register for either ITSY 2330 or ITSY 2430, but may receive credit for only one of the two. (3 Lec., 3 Lab.)
  • 4.00 Credits

    In-depth coverage of security management practices, including asset evaluation and risk management; cyber law and ethics issues; policies and procedures; business recovery and business continuity planning; network security design; and developing and maintaining a security plan. This course is cross-listed as ITSY 2341. The student may register for either ITSY 2341 or ITSY 2441, but may receive credit for only one of the two. (3 Lec., 4 Lab.)
  • 4.00 Credits

    In-depth coverage of incident response and incident handling, including identifying sources of attacks and security breaches; analyzing security logs; recovering the system to normal; performing postmortem analysis; and implementing and modifying security measures. This course is cross-listed as ITSY 2342. The student may register for either ITSY 2342 or ITSY 2442, but may receive credit for only one of the two. (3 Lec., 4 Lab.)
  • 4.00 Credits

    In-depth study of system forensics including methodologies used for analysis of computer security breaches. Gather and evaluate evidence to perform postmortem analysis of a security breach. This course is cross-listed as ITSY 2343. The student may register for either ITSY 2343 or ITSY 2443, but may receive credit for only one of the two. (3 Lec., 4 Lab.)
To find college, community college and university courses by keyword, enter some or all of the following, then select the Search button.
(Type the name of a College, University, Exam, or Corporation)
(For example: Accounting, Psychology)
(For example: ACCT 101, where Course Prefix is ACCT, and Course Number is 101)
(For example: Introduction To Accounting)
(For example: Sine waves, Hemingway, or Impressionism)
Distance:
of
(For example: Find all institutions within 5 miles of the selected Zip Code)
Privacy Statement   |   Terms of Use   |   Institutional Membership Information   |   About AcademyOne   
Copyright 2006 - 2024 AcademyOne, Inc.