INSE 405 Internet Security

The Internet enables communication over vast distances and allows us to share ideas in ways we couldn’t before.  From e-commerce to the arts and mass media, the Internet has become an invaluable resource for collaboration.  With this unprecedented opportunity comes new risks to our privacy and security. This class provides an overview of the risks, vulnerabilities, and threats exposed by the Internet and its applications.  It provides mitigations to both infrastructure and applications that rely on the Internet for their function.  Specific focus on web application data and computer security is provided.

Credits

5

Cross Listed Courses

None

Prerequisite

All Technology Core courses

Corequisite

None

Washington Technology University

Syllabus

INSE 405 : Internet Security

5 Credits

Approved: 12/2/2021 2:17:09 PM

Course Description

The Internet enables communication over vast distances and allows us to share ideas in ways we couldn’t before.  From e-commerce to the arts and mass media, the Internet has become an invaluable resource for collaboration.  With this unprecedented opportunity comes new risks to our privacy and security. This class provides an overview of the risks, vulnerabilities, and threats exposed by the Internet and its applications.  It provides mitigations to both infrastructure and applications that rely on the Internet for their function.  Specific focus on web application data and computer security is provided.

Course Required Resources

  • Harwood, M. (2016). Internet Security: How to Defend Against Attackers on the Web. Burlington, Massachusetts: Jones & Bartlett Learning.
  • Samani, R., Honan, B., Reavis, J., In Jirasek, V., & CSA (Organization),. (2015). CSA guide to cloud computing: Implementing cloud privacy and security.

Course Keywords

Auditing, Client-server, Cloud computing, HTML, HTTP, Packet switching, Virtualization, VPN, Clickjacking, Malware, Pretexting, Ransomware, Social Engineering, Advanced Encryption Standard (AES), Digital Certificate, JavaScript, Web application, Vulnerability management, PCI, Resource pooling, Elasticity, Private Cloud, IaaS, PaaS, SaaS, STARS, Service level agreements, Integration testing, Security testing, Stress testing, Security assessment, Nmap, OS fingerprint, Nessus, Vulnerability assessment, Web server application, Data leakage, Client-side injection, VoIP, Active server pages (ASP), Business intelligence, Deep web, Computer incident response team, Common Vulnerabilities and exposures (CVE) List, Honeypot, Cloud threat landscape, Notorious nine, Provider vulnerability, Malicious insiders, CSA framework, ISO/IEC 27001, FISMA, FedRAMP