Dominican University

Brennan School of Businesss

Security - Independent Study

 

Course Description:
This course provides the student with an introduction to information security and management. Each week in this course will include readings from various text books and internet sources and discussions between the student and instructor. A subscription to safaribooksonline is required for the entire duration of this course. See http://www.safaribooksonline.com. The "10 slot" subscription is sufficient.

Upon completion of this course, students should be able to:
o Define computer security and protection of digital information.
o Explain the two types of security (Physical & Logical).
o Perform a Risk Analysis.
o Define authentication and ID management.
o Explain an Encryption and Decryption of information.
o Identify password vulnerabilities
o Explain Role based and Discretionary based access control.
o Describe security attacks and their countermeasures.
o Explain how a Firewall works.
o Describe Access Control and physical security methods.
o List and describe methods for securing software.
o Describe methods of securing infrastructure.
o Explain security management and the responsibilities involved.
o Describe the types of security policies.
o Explain the purpose of an Acceptable Use Policy.
o Explain the importance and methods of web browser security.
o Identify and explain Internet security appliances.
o Define Operating System Security.
o Explain approaches to database security
o Explain what must be done to secure an e-commerce site
o Explain the security issues and solutions in cloud computing.

 

Schedule
Week Dates Content Comments
1 1/11 - 1/17 Fundamentals of Infomation Systems Security Chapters 1-4 Assignments 1 and 2
2 1/18 - 1/24 Fundamentals of Infomation Systems Security Chapters 5-6 Assignment 3
3 1/25 - 1/31 Microsoft SQL Server 2008 R2 Unleashed Chapter 11 SQL Server Assignment (2 pages)
4 2/1 - 2/7 Microsoft SQL Server 2008 R2 Unleashed Chapter 13 SQL Server Assignment (confirm reading)
5 2/8 - 2/14 e-commerce. Chapters 3 and 4  
6 2/15 - 2/21 e-commerce. Chapters 5 and 6  
7 2/22 - 2/28 e-commerce Chapters 7 and 8  
8 2/29 - 3/6 os security  
9 3/7 - 3/13 contingency  
10 3/14 - 3/20 network security  
11 3/21 - 3/27 contingency  
12 3/28 - 4/3 cloud security  
13 4/4 - 4/10 cloud security  
14 4/11 - 4/17 infrastructure security  
15 4/18 - 4/24 software security