An introduction to Information security including vocabulary and terminology, ethics, the legal environment and risk management. Identification of exposures and vulnerabilities and appropriate countermeasures are addressed. The importance of appropriate planning, policies and controls is discussed.
Grade Basis: L
Credit hours: 3.0
Lecture hours: 3.0
Lab hours: 1.0
Development of information security policies, standards, and guidelines for an organization. Includes Demilitarized Zone (DMZ), antivirus, Virtual Private Network (VPN), wireless communications, remote access, and other critical administrative and operational security policies. Identification of exposures and vulnerabilities and appropriate countermeasures are addressed. Emphasizes wireless security goals of availability, integrity, accuracy, and confidentiality in the design, planning, implementing, operating, and troubleshooting of wireless LAN along with appropriate planning and administrative controls.
Grade Basis: L
Credit hours: 3.0
Lecture hours: 3.0
Lab hours: 1.0
In-depth study of system forensics including methodologies used for analysis of computer security breaches. Gather and evaluate evidence to perform postmortem analysis of a security breach.
Grade Basis: L
Credit hours: 3.0
Lecture hours: 2.0
Lab hours: 3.0