|
|
Course Criteria
Add courses to your favorites to save, share, and find your best transfer school.
-
4.50 Credits
With the aid of the Program Chair/Dean and the Student Affairs Office on each campus, the student participates in a practical on-site internship in which theoretical principles are applied to work situations under professional supervision.
-
4.50 Credits
This class provides students with an overview of network security principles and implementation techniques. Topics covered include authentication issues, examples of attacks and malicious code that may be used against networks and the countermeasures against these, examples of perimeter and interior attacks, and protecting file and print services. Issues regarding Trusted Computing bases (TCB), authentication, access control and authorization, discretionary and mandatory security policies, secure kernel design, secure operating systems, and secure databases from a systems architecture perspective are also covered.
Prerequisite:
ITCO 361
-
4.50 Credits
This course covers network security principles and implementation techniques. Topics covered include examples of attacks and countermeasures for securing e-mail, definitions and principles underpinning all IT security, security management, and security architectures. Fundamental concepts, principles, and practical networking and internetworking issues relevant to the design, analysis, and implementation of enterprise-level trusted networked information systems are also covered.
Prerequisite:
ITCO 361
-
4.50 Credits
This course focuses on issues related to the design and implementation of Web applications and data stores. Emphases are placed on multilevel security in database systems, covert channels, SQL Injection attacks, Cross-site Scripting, Cross-site Forgery, hostile codes, and countermeasures. OWAP Top 10 vulnerabilities and countermeasures are also covered.
Prerequisite:
ITAS 362
-
4.50 Credits
The course covers the essential subjects and topics in information systems control, including types of audits, types of audit risks, frameworks for management and application controls, audit software and tools, concurrent auditing techniques, data integrity, system effectiveness, IT services delivery, life cycle management, information asset protection, IT governance, business continuity, and system efficiency. Also covered are processes for creating information systems audit and reviewing audit reports.
Prerequisite:
ITAS 362
-
4.50 Credits
This course covers the mathematical background to cryptography as well as providing a comprehensive review of contemporary cryptographic technologies, as applied to computer and network operations. Topics include determining the appropriate cryptographic targets and methods, digital key management, cryptographic vulnerabilities, and implementation of effective cryptographic methodologies to secure enterprisewide information systems.
Prerequisite:
ITCO 341, ITAS 362
-
4.50 Credits
This course covers the essential practices involved in developing a security policy. Topics covered include IT security policies and procedures, information security standards, frameworks, security baseline analysis, risk assessment, guidelines for security policy development, the value of security templates, and policy implementation, revision, metrics, maintenance, and enforcement, threat detection and reaction, and technical and managerial responses.
-
4.50 Credits
This course covers the essential processes that are used to assess applications for risk and subsequently deploy them to production. Topics covered include risk assessment, Information security policies and procedures, security threats, likelihood and impact, security awareness training, and expected rules of behavior for end-users. Also covered are evaluation of the technical, management, and operational security controls, procedures for reporting and responding to security incidents, and contingency planning.
Prerequisite:
ITAS 363, ITAS 364
-
4.50 Credits
This course covers techniques used to secure operating systems. Typical vulnerabilities, exploits, and countermeasures are covered. Also covered are third-party software and built-in utilities that can be used to protect operating systems from hacking. Operating systems covered include Windows, Unix, Mac, Linux, and z-OS. Vulnerabilities that are introduced by applications, open ports, and services are covered.
Prerequisite:
ITAS 362
-
4.50 Credits
This course covers intrusion detection, server security (with emphasis on the Windows operating system and server), and related advanced administration tasks on enterprise servers. Topics may include host and network based intrusion detection, implementing automated protection, packet filtering, software/hardware firewalls, directory concepts, account and group access control, security policies, installation and manual configuration, backup and recovery services, server and client policy security, securely deploying infrastructure servers, and hardening server security.
Prerequisite:
ITCO 361
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|