INSE 400 Fundamentals of Information Security
The digital revolution has created the need for a focus on information systems security. New risks, threats and vulnerabilities associated with the transformation into a digital world have emerged. A review of compliance law, best practices in IT security, principles of network security, and an overview of operation security process and methodologies are covered in this course. In addition, specific focus on application data and computer security, threat identification, vulnerability assessments, access control, identity management and cryptography is provided.
Cross Listed Courses
None
Prerequisite
MATH 200 & CPSC 210
Corequisite
None
Washington Technology University
Syllabus
INSE 400 : Fundamentals of Information Security
5 Credits
Approved: 12/2/2021 2:17:09 PM
Course Description
The digital revolution has created the need for a focus on information systems security. New risks, threats and vulnerabilities associated with the transformation into a digital world have emerged. A review of compliance law, best practices in IT security, principles of network security, and an overview of operation security process and methodologies are covered in this course. In addition, specific focus on application data and computer security, threat identification, vulnerability assessments, access control, identity management and cryptography is provided.
Course Required Resources
- Kim, D. & Soloman M. (2014). Fundamentals of Information Systems Security. Burlington, Massachusetts: Jones & Bartlett Learning
- Dulaney, E. & Easttom, C. (2018). CompTIA Security+ Study Guide: Wiley
Course Keywords
Data Breach, C-I-A Triad, Internet, TCP/IP Protocol Suite, OSI 7-layer Model, Internet of Things, VoIP, Reconnaissance, Probing, Packet Sniffer, Vulnerability Scanner, Threat, Vulnerability, Risk, Attack, Social Engineering, Phishing, Malware, DoS, SQL Injection, Backdoor, Defense in Depth, IDS/IPS, Access control, Authentication, Authorization, Accountability, Security Administration, Risk Identification, Qualitative/Quantitative Risk Assessment, Residual Risk, Benchmark, BCP, DRP, Vulnerability Testing, Penetration Testing, Logs, SEIM, Security Audit, Cipher, Ciphertext, Symmetric/Asymmetric Cipher, Hash, Cryptanalysis