Department of Computer & Information Sciences. CSCI-342: Introduction to Information Security Syllabus
|
|
- Philippa Page
- 5 years ago
- Views:
Transcription
1 Department of Computer & Information Sciences CSCI-342: Introduction to Information Security Syllabus Course Description This course provides an introduction to the various basic technical and administrative aspects of Information Security, and addresses the foundation for understanding the key issues associated with protecting information assets, determining the levels of protection and response to security incidents, and designing security mechanisms. The purpose of the course is to provide the student with an overview of the field of Information Security. Students will be exposed to the spectrum of Security activities, methods, methodologies, and procedures. Topics covered include: systems security, secure software life cycle, risk analysis, operating system security, database security, network security, and system threats, programming and testing for software security. Textbook Richard E. Smith, Elementary Information Security, 1 st Edition, Jones & Bartlett Learning, ISBN: , Recommended Supplement M. Goodrich and R. Tamassia, Introduction to Computer Security, 1 st Edition, Addison Wesley, ISBN: , M. Bishop, Computer Security: Art and Science, Addison Wesley, ISBN: , W. Stallings, Computer Security: Principles and Practice, 2 st Edition, Prentice Hall, ISBN: , M. Stamp, Information Security: Principles and Practice, 2 st Edition, Wiley, ISBN: , M. E. Whitman and H. J. Mattord, Principles of Information Security, 4 st Edition, Course Technology, ISBN: , Prerequisite CSCI-350: Operating Systems Major Topics 1. Overview 1.1. The Security Landscape 1.2. Process Example: Bob s Computer 1.3. Identifying Risks 1.4. Prioritizing Risks
2 1.5. Ethical Issues in Security Analysis 1.6. Security Example: Aircraft Hijacking 2. Controlling a Computer 2.1. Computers and Programs 2.2. Programs and Processes 2.3. Buffer Overflow and The Morris Worm 2.4. Access Control Strategies 2.5. Keeping Processes Separate 2.6. Security Policy and Implementation 2.7. Security Plan: Process Protection 3. Controlling Files 3.1. The File System 3.2. Executable Files 3.3. Sharing and Protecting Files 3.4. Security Controls for Files 3.5. File Security Controls 3.6. Patching Security Flaws 3.7. Process Example: The Horse 4. Sharing Files 4.1. Controlled Sharing 4.2. File Permission Flags 4.3. Access Control Lists 4.4. Microsoft Windows ACLs 4.5. A Different Trojan Horse 4.6. Phase Five: Monitoring The System 5. Storing Files 5.1. Phase Six: Recovery 5.2. Digital Evidence 5.3. Storing Data on a Hard Drive 5.4. FAT: An Example File System 5.5. Modern File Systems 5.6. Input/Output and File System Software 6. Authenticating People 6.1. Unlocking a Door 6.2. Evolution of Password Systems 6.3. Password Guessing 6.4. Attacks on Password Bias 6.5. Authentication Tokens 6.6. Biometric Authentication 6.7. Authentication Policy 7. Encrypting Files 7.1. Protecting the Accessible 7.2. Encryption and Cryptanalysis 7.3. Computer-Based Encryption 7.4. File Encryption Software 7.5. Digital Rights Management 8. Secret and Public Keys 8.1. The Key Management Challenge 8.2. The Reused Key Stream Problem 8.3. Public-key Cryptography
3 8.4. RSA: Rivest-Shamir-Adleman 8.5. Data Integrity and Digital Signatures 8.6. Publishing Public Keys 9. Encrypting Volumes 9.1. Securing a Volume 9.2. Block Ciphers 9.3. Block Cipher Modes 9.4. Encrypting a Volume 9.5. Encryption in Hardware 9.6. Managing Encryption Keys 10. Connecting Computers The Network Security Problem Transmitting Information Putting Bits on a Wire Ethernet: A Modern LAN The Protocol Stack Network Applications 11. Networks of Networks Building Information Networks Combining Computer Networks Talking Between Hosts Internet Addresses in Practice Network Inspection Tools 12. End-to-End Networking Smart Versus Dumb Networks Internet Transport Protocols Names on the Internet Internet Gateways and Firewalls Long Distance Networking 13. Enterprise Computing The Challenge of Community Management Processes Enterprise Issues Enterprise Network Authentication Contingency Planning 14. Network Encryption Communications Security Crypto Keys on a Network Crypto Atop the Protocol Stack Network Layer Cryptography Link Encryption on Wireless Encryption Policy Summary 15. Internet Services and Internet Services Internet Security Problems Enterprise Firewalls Enterprise Point of Presence 16. The World Wide Web Hypertext Fundamentals
