Description
3 credit/unit hours – Three hours of lecture weekly; one term
This course offers in-depth coverage of the current risks and threats to an organization’s data, combined with a structured way of addressing the safeguarding of these critical electronic assets. The course provides a foundation for those new to Information Security as well as those responsible for protecting network services, devices, traffic, and data. Additionally, the course provides the broad-based knowledge necessary to prepare students for further study in other specialized security fields. It is also intended to serve the needs of individuals seeking to pass the Computing Technology Industry Association’s (CompTIA) Security + certification exam (SY0-601).
Updated: November 6, 2022
Learning Objectives
Upon completion of this course the student will be able to:
- Describe why information security is essential in today’s IT environment;
- Identify the goals of information security;
- Describe common security threats and their ramifications;
- Determine the factors involved in developing a secure information security strategy;
- Identify common attacks and describe how to safeguard against them;
- Describe communications, E-mail, Web, remote access, and wireless security issues;
- Evaluate various network devices and media and how best to secure them;
- Describe the basics of cryptography and Public Key Infrastructure (PKI);
- Differentiate between physical security, disaster recovery, and business continuity;
- Utilize network diagrams; and
- Demonstrate appropriate and ethical behavior and good work habits
Main Topics
Lesson 1: Comparing Security Roles and Security Controls
Lesson 2: Explaining Threat Actors and Threat Intelligence
Lesson 3: Performing Security Assessments
Lesson 4: Identifying Social Engineering and Malware
Lesson 5: Summarizing Basic Cryptographic Concepts
Lesson 6: Implementing Public Key Infrastructure
Lesson 7: Implementing Authentication Controls
Lesson 8: Implementing Identity and Account Management Controls
Lesson 9: Implementing Secure Network Designs
Lesson 10: Implementing Network Security Appliances
Lesson 11: Implementing Secure Network Protocols
Lesson 12: Implementing Host Security Solutions
Lesson 13: Implementing Secure Mobile Solutions
Lesson 14: Summarizing Secure Application Concepts
Lesson 15: Implementing Secure Cloud Solutions
Lesson 16: Explaining Data Privacy and Protection Concepts
Lesson 17: Performing Incident Response
Lesson 18: Explaining Digital Forensics
Lesson 19: Summarizing Risk Management Concepts
Lesson 20: Implementing Cybersecurity Resilience
Lesson 21: Explaining Physical Security