UGA Bulletin Logo

Applied Information Security


Course Description

The technical aspects of managing information security and protecting IT assets. Introduces countermeasures that organizations can use to protect their computers, networks, and data from security threats and cyberattacks. Students will develop an understanding of security architectures and their practical implications through hands-on labs.


Athena Title

Applied Information Security


Prerequisite

MIST 4600 or MIST 4600E


Pre or Corequisite

MIST 4610 or MIST 4610E


Semester Course Offered

Offered every year.


Grading System

A - F (Traditional)


Student Learning Outcomes

  • Upon completing this course, students will be able to analyze possible threats to organizational data and recommend courses of action to mitigate risks.
  • Upon completing this course, students will be able to explain how authentication and cryptography are used to secure information access.
  • Upon completing this course, students will be able to evaluate different access control models and provide solutions to protect organizational networks and information assets.
  • Upon completing this course, students will be able to describe the approaches to compromise and damage the networks and methods to prevent, detect, and recover from network-based attacks.
  • Upon completing this course, students will be able to describe the formal forensic approaches, major forensic methodologies, and common forensic software tools.

Topical Outline

  • Topic 1: Cryptography * Cryptographic principles, concepts, and terminology * Symmetric and asymmetric key cryptography * Digital signature and hash functions * Cryptographic applications in information systems security
  • Topic 2: Access Management * Access control concepts and technologies * Business challenges and access control types * Identification methods and guidelines * Access control systems implementation, testing, and management
  • Topic 3: Network Attacks and Analysis * Network attack types, tools, and methods * Network traffic analysis * Methods to prevent, detect, and recover from network-based attacks * Defensive technologies
  • Topic 4: System Forensics and Investigation * Digital forensics and computer forensics analysis * Standards and U.S. laws affecting digital forensics * Forensic methodologies and approaches * Common forensic software programs

Syllabus