In this course students will learn the fundamentals of
information security including design and implementation of secure systems,
security assessment, and computer security ethics. Students will utilize a
variety of cutting edge technologies and labs in many hands-on learning
activities.
Course Outlines:
· The History of Information
Security
o
Information Security Defined
o
Key Information Technology
o
Concepts
· Information Assurance
· Critical Characteristics
of Information
o
Availability, Accuracy, Authentication, Confidentiality, Integrity,
· Non-repudiation, Utility,
and Possession
· Components of an
Information System
o
Securing the Components
· Attacks and Threats
o
Malware and Social Engineering Attacks
o
Attacks Using Malware
o
Social Engineering Attacks
o
Psychological Approaches
o
Physical Procedures
o
Key Terms
o
Application and Network Attacks
o
Application Attacks
§ Web Application Attacks
§ Client-Side Attacks
§ Buffer Overflow Attacks
§ Network Attacks
§ Denial of Service (DoS)
§ Interception
§ Poisoning
Share course with your friends
Cookies and similar technologies are used on our sites to personalize content and ads. You can find further details and change your personal settings below. By clicking OK, or by clicking any content on our sites, you agree to the use of these cookies and similar technologies.
When you visit any of our websites, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and manage your preferences. Please note, that blocking some types of cookies may impact your experience of the site and the services we are able to offer.