The technical aspects of managing information security and
protecting IT assets. Introduces countermeasures that
organizations can use to protect their computers, networks, and
data from security threats and cyberattacks. Students will develop
an understanding of security architectures and their practical
implications through hands-on labs.
Athena Title
Applied Information Security
Prerequisite
MIST 4600 or MIST 4600E
Pre or Corequisite
MIST 4610 or MIST 4610E
Semester Course Offered
Offered every year.
Grading System
A - F (Traditional)
Student Learning Outcomes
Upon completing this course, students will be able to analyze possible threats to organizational data and recommend courses of action to mitigate risks.
Upon completing this course, students will be able to explain how authentication and cryptography are used to secure information access.
Upon completing this course, students will be able to evaluate different access control models and provide solutions to protect organizational networks and information assets.
Upon completing this course, students will be able to describe the approaches to compromise and damage the networks and methods to prevent, detect, and recover from network-based attacks.
Upon completing this course, students will be able to describe the formal forensic approaches, major forensic methodologies, and common forensic software tools.
Topical Outline
Topic 1: Cryptography
* Cryptographic principles, concepts, and terminology
* Symmetric and asymmetric key cryptography
* Digital signature and hash functions
* Cryptographic applications in information systems security
Topic 2: Access Management
* Access control concepts and technologies
* Business challenges and access control types
* Identification methods and guidelines
* Access control systems implementation, testing, and management
Topic 3: Network Attacks and Analysis
* Network attack types, tools, and methods
* Network traffic analysis
* Methods to prevent, detect, and recover from network-based attacks
* Defensive technologies
Topic 4: System Forensics and Investigation
* Digital forensics and computer forensics analysis
* Standards and U.S. laws affecting digital forensics
* Forensic methodologies and approaches
* Common forensic software programs