Security - Independent Study
Course Description:
This course provides the student with an introduction to information security and management. Each week in this course will include readings from various text books and internet sources and discussions between the student and instructor. A subscription to safaribooksonline is required for the entire duration of this course. See http://www.safaribooksonline.com. The "10 slot" subscription is sufficient.
Upon completion of this course, students should be able to:
o Define computer security and protection of digital information.
o Explain the two types of security (Physical & Logical).
o Perform a Risk Analysis.
o Define authentication and ID management.
o Explain an Encryption and Decryption of information.
o Identify password vulnerabilities
o Explain Role based and Discretionary based access control.
o Describe security attacks and their countermeasures.
o Explain how a Firewall works.
o Describe Access Control and physical security methods.
o List and describe methods for securing software.
o Describe methods of securing infrastructure.
o Explain security management and the responsibilities involved.
o Describe the types of security policies.
o Explain the purpose of an Acceptable Use Policy.
o Explain the importance and methods of web browser security.
o Identify and explain Internet security appliances.
o Define Operating System Security.
o Explain approaches to database security
o Explain what must be done to secure an e-commerce site
o Explain the security issues and solutions in cloud computing.