Description
3 credit/unit hours – Three hours of lecture weekly; one term
This course offers in-depth coverage of the current risks and threats to an organization’s data, combined with a structured way of addressing the safeguarding of these critical electronic assets. The course provides a foundation for those new to Information Security as well as those responsible for protecting network services, devices, traffic, and data. Additionally, the course provides the broad-based knowledge necessary to prepare students for further study in other specialized security fields. It is also intended to serve the needs of individuals seeking to pass the Computing Technology Industry Association’s (CompTIA) Security + certification exam (SY0-501).
Learning Objectives
Upon completion of this course the student will be able to:
- Describe why information security is essential in today’s IT environment;
- Identify the goals of information security;
- Describe common security threats and their ramifications;
- Determine the factors involved in developing a secure information security strategy;
- Identify common attacks and describe how to safeguard against them;
- Describe communications, E-mail, Web, remote access, and wireless security issues;
- Evaluate various network devices and media and how best to secure them;
- Describe the basics of cryptography and Public Key Infrastructure (PKI);
- Differentiate between physical security, disaster recovery, and business continuity;
- Utilize network diagrams; and
- Demonstrate appropriate and ethical behavior and good work habits
Main Topics
Lesson 1: Comparing and Contrasting Attacks
Lesson 2: Comparing and Contrasting Security Controls
Lesson 3: Using Security Assessment Tools
Lesson 4: Comparing and Contrasting Basic Concepts of Cryptography
Lesson 5: Implementing Public Key Infrastructure
Lesson 6: Implementing Identity and Access Management Controls
Lesson 7: Managing Access Services and Accounts
Lesson 8: Implementing Secure Network Architecture Concepts
Lesson 9: Installing and Configuring Security Appliances
Lesson 10: Installing and Configuring Wireless and Physical Access Security
Lesson 11: Deploying Secure Host, Embedded, and Mobile Systems
Lesson 12: Implementing Secure Network Access Protocols
Lesson 13: Implementing Secure Network Applications
Lesson 14: Explaining Risk Management and Disaster Recovery Concepts
Lesson 15: Summarizing Secure Application Development Concepts
Lesson 16: Explaining Organizational Security Concepts