Professional Documents
Culture Documents
3 credit course
This course focuses on the fundamentals of information security that are used in protecting both
the information present in computer storage as well as information traveling over computer
networks. Interest in information security has been spurred by the pervasive use of computerbased applications such as information systems, databases, and the Internet. Information
security is enabled through securing data, computers, and networks. In this course, we will look
into such topics as fundamentals of information security, computer security technology and
principles, access control mechanisms, software security, physical security, and security
management and risk assessment. By the end of this course, you will be able to describe major
information security issues and trends, and advise an individual seeking to protect his or her
data.
20%
20%
20%
Information security planning and governance, information security policy, standards and
practices, the information security blueprint
Intrusion Detection and Prevention System: IDPS Terminology, why use an IDPS? , Types
of IDPS, IDPS Detection Methods, IDPS Response Behavior, Strengths & Limitations of
IDPS.
20%
Hardware Security, Smart card, Biometrics, VPNs, Operating Systems, Kerberos, Public
Key Infrastructure, security protocols
Software Security.
20%
Core Defense Mechanism: Handling User Access, Handling User Input, Handling
Attackers, Managing the Application.