ITSY-1300 Fundamentals of Information Security: Cybersecurity
Ola Jobi
Credit Fall 2024
Section(s)
ITSY-1300-009 (91212)
LEC Tu 6:00pm - 8:35pm RRC RRC2 2207.00
LAB Tu 8:35pm - 9:30pm RRC RRC2 2207.00
Course Requirements
Basic information security goals of availability, integrity, accuracy, and confidentiality.
Vocabulary and terminology specific to the field of information security are discussed.
Identification of exposures and vulnerabilities and appropriate countermeasures are
addressed. The importance of appropriate planning and administrative controls is also
discussed. Additional topics include: instruction in security for network hardware, software,
and data including physical security, backup procedures, firewalls, encryption, and protection
from viruses.
Course Subjects
Specific topic coverage includes:
-
Security Fundamentals
Threat Management and Cybersecurity Resources
Threats and Attacks on Endpoints
Endpoint and Application Development Security
Mobile, Embedded, and Specialized Device Security
Cryptography
Public Key Infrastructure and Cryptographic Protocols
Networking Threats, Assessments, and Defenses
Network Security Appliances and Technologies
Cloud and Virtualization Security
Wireless Network Security
Authentication
Incident Preparation, Response, and Investigation
Cybersecurity Resilience
Risk Management and Data Privacy
Student Learning Outcomes/Learning Objectives
At the completion of this course, the student will have demonstrated the ability to:
-
Competency #1: (1,2,3,4,5)
Information Security is Important
A Global Roadmap for Security / Tailoring A Solution that Fits
Defining Company’s Executive Roles
Defining Company Functional Security Role
-
Competency 2: (6,7,8,9,10)
Defining the Corollary Roles for Security Roles
The Data Security Competency
The Digital Forensics Competency
The Enterprise Continuity Competency
The Incidence Management Competency
-
Competency 3: (11,12,13,14,15)
IT Security Training and Awareness
Securing the IT Systems Operations and Maintenance Function
Network and Telecommunication Security
Personnel Security
Physical Security
4. Competency 4: (16,17,18,19,20)
Procurement
Legal Regulatory Compliance
The Risk Management Competency
Strategic Management
System and Application Security
Office Hours
M 8:30 PM - 9:00 PM Online
NOTEPublished: 09/15/2024 20:04:05