INSE 400 Fundamentals of Information Security

The digital revolution has created the need for a focus on information systems security.  New risks, threats and vulnerabilities associated with the transformation into a digital world have emerged. A review of compliance law, best practices in IT security, principles of network security, and an overview of operation security process and methodologies are covered in this course.  In addition, specific focus on application data and computer security, threat identification, vulnerability assessments, access control, identity management and cryptography is provided.

Credits

5

Cross Listed Courses

None

Prerequisite

MATH 200 & CPSC 210

Corequisite

None

Washington Technology University

Syllabus

INSE 400 : Fundamentals of Information Security

5 Credits

Approved: 12/2/2021 2:17:09 PM

Course Description

The digital revolution has created the need for a focus on information systems security.  New risks, threats and vulnerabilities associated with the transformation into a digital world have emerged. A review of compliance law, best practices in IT security, principles of network security, and an overview of operation security process and methodologies are covered in this course.  In addition, specific focus on application data and computer security, threat identification, vulnerability assessments, access control, identity management and cryptography is provided.

Course Required Resources

  • Kim, D. & Soloman M. (2014). Fundamentals of Information Systems Security. Burlington, Massachusetts: Jones & Bartlett Learning
  • Dulaney, E. & Easttom, C. (2018). CompTIA Security+ Study Guide: Wiley

Course Keywords

Data Breach, C-I-A Triad, Internet, TCP/IP Protocol Suite, OSI 7-layer Model, Internet of Things, VoIP, Reconnaissance, Probing,  Packet Sniffer, Vulnerability Scanner, Threat, Vulnerability, Risk, Attack, Social Engineering, Phishing, Malware, DoS, SQL Injection, Backdoor, Defense in Depth, IDS/IPS, Access control,  Authentication, Authorization, Accountability, Security Administration, Risk Identification, Qualitative/Quantitative Risk Assessment, Residual Risk, Benchmark, BCP, DRP, Vulnerability Testing, Penetration Testing, Logs, SEIM, Security Audit, Cipher, Ciphertext, Symmetric/Asymmetric Cipher, Hash, Cryptanalysis