Course Criteria

Add courses to your favorites to save, share, and find your best transfer school.
  • 3.00 Credits

    This course examines federal, state, and local computer fraud statutes to provide the student with a legal foundation to approach computer investigations. The course includes lecture elements that provide the student with the skills necessary to conduct successful computer-related investigations, and includes an examination of the processes involved in preparing an affidavit for a search warrant. Prerequisite(s): CRJ 217 (3,0) 3 credits
  • 3.00 Credits

    The course introduces students to loss control theory with an analysis of tread models to develop comprehensive protection plans for organizations. This course offers a study of security program types; the concepts of Value-added contributions and cost containment; total quality management and the Baldrige process; benchmarking; security management methods; third party relationships in Security; types of outsourcing relationships; and Security Standards. (3,0) 3 credits
  • 3.00 Credits

    This course focuses on security threats to an organization's data network such as hackers, intruders, industrial espionage and sabotage, fraud and theft. The components of computer security architecture are studied as well as the principles of security networking protocols, encryption, fault tolerance techniques, and file system protection. Additional topics covered include the protection of computer hardware and software. Prerequisite(s): CRJ 115 (3,0,1) 3 credits Fall
  • 3.00 Credits

    This course is a continuation of CRJ 310, and includes an analysis of the security features of computer operating systems. The course will review the OSI model and describe how systems communicate with one another. Also included in the course is a detailed study of authentication technologies and how they are used to secure an organization's assets and electronic transactions. Prerequisite(s): CRJ 310 (3,0,1) 3 credits Spring
  • 3.00 Credits

    The course examines computer software threats which include the birth, life and termination of computer viruses, their modes of operation, detection techniques, virus signatures and virus removal methods as well as other "virus like" threats which are delivered by e-mail and internet/intranet packets. Prerequisite(s): CRJ 311 (3,0) 3 credits Fall
  • 3.00 Credits

    This course focuses on the computer security audit and policy formulation process. Topics covered include e-mail, messaging, employee use of the internet and work group security issues. Other topics examined are the National Information Infrastructure Protection Act, the Communications Decency Act, and the Communications Privacy Act. Prerequisite(s): CRJ 312 (3,0) 3 credits Spring
  • 3.00 Credits

    A study of firewall technologies, including packet filtering, proxying, network address translation, and virtual private networks. An analysis of firewall architectures such as screening routers, screened hosts, hosts, screened subnets, perimeter networks, and internal firewalls. An examination of security threats on the internet, including service attacks, eavesdropping, worm programs, and the like. A study of access control hardware devices such as voice signatures, fingerprints, facial geometry, hand geometry, and retinal scanners-iris patterns for servers, workstations, and mobile computers. Prerequisite(s): CRJ 115 (3,0,1) 3 credits Spring
  • 1.00 Credits

    A study of the architecture, monitoring strategies, and analysis engines of intrusion detection. An examination of host based information sources. An analysis of information transformation processes for intrusion detection such as misuse and anomaly detection. A study of technical issues in intrusion detection such as scalability, interoperability, sensor control, reliability, integration, and user interfaces. An examination of legal matters in intrusion detection such as the rules of evidence with regard to system logs, and monitoring activities with regard to the right of privacy. Prerequisite: CRJ 115 (3,0,1) 3 credits Fall
  • 3.00 Credits

    A study of the cases and statutes that focus on the legal issues of computer technology. An analysis of proprietary rights, including copyright, patent, trade secret, and trade mark. An examination of the Economic Espionage Act of 1996. An analysis of security risks in electronic commerce. A study of security controls and countermeasures to prevent electronic espionage. Prerequisite(s): CRJ 322 (3,0) 3 credits Spring
  • 3.00 Credits

    Independent study of a Security Systems or related area of interest to both the student and a faculty member who shall act as project Advisor. The project selected will utilize competencies acquired in previous Security Systems and related courses. Prerequisite(s): Department approval (1,6) 3 credits
To find college, community college and university courses by keyword, enter some or all of the following, then select the Search button.
(Type the name of a College, University, Exam, or Corporation)
(For example: Accounting, Psychology)
(For example: ACCT 101, where Course Prefix is ACCT, and Course Number is 101)
(For example: Introduction To Accounting)
(For example: Sine waves, Hemingway, or Impressionism)
Distance:
of
(For example: Find all institutions within 5 miles of the selected Zip Code)
Privacy Statement   |   Terms of Use   |   Institutional Membership Information   |   About AcademyOne   
Copyright 2006 - 2025 AcademyOne, Inc.