Description

3 credit/unit hours – Three hours of lecture weekly; one term

This course offers in-depth coverage of the current risks and threats to an organization’s data, combined with a structured way of addressing the safeguarding of these critical electronic assets. The course provides a foundation for those new to Information Security as well as those responsible for protecting network services, devices, traffic, and data. Additionally, the course provides the broad-based knowledge necessary to prepare students for further study in other specialized security fields. It is also intended to serve the needs of individuals seeking to pass the Computing Technology Industry Association’s (CompTIA) Security + certification exam (SY0-501).

Learning Objectives

Upon completion of this course the student will be able to:

  • Describe why information security is essential in today’s IT environment;
  • Identify the goals of information security;
  • Describe common security threats and their ramifications;
  • Determine the factors involved in developing a secure information security strategy;
  • Identify common attacks and describe how to safeguard against them;
  • Describe communications, E-mail, Web, remote access, and wireless security issues;
  • Evaluate various network devices and media and how best to secure them;
  • Describe the basics of cryptography and Public Key Infrastructure (PKI);
  • Differentiate between physical security, disaster recovery, and business continuity;
  • Utilize network diagrams; and
  • Demonstrate appropriate and ethical behavior and good work habits

Main Topics

Lesson 1: Comparing and Contrasting Attacks

Lesson 2: Comparing and Contrasting Security Controls

Lesson 3: Using Security Assessment Tools

Lesson 4: Comparing and Contrasting Basic Concepts of Cryptography

Lesson 5: Implementing Public Key Infrastructure

Lesson 6: Implementing Identity and Access Management Controls

Lesson 7: Managing Access Services and Accounts

Lesson 8: Implementing Secure Network Architecture Concepts

Lesson 9: Installing and Configuring Security Appliances

Lesson 10: Installing and Configuring Wireless and Physical Access Security

Lesson 11: Deploying Secure Host, Embedded, and Mobile Systems

Lesson 12: Implementing Secure Network Access Protocols

Lesson 13: Implementing Secure Network Applications

Lesson 14: Explaining Risk Management and Disaster Recovery Concepts

Lesson 15: Summarizing Secure Application Development Concepts

Lesson 16: Explaining Organizational Security Concepts