Course ID: | MIST 5785. 3 hours. |
Course Title: | Applied Information Security |
Course Description: | The technical aspects of managing information security and
protecting IT assets. Introduces countermeasures that
organizations can use to protect their computers, networks, and
data from security threats and cyberattacks. Students will develop
an understanding of security architectures and their practical
implications through hands-on labs. |
Oasis Title: | Applied Information Security |
Semester Course Offered: | Offered every year. |
Grading System: | A-F (Traditional) |
|
Course Objectives: | Upon completing this course, students will be able to:
* Analyze possible threats to organizational data and
recommend courses of action to mitigate risks.
* Explain how authentication and cryptography are used to
secure information access.
* Evaluate different access control models and provide
solutions to protect organizational networks and information
assets.
* Describe the approaches to compromise and damage the
networks and methods to prevent, detect, and recover from
network-based attacks.
* Describe the formal forensic approaches, major forensic
methodologies, and common forensic software tools. |
Topical Outline: | Topic 1: Cryptography
* Cryptographic principles, concepts, and terminology
* Symmetric and asymmetric key cryptography
* Digital signature and hash functions
* Cryptographic applications in information systems security
Topic 2: Access Management
* Access control concepts and technologies
* Business challenges and access control types
* Identification methods and guidelines
* Access control systems implementation, testing, and management
Topic 3: Network Attacks and Analysis
* Network attacks types, tools, and methods
* Network traffic analysis
* Methods to prevent, detect, and recover from network-based
attacks
* Defensive technologies
Topic 4: System Forensics and Investigation
* Digital forensics and computer forensics analysis
* Standards and U.S. laws affecting digital forensics
* Forensic methodologies and approaches
* Common forensic software programs |