Course outline please see the student handbook to reference the universitys grading scale. Course materials from all presentations 90 day access to the archived course includes videos, discussion boards, content, and wiki course description this online program will explore fundamental technologies and applications in cybersecurity. Practical network defense pnd closes the gap between network attack and defense. Topics covered include cryptography, confidentiality and. Incomparable course instructors and authors who are industry experts and practitioners fighting the same cyber battles as you and discovering new ways to thwart attacks. Scroll down or click on the link below to see the outlines for the current information security course offerings. Ccna security syllabus describe the security threats facing modern network infrastructures describe and list mitigation methods for common network attacks describe and list mitigation methods for worm, virus, and trojan horse attacks describe the cisco self defending network architecture secure cisco routers secure cisco routers using the sdm security audit feature. This course is designed to introduce students to the fundamentals of network security in preparation for advanced courses. At least 50 percent of the training course content must relate to one or more of the exam objectives for the certification youre renewing. A hacked computer can be used to select all that apply a record keystrokes and steal passwords. The course gives basic knowledge in the security area, i. Through communication, ideas are formed, revised, borrowed, and developed.
Course schedule, duration and cost the security guard training course length may differ from province to province. Course advice one must know the basics of relational databases before taking this course. The free online course has been developed by the open university in conjunction with bis, gchq and the cabinet office. Applied network security download pdf course schedule. Prospective students searching for comptia security plus t certification.
This course provides an introduction to data warehouse design. Course outline this course is an introduction to the broad field of computer, network, and information security. Fins3641 security analysis and valuation course outline. Network security entails protecting the usability, reliability, integrity, and safety of network and data. Power supply for camera connectors bnc rca power connectors dvr structure front and back panel of dvr. Submit the following documentation to receive ceus for a training course. Here five cybersecurity themes are described for inclusion into computing science and itrelated degrees, along. The purpose of intrusions can be to change or delete resources data, programs, hardware, etc, to get unauthorized access to confidential. Algorithms for encryption, cryptography, authentication, key exchange protocols, virus detection, database security, and secure internet communication. Computer security eda263 dit 641 course introduction.
Course overview describe how the course will flow and how topics will be. Students become more engaged in the learning process if they can see the relevance of their studies to professional, disciplinary andor personal contexts. Course outline page 1 of 2 september 2, 2011 ece 4540 wireless networks course outline fall term 2011 course objectives the objective of this course is to give an introduction to the fundamentals of the wireless communications systems, the wireless network architectures, protocols, and applications. Security issues in the realm of computers, communications, and the internet. We would like to show you a description here but the site wont allow us. Network security paper outline florida state university. If you need to verify course textbooks, please refer to the online course description through your student portal. Sample course syllabus 1 course descriptionoverview the ability to secure information within a modern enterpriselarge or smallis a growing challenge. Since 1964 the advent of largescale digital computers and the space program have made digital image processing one of the most rapidly growing fields in electrical engineering. This module is the second level module of the curricula related to the computer network field that provides in depth coverage of some basic topics taught in the first level course 750341 such as layered communication architecture, routing algorithms, congestion control algorithms. Course outline cis284ns network security fundamentals.
They are provided at this time to assist you in planning for the course. Ccna security syllabus describe the security threats facing modern network infrastructures describe and list mitigation methods for common network attacks describe and list mitigation methods for worm, virus, and trojan horse attacks. It is against district policy for any manager, supervisor, faculty, staff or student to engage in discrimination of any member of the college community based on race, color, religion, ethnicity, national origin, age, sex, gender. The outline should highlight the papers topic and detail the approach the student will take in presenting the material. Cybersecurity massachusetts institute of technology. Infs3774 information systems security course outline semester.
Infomgmt 292 or infosys 222 and infomgmt 192, infosys 280, compsci 101 or an equivalent course. Cosc235 introduction to network security fall 2014. Earn 23 nasba credits live, inclass training only oneonone after course instructor coaching. Program outline found the links, articles, and information on this page helpful. Tuition can be paid later by invoice or at the time of checkout by credit card. This course introduces students to network security. The project in this course is an openended research project, ideally done in groups of two.
The course will introduce students to the main theories and approaches to security through historical and contemporary security issues. There is no one book that covers all the topics considered in this course. Upon completion of this course the learner will be able to. January 27, 2016 may 11, 2016 meeting timelocation.
Infs3774 information systems security course outline. Student learning outcomeslearning objectives at the completion of this course, the student will have demonstrated the ability to. It is through argument, description, explanation, and improvisation within a community that individual learning flourishes. The field of security studies has widened significantly over the past 25 years, moving from purely military questions to other issues such as the environment or migration, and from a systemic or statelevel. Federal virtual training environment fedvte comptia. Students will be required to research assigned topics, collect documentation, edit references, write an analysis of a proposed course of action, and support a recommended course of action in an oral briefing with graphic slides. Threats to information security are global, persistent, and increasingly sophisticated. The course will look at the security policies, models and mechanisms related to confidentiality, integrity, authentication, identification, and availability issues related to information and information systems. This course syllabus is from a previous semester archive and serves only as a preparatory. This course will develop skills in research, editing, writing, and presentations. Infs3774 information systems security course outline semester 1, 2016 part a. E this short lecture describes the organization of the course, an outline of the topics from the syllabus, and gives a timeline of notable computer security events. Sample course syllabus 1 course descriptionoverview. The course should help students to understand the mindsets of attackers the bad guys and gals who do malicious things on the network and system designers and defenders the good guys.
Power supply for camera connectors bnc rca power connectors dvr structure. Ece 4540 wireless networks course outline fall term 2011. Course objectives administrivia network security course. Properly document crimes and disciplinary referrals on the appropriate forms and forward them to the csa department head. The learning outcomes in this course also help you to achieve some of the overall. In addition to students learning the fundamental content of the course, the content is designed to foster critical thinking and to facilitate the acquisition of lifelong learning skills. Network security is not only concerned about the security of the computers at each end of the communication chain. The purpose of intrusions can be to change or delete resources data, programs, hardware, etc, to get unauthorized access to confidential information or unauthorized use of the systems. This introductory course will impart a broad understanding of the underpinnings of security techniques, security best practices, and computer security research. In particular, the assignments and due dates will change. This course is an authorized training program for security guard training in accordance with ontario guidelines by the psisa. Course requirements itsy 0 information security fall 2012 section 004 rio grande campus lecture sa 9. Learn to defend your network from real world attacks with this handson it security training course.
Network security paper outline as part of the papers required for the course, students will submit a one page proposed outline of their paper as scheduled on the course calendar. Week topic course objectives readings assignment 1 introduction to cyberspace and national security policy co 1 assess the importance of cyber to us national security. Example application of the themes to course modules by year applicable themes applicable themes applicable themes for each of the modules presented here, the course designer can select the core concepts, principles and learning outcomes to match the level of the course and the topics covered. Network security training learning tree international. Course specific information please consult part b for key information on business school policies including those on plagiarism and special consideration, student responsibilities and student support services. Free online cyber security training introduction to cyber security mooc the new introduction to cyber security massive open online course mooc will begin its first run on october. Training that strengthens a students ability to achieve a giac certification, which is unique in the field of information security. Understand how information security can counteract attempts to attack an individuals infosphere, the persons sensitive information. Here are some reference books that will be recommended for the course. Long gone are the days when managers could hope to secure the enterprise through ad hoc means.
We will cover both computer security including such topics as security policies, access control, viruses, etc. Detailed description outline of the training content 2. Your final grade for the course will be based on the following weights. This course requires full participation including active listening. Effective learning is supported when students are actively engaged in the learning process. Models of security policies and computer systems certification. The course outline is being updated from fall 2004, and will change. Course locations training is available for individuals or groups at your workplace, or at stateoftheart commissionaires training centres across canada.
Practical network defense training course pnd elearnsecurity. By examining security challenges in hardware, software. Business school school of information systems, technology. Issues in data warehouse planning, design, implementation, and administration are discussed in a seminar format. Cen 5410 computer and network security last modified 20.
All the relevant books are still being checked to see if one can be used as the main text book. Hood community college promotes nondiscrimination by maintaining a respectful working and learning environment free of all forms of discrimination and harassment. Receive information about a campus crime from a member of the general public. Management of information security 15 points semester 1, 1203 course prescription an overview of activities, methods, methodologies, and procedures related to establishing. Ece643 digital image processing i course outline yun q. This document is designed to provide course designers with a manual to help them embed cybersecurity into degree modules and associated syllabi. Course description this course covers fundamental issues and first principles of security and information assurance. Once this course has been completed in its entirety, vista will forward each students information to the psisb so the student is authorized to write the security licence test. Earn 23 nasba credits live, inclass training only oneonone aftercourse instructor coaching. It is against district policy for any manager, supervisor, faculty, staff or student to engage in discrimination of any member of the college community based on race, color, religion, ethnicity, national origin, age, sex. Learn information tools used to assist organizational and operational decisionmakers and how to handle data to better assist your decisionmaking. Goals of the course the goals of this course are to introduce students to. By examining case studies and reading seminal research papers, students will learn about network attacks and vulnerabilities as well as current defenses.741 832 54 939 1385 205 100 1168 259 1058 1615 1574 539 1029 56 989 92 1335 1269 1268 283 1056 780 449 5 1642 1149 975 139 499 1638 382 1113 408 464 1336 1094 1387 465 171 1220