Description

3 credit/unit hours – Three hours of lecture weekly; one term

This course offers in-depth coverage of the current risks and threats to an organization’s data, combined with a structured way of addressing the safeguarding of these critical electronic assets. The course provides a foundation for those new to Information Security as well as those responsible for protecting network services, devices, traffic, and data. Additionally, the course provides the broad-based knowledge necessary to prepare students for further study in other specialized security fields. It is also intended to serve the needs of individuals seeking to pass the Computing Technology Industry Association’s (CompTIA) Security + certification exam (SY0-601).

Updated: November 6, 2022

Learning Objectives

Upon completion of this course the student will be able to:

  • Describe why information security is essential in today’s IT environment;
  • Identify the goals of information security;
  • Describe common security threats and their ramifications;
  • Determine the factors involved in developing a secure information security strategy;
  • Identify common attacks and describe how to safeguard against them;
  • Describe communications, E-mail, Web, remote access, and wireless security issues;
  • Evaluate various network devices and media and how best to secure them;
  • Describe the basics of cryptography and Public Key Infrastructure (PKI);
  • Differentiate between physical security, disaster recovery, and business continuity;
  • Utilize network diagrams; and
  • Demonstrate appropriate and ethical behavior and good work habits

Main Topics

Lesson 1: Comparing Security Roles and Security Controls

Lesson 2: Explaining Threat Actors and Threat Intelligence

Lesson 3: Performing Security Assessments

Lesson 4: Identifying Social Engineering and Malware

Lesson 5: Summarizing Basic Cryptographic Concepts

Lesson 6: Implementing Public Key Infrastructure

Lesson 7: Implementing Authentication Controls

Lesson 8: Implementing Identity and Account Management Controls

Lesson 9: Implementing Secure Network Designs

Lesson 10: Implementing Network Security Appliances

Lesson 11: Implementing Secure Network Protocols

Lesson 12: Implementing Host Security Solutions

Lesson 13: Implementing Secure Mobile Solutions

Lesson 14: Summarizing Secure Application Concepts

Lesson 15: Implementing Secure Cloud Solutions

Lesson 16: Explaining Data Privacy and Protection Concepts

Lesson 17: Performing Incident Response

Lesson 18: Explaining Digital Forensics

Lesson 19: Summarizing Risk Management Concepts

Lesson 20: Implementing Cybersecurity Resilience

Lesson 21: Explaining Physical Security