The course provides an overview of computer security topics, with a focus on understanding the most common threat types and implementing basic protection systems for device, data, and network protection. I discuss proven techniques for protecting information systems from intruders while allowing the required access to authorized users. This course is designed to provide an overall view of security in the modern information world.
Course Learning Outcomes
•Upon successful completion of this course, students will be able and demonstrate proficiency in the following areas to:
•Identify security threat types
•Develop basic security policies
•Develop strategies for the protection of information systems
•Implement attack mitigation procedures and techniques
•Identify host based security strategies ( servers and workstations)
•Identify the strengths and weaknesses of perimeter protection (firewalls)
•Assess the effectiveness of various intrusion detection techniques
•Plan intrusion response strategies
•Describe security audit and monitoring methodologies
•Cyberstalking, fraud, and abuse
•DoS attacks
•Malware
•Hacking techniques
•Industrial espionage in cyberspace
•Encryption
•Computer security technology
•Security policies
•Network scanning and vulnerability scanning
•Cyber terrorism and information warfare
•Locating information relevant to an investigation online
•Forensic