Course Description:

This course will cover a variety of topics that will prepare students who wish to develop skills in information security management. This is a survey course that will cover a full range of information security topics, ranging from technical areas like cryptology and network security to a policy area like risk management. The level of depth will engender an appreciation for the topics, and should stimulate an interest in taking follow-up courses to attain greater depth. The technical subjects as well as other less technical topic areas where security managers are required to lead an information security group and make sound business decisions surrounding information systems and security will be explored.

 

Learning Objectives: Upon completion of this course, the scholars will be able to:

Describe the basics of cryptology, including: historical uses, mathematical basis, types and examples of cryptography, and practical considerations for implementation.

Discuss network fundamentals and security, including: network topologies, protocols, address conservation, naming, network services, and network threats and countermeasures.

Describe several models of access control, both at a theoretical and practical level.

Understand the problems and potential solutions associated with designing and implementing operating system and application security.

Explain common practices and be able to cite some common approaches to risk management and analysis.

Understand what is required to formulate and implement a plan for incident response.

Develop processes for system evaluation and assurance and understand what frameworks are commonly used for governance and compliance activities.

Describe in depth on an information security topic of their choosing, as a result of completing the final paper or project requirement.