4 16.2. Basic Web Security Dynamic Web Sites Content Management Systems Ensuring Web Security Properties 17. Governments and Secrecy Secrecy In Government Classifications and Clearances National Policy Issues Communications Security Data Protection Trustworthy Systems Learning Outcomes Grading A student completing this course is expected to be able to: 1. State the basic concepts in information security, including security policies, security models, and security mechanisms. 2. Explain the concepts of malicious code, including virus, Trojan horse, and worms. 3. Explain the basic mechanisms for various cryptographic systems. 4. Explain common vulnerabilities in computer programs, including buffer overflow vulnerabilities, time-of-check to time-of-use flaws, incomplete mediation. 5. Outline the requirements and mechanisms for identification and authentication. 6. Explain issues about password authentication, including dictionary attacks (password guessing attacks), password management policies, and one-time password mechanisms. 7. Explain and compare security mechanisms for conventional operating systems, including memory, time, file, object protection requirements and techniques and protection in contemporary operating systems. 8. Explain the requirements for trusted operating systems, and describe the independent evaluation, including evaluation criteria and evaluation process. 9. Describe threats to networks, and explain techniques for ensuring network security, including encryption, authentication, firewalls, and intrusion detection. Letter Grade A B C D F 0 59 Evaluation Procedures Homework Assignment 20% Quiz 10% Midterm Exam 10% Final Exam 20%
5 Project &Presentation 40% Projects The group projects will involve setting up systems and writing programs that demonstrate important concepts and mechanisms introduced in the classes. The most common reason for not doing well on projects is not starting them early enough. You will be given plenty of time to complete each project. However, if you wait until the last minute to start, you may not be able to finish. Start early and plan to have it finished a few days ahead of the due date. Many unexpected problems typically arise during programming, particularly when debugging. You should plan for these things to happen. The department computer lab will be available for project work. We will also make an environment available for you that can be used to work on projects on your own computer. Your lack of staring early is not an excuse for turning in your project late, including having your computer crash. There are a number of sources for help. This includes office hours, and discussion groups on the class website. Group Rules: each group is to have a maximum 2 people. This means that you can work on your project individually or with another person. If you work in a group of two, you may collaborate on ONLY with your group member and not with a member of another group. Group selection is made by ing the instructor by the 3 rd class meeting. Once you select a group member, you may not change group membership. Each project submitted by a group will include a separate submission by each group member indicating a percentage describing each group member s contribution. Equal contribution means each member (in a 2 person group) contribute 50%. Anything different from equal contribution will result in a reduction in grade from the group member who contributes less and an increase in grade for the group member who contributes more. The oral class presentation will be done in groups of 2. If there are an odd number of students registered for the class, a single student will have the option of either presenting individually or joining a group (making a single group of 3). Homework All work will be submitted electronically. Homework and Projects are due at 11:59 PM on the due date described in the assignments. Late policy is as follows: 10% grade penalty for one day of lateness 50% grade penalty for two days of lateness A grade of zero for >2 days of lateness Note: plagiarism, copying, or cheating of any kind will result in a minimum of an F in the course for all parties involved and a maximum of expulsion from the University should I warrant the need to report it to the Student Judicial Affairs office. Attendance Policy Attendance is mandatory. It is the responsibility of the student to ensure that they sign the signin sheet prior to leaving class. Students that have not signed the sign-in sheet will be considered absent even if they attended class for that day. Students are allowed a maximum of two unexcused absences during the semester. Students that have more than two unexcused absences but less than or equal to four unexcused absences will have their course average reduced by five points. In addition, for each unexcused absence above four, students will receive an additional two points off from their course average.
6 Excused absences require documentation from an authorized party. An absence due to medical reasons will require a note or document from a medical practitioner or institution. Where possible, permission to be absent from class should be obtained in advance. Attempting to obtain permission for being absent after the fact and without proper documentation is not acceptable. Cell Phone Policy Cell phones should be turned off or in silent mode and should be tucked away somewhere not visible to anyone, especially to the instructor. Students will receive a warning on their first infraction of this policy and will be asked to leave the class on each additional infraction and considered absent. In addition, the student will receive an F on any graded work that is due or carried out on that day. Under no circumstance is a student to use the phone in class in any capacity. This includes text messaging! Students that leave the class to talk on their cell phones will not be allowed to return to class. This policy is in effect from the start of class until the instructor dismisses the class. Test Taking Policy During a scheduled exam or quiz, you are required to clear all material from the desk or table prior to beginning your exam or quiz. All books, bags, and other personal material should be placed on the floor. Cell phone policy remains in effect during an exam or quiz. This means that the use of a cell phone without permission from the instructor will result in a zero. Please make sure to use the restroom prior to beginning your exam. If you must use the rest room during the exam, you will need to submit your exam or quiz and it will be graded as is. Cheating and Collaboration Policy Collaboration is a healthy and constructive way to learn and accomplish tasks. Unfortunately, many students often do not realize that what they believe to be collaboration is actually cheating. Cheating on assignments or projects does not benefit anyone, especially you, and undermines our trust. Because the line between collaboration and cheating can get confusing for students, especially those not exposed to proper collaboration behavior, you are asked to carefully consider what is discussed in this section; however, the rule of thumb should always be that when in doubt about whether a particular action can be considered cheating, ask your instructor. In this course, engaging directly with one another on assignments and projects can only enhance the learning process. But how you engage is very important. Discussing assignments and projects at a conceptual level, helping with conceptual bugs in code, or discussing lecture and text material is acceptable. When you turn in assignments, the content must be completely yours! Exceptions occur when your instructor allows you to use material in the public domain; however, you will be required to reference the work. For the purpose of this course, using snippet of code from classmates accomplishes nothing! In the end, it is about what you have learned. Your grade means absolutely nothing to anyone once they figure out you cannot program. In the same token, helping someone by looking at their code, more often than none, leads to copying at some level. Please note that this is not the same as looking at someone else s code to learn to become a better programmer. In general, you are better off asking your instructor prior to looking at another classmate s code. Verbal collaboration is generally acceptable. Examples of acceptable collaboration: Discussing ambiguities in assignments or course materials to gain a better understanding of them; Providing assistance with Java, either in using the system facilities or with debugging tools. Discussing and explaining code provided in the course.
7 Obtaining help on general programming issues (i.e. what does a specific error mean?); As a general rule, if you do not understand or cannot explain what you are handing in, or if you have written the same code as someone else, you are probably cheating. If you have given somebody some code, simply so that it can be used in that person's project, you are probably cheating. Here are some examples of clear cases of cheating: Copying files or parts of files (such as source code, written text, or unit tests) from another person or source. Copying (or retyping) files or parts of files with minor modifications such as style changes or minor logic modifications. Allowing someone else to copy your code or written assignment in any form. Getting help from someone whom you do not acknowledge on your solution. The policies in this section were adapted from those instituted in the Computer Science Department at Carnegie Mellon University.
Syllabus for CIT 442 Information System Security 3 Credit Hours Spring 2015
Syllabus for CIT 442 Information System Security 3 Credit Hours Spring 2015 I. COURSE DESCRIPTION An overview of information system security to include managing security, protecting information technology
More informationNetwork Security
44-555 Network Security Instructor: Scott Bell Office: 2220 Colden Hall Email: sbell@nwmissouri.edu Phone: (660) 562-1699 Description: An introduction to the fundamentals of network security, including
More informationCSE Computer Security (Fall 2007)
CSE 543 - Computer Security (Fall 2007) Lecture 1 - Introduction Professor: Trent Jaeger URL: http://www.cse.psu.edu/~tjaeger/cse543-f07/ Some bedtime stories This course We are going to explore why these
More informationFaculty of Science & Information Technology
Faculty of Science & Information Technology Department: Computer Science COURSE SYLLABUS Short Description Student s Copy One copy of this course syllabus is provided to each student registered in this
More informationRYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education
RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education COURSE OF STUDY 2017-2018 (C)ITM 820 Information Systems Security and Privacy
More informationStandard Course Outline IS 656 Information Systems Security and Assurance
Standard Course Outline IS 656 Information Systems Security and Assurance I. General Information s Course number: IS 656 s Title: Information Systems Security and Assurance s Units: 3 s Prerequisites:
More informationHOLY ANGEL UNIVERSITY COLLEGE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY CYBER SECURITY COURSE SYLLABUS
HOLY ANGEL UNIVERSITY LLEGE OF INFORMATION AND MMUNICATIONS TECHNOLOGY CYBER SECURITY URSE SYLLABUS Course Code : 6CSEC Prerequisite : 6MPRO2L Course Credit : 3 Units (2 hours LEC,3 hours LAB) Year Level:
More informationEEL DATA NETWORKS, SYSTEMS, AND SECURITY Fall 2016
EEL 6935 - DATA NETWORKS, SYSTEMS, AND SECURITY Fall 2016 Objectives The objective of this course is to provide a technical and operational introduction to data/computer communication networks. Students
More informationAdvanced Relational Database Management MISM Course S A3 Spring 2019 Carnegie Mellon University
Advanced Relational Database Management MISM Course S19-95736 A3 Spring 2019 Carnegie Mellon University Instructor: Randy Trzeciak Office: HBH 1104C Office hours: By Appointment Phone: 412-268-7040 E-mail:
More informationCS 241 Data Organization using C
CS 241 Data Organization using