INSE 405 Internet Security
The Internet enables communication over vast distances and allows us to share ideas in ways we couldn’t before. From e-commerce to the arts and mass media, the Internet has become an invaluable resource for collaboration. With this unprecedented opportunity comes new risks to our privacy and security. This class provides an overview of the risks, vulnerabilities, and threats exposed by the Internet and its applications. It provides mitigations to both infrastructure and applications that rely on the Internet for their function. Specific focus on web application data and computer security is provided.
Cross Listed Courses
None
Prerequisite
All Technology Core courses
Corequisite
None
Washington Technology University
Syllabus
INSE 405 : Internet Security
5 Credits
Approved: 12/2/2021 2:17:09 PM
Course Description
The Internet enables communication over vast distances and allows us to share ideas in ways we couldn’t before. From e-commerce to the arts and mass media, the Internet has become an invaluable resource for collaboration. With this unprecedented opportunity comes new risks to our privacy and security. This class provides an overview of the risks, vulnerabilities, and threats exposed by the Internet and its applications. It provides mitigations to both infrastructure and applications that rely on the Internet for their function. Specific focus on web application data and computer security is provided.
Course Required Resources
- Harwood, M. (2016). Internet Security: How to Defend Against Attackers on the Web. Burlington, Massachusetts: Jones & Bartlett Learning.
- Samani, R., Honan, B., Reavis, J., In Jirasek, V., & CSA (Organization),. (2015). CSA guide to cloud computing: Implementing cloud privacy and security.
Course Keywords
Auditing, Client-server, Cloud computing, HTML, HTTP, Packet switching, Virtualization, VPN, Clickjacking, Malware, Pretexting, Ransomware, Social Engineering, Advanced Encryption Standard (AES), Digital Certificate, JavaScript, Web application, Vulnerability management, PCI, Resource pooling, Elasticity, Private Cloud, IaaS, PaaS, SaaS, STARS, Service level agreements, Integration testing, Security testing, Stress testing, Security assessment, Nmap, OS fingerprint, Nessus, Vulnerability assessment, Web server application, Data leakage, Client-side injection, VoIP, Active server pages (ASP), Business intelligence, Deep web, Computer incident response team, Common Vulnerabilities and exposures (CVE) List, Honeypot, Cloud threat landscape, Notorious nine, Provider vulnerability, Malicious insiders, CSA framework, ISO/IEC 27001, FISMA, FedRAMP