Computer Security: Foundations
Description: This course is an introduction to the wide range of topics that encompasses computer security. It is designed to provide a foundation for an advanced study of issues related to digital devices, networks, data systems, cryptography, and information management. Upon completion of this executive program in cyber security, both the IT and the general business professional will be equipped to manage the wide variety of security challenges and threats faced by businesses and industries across the globe.
Description: This course covers database vulnerabilities and defenses. Students will become familiar with methods for preventing unauthorized access, leakage, or loss of data. It introduces technologies for database protection, access control, and auditing as well as best practices for database hardening. Students will explore the benefits and drawbacks of centralized and decentralized data storage through exposure to Hadoop. They will analyze government policy and regulatory compliance through an introduction to HIPAA and other regulations affecting the storage of sensitive or restricted data.
Policy, Legal, Ethics, and Compliance
Description: This course integrates law, ethics and cybersecurity. The course examines laws related to privacy, intellectual property, civil litigation, criminal prosecutions, and, of course, cybersecurity. Students will identify and analyze the policies reflected in those laws. Students will explore several applicable ethical frameworks and apply them to various scenarios. Students will examine their responsibilities related to the handling of data as it pertains to legal, ethical and/or agency auditing issues, and how the type of legal dispute (civil, criminal, private) affects the evidence used to resolve an issue.
Cybersecurity Planning and Management
Description: The ability to secure information within a modern enterprise is a growing challenge. Threats to information security are global, persistent, and increasingly sophisticated. Effective information security requires participation, planning, and practice. This course is designed to teach students the basics of information security, in both the management aspect and technical aspect. The course addresses a range of topics, each of which is vital to securing the modern enterprise. These topics include plans and policies, enterprise roles, security metrics, risk management, standards and regulations, physical security, and business continuity. The course will emphasize the practical implications of cybersecurity management through the application and study of timely examples.
Description: This course aims to provide configuration guidelines for network infrastructure security. It first reviews the key components of a network infrastructure, and then points out the differences between information security and infrastructure security. Network Infrastructure includes network devices such as routers, firewalls, switches, servers, workstations, and other devices, as well as, the software running on these devices. This course will highlight the technologies and security methods that make sure that every time a configuration is changed or new device is added, a security hole is not created in the network.
Building Secure Web Applications
Description: Secure web applications are essential to the successful operation of business operations and are a prime concern of the IT professional. This course is a hands-on study of the policies and techniques required to design, implement, and manage secure web systems and protect related data structures. It is intended for business professionals who have an interest in defending their organizations web assets. Topics to include: threat awareness and identification, application and server vulnerabilities, testing and defense strategies.
Description: Cloud computing introduces new privacy and security risks that are not present in traditional data centers. This course is about these concerns and the appropriate policies and responses for a cloud environment. The course begins with an overview of cloud computing and virtualization which provides the necessary background for understanding these issues. Additional topics include access control, identity management, denial of service, account and service hijacking, secure APIs, malware, forensics, regulatory compliance, trustworthy computing, and secure computing in the cloud.
Description: This course is designed to teach students to help identify potential threats on a computer or network. An ethical hacker attempts to systematically penetrate a computer system by bypassing system security and by searching for weak points that could be exploited by malicious hackers. This information may then be used by an organization to improve overall system security. Working with both hardware and software developers, ethical hackers work to uncover the security vulnerabilities that a malicious hacker could potentially exploit.
Description: This course provides information system users with the knowledge of their roles and responsibilities towards protecting information system assets. Topics will include workstation and office security, types of malicious programs such as viruses, access control mechanisms, IT governance and security management. This course will also lay a foundation for students to pursue further studies of systems security and protection issues such as terminology, threats to information resources, computer abuse, and system vulnerabilities. This course will map to many topics included in the CompTIA Security+ Certification.
Digital Forensics Tools and Techniques
Description: This course will introduce the principles of collection, preservation, examination, and analysis of computer evidence. Students will learn the evolving law of acquiring and analyzing digital evidence from computers and devices. Additional topics will include: computer crime, intellectual property, privacy, risks, vulnerabilities, countermeasures, and the presentation of legal evidence in a court of law. National and International standards for privacy and data rights will be discussed along with personal data security at border crossings. This course will cover a brief history of gray hat hacking and will include both theoretical and practical labs.