|
|
|
|
|
|
|
Course Criteria
Add courses to your favorites to save, share, and find your best transfer school.
-
3.00 Credits
In-depth coverage of incident response and incident handling, including identifying sources of attacks and security breaches; analyzing security logs; recovering the system to normal; performing postmortem analysis; and implementing and modifying security measures. This course is cross-listed as ITSY 2442. The student may register for either ITSY 2342 or ITSY 2442, but may receive credit for only one of the two. (2 Lec., 4 Lab.)
-
3.00 Credits
In-depth study of system forensics including methodologies used for analysis of computer security breaches. Gather and evaluate evidence to perform postmortem analysis of a security breach. This course is cross-listed as ITSY 2443. The student may register for either ITSY 2343 or ITSY 2443, but may receive credit for only one of the two. (2 Lec., 4 Lab.)
-
3.00 Credits
Capstone experience for the security curriculum. Synthesizes technical material covered in prior courses to monitor, audit, analyze, and revise computer and network security systems to ensure appropriate levels of protection are in place to assure regulatory compliance. This course is cross-listed as ITSY 2459. The student may register for either ITSY 2359 or ITSY 2459, but may receive credit for only one of the two. (2 Lec., 4 Lab.)
-
4.00 Credits
Safeguard computer operating systems by demonstrating server support skills and designing and implementing a security system. Identify security threats and monitor network security implementations. Use best practices to configure operating systems to industry security standards. This course is cross-listed as ITSY 2300. The student may register for either ITSY 2300 or ITSY 2400, but may receive credit for only one of the two. (3 Lec., 4 Lab.)
-
4.00 Credits
Identify elements of firewall design, types of security threats and responses to security attacks. Use best practices to design, implement, and monitor a network security plan. Examine security incident postmortem reporting and ongoing network security activities. This course is cross-listed as ITSY 2301. The student may register for either ITSY 2301 or ITSY 2401, but may receive credit for only one of the two. (3 Lec., 4 Lab.)
-
4.00 Credits
Development of information security policies, standards, and guidelines for an organization. Includes Demilitarized Zone (DMZ), antivirus, Virtual Private Network (VPN), wireless communications, remote access, and other critical administrative and operational security policies. Identification of exposures and vulnerabilities and appropriate countermeasures are addressed. Emphasizes wireless security goals of availability, integrity, accuracy, and confidentiality in the design, planning, implementing, operating, and troubleshooting of wireless LAN along with appropriate planning and administrative controls. (3 Lec., 2 Lab.)
-
4.00 Credits
Computer information systems security monitoring, intrusion detection, and crisis management. Includes alarm management, signature configuration, sensor configuration, and troubleshooting components. Emphasizes identifying, resolving, and documenting network crises and activating the response team. This course is cross-listed as ITSY 2330. The student may register for either ITSY 2330 or ITSY 2430, but may receive credit for only one of the two. (3 Lec., 3 Lab.)
-
4.00 Credits
In-depth coverage of security management practices, including asset evaluation and risk management; cyber law and ethics issues; policies and procedures; business recovery and business continuity planning; network security design; and developing and maintaining a security plan. This course is cross-listed as ITSY 2341. The student may register for either ITSY 2341 or ITSY 2441, but may receive credit for only one of the two. (3 Lec., 4 Lab.)
-
4.00 Credits
In-depth coverage of incident response and incident handling, including identifying sources of attacks and security breaches; analyzing security logs; recovering the system to normal; performing postmortem analysis; and implementing and modifying security measures. This course is cross-listed as ITSY 2342. The student may register for either ITSY 2342 or ITSY 2442, but may receive credit for only one of the two. (3 Lec., 4 Lab.)
-
4.00 Credits
In-depth study of system forensics including methodologies used for analysis of computer security breaches. Gather and evaluate evidence to perform postmortem analysis of a security breach. This course is cross-listed as ITSY 2343. The student may register for either ITSY 2343 or ITSY 2443, but may receive credit for only one of the two. (3 Lec., 4 Lab.)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Privacy Statement
|
Terms of Use
|
Institutional Membership Information
|
About AcademyOne
Copyright 2006 - 2024 AcademyOne, Inc.
|
|
|