|
|
Course Criteria
Add courses to your favorites to save, share, and find your best transfer school.
-
4.50 Credits
This course covers techniques that hackers use to circumvent security and penetrate computers and computer networks. Topics covered include legal framework for conduction penetration testing, foot-printing, social engineering, host reconnaissance, session hijacking methods, denial of service, exploits of web server vulnerabilities, breach of database security, password crackers, Intrusion Prevention Systems (IPS) and firewalls circumvention, routers and switches services disruption, scanning and penetration of wireless networks, and overflow attacks methods and prevention. Other topics covered include creating, using, and preventing Trojan Horses, viruses, and other backdoor hostile codes.
Prerequisite:
ITAS 364, ITAS 463
-
4.50 Credits
This course introduces students to U.S. and international laws and regulations that affect information systems security. Topics that are covered include Information Security laws and regulations in the United States and international regulations such as Safe Harbor, United Nations Commission on Internal Law (UNCITRAL), Organization for Economic Co-operation and Development (OECD), European Privacy Guidelines, ISO/IEC 27000 family of standards. Committee of Sponsoring Organizations (COSO), HIPAA, SOX, GLBA, ITIL, FIPS, PCI-DSS, OWASP, and emerging information security laws are also covered.
Prerequisite:
ITAS 362
-
4.50 Credits
This course covers enterprise IT governance framework, enterprise security governance framework, business-based investment decisions, maturity practices, compliance issues, IT security strategies, privacy regulations, computer misuse, and incident investigation procedures.
Prerequisite:
ITAS 365, ITAS 467
-
6.00 Credits
This course covers information security technologies as applied to operating systems, database management systems, and computer networks. The three major goals of information security, confidentiality, integrity, and availability, are introduced. Threats, vulnerability, exposure, risks, identity management, incidents response, the state machine model, and disaster recovery are also covered.
Prerequisite:
ITCO 610, ITCO 650
-
4.50 Credits
In this course, students learn to apply secure protocols over networked systems using cryptography. Symmetric and asymmetric encryption is covered. Other topics that are also covered include one way function, hash, cryptography arithmetic, public key infrastructure, Digital Signature Algorithm, and Internet security issues.
Prerequisite:
ITCO 610, ITCO 650
-
6.00 Credits
In this course, students explore current issues in network security and apply security concepts. The class focuses on technical topics as well as privacy and policy issues. Computer crimes, evidence presentation, chain of custody, and introduction to the United States criminal justice system are also covered.
Prerequisite:
ITCO 610, ITCO 650
-
6.00 Credits
The course covers information systems control, application audit, security threats, security risk types, computer attacks, countermeasures, and risk management. Risk assessment methodologies, certification, accreditation, information systems auditing, and metrics for measuring an organization’s information security program are also covered in this course.
Prerequisite:
ITCO 610, ITCO 650
-
4.50 Credits
This course introduces the student to the basics of computers. It addresses categories of computer knowledge, such as the Internet, hardware, software, applications, careers, and the future of computing.
-
4.50 Credits
This course provides the student with the experience and knowledge necessary to properly install, configure, upgrade, and troubleshoot microcomputers and basic network hardware. Included will be a discussion of desktop and portable systems, printers, input devices, and fundamental networking components.
-
4.50 Credits
In this introduction to operating systems, students are exposed to contemporary desktop and mobile operating systems. Topics may include operating system support, functions, network requirements, virtualization, and basic maintenance.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|