Information Technology Security (ITSY 1342)

Instructor: Hien Nguyen

Course Description: IT Security - this course addresses the broad topic of security challenges and strategies of countermeasure in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity, and confidentiality aspects of information systems.

 

Course Objectives:

 

  1. Explain concepts of information systems security as applied to an IT infrastructure.
  2. Describe how threats, and vulnerabilities impact an IT infrastructure.
  3. Explain the role of access controls in implementing a security policy.
  4. Explain role of operations & administration in implementation of security policy.
  5. Explain importance of security audits, testing, & monitoring to security policy.
  6. Describe principles of risk management, common response techniques, and issues related to recovery of IT systems.
  7. Explain how businesses apply cryptography in maintaining information security.
  8. Analyze the importance of network principles and architecture to security operations.
  9. Explain the means attackers use to compromise systems and networks and defenses used by organizations.
  10. Apply international and domestic information security standards and compliance laws to real-world implementation in both the private and public sector.
  11. Summarize the basic principles of computer forensics.
  12. Summarize important laws regarding computer forensics.
  13. Describe various computer crimes and how they are investigated.
  14. Describe digital forensic methodology and labs.
  15. Outline the proper approach to collecting, seizing, and protecting evidence.
  16. Explain techniques for hiding and scrambling information as well as how data is recovered.
  17. Summarize various types of digital forensics.
  18. Explain how to perform a network analysis.
  19. Describe incident and intrusion response.
  20. Identify trends in and resources for digital forensics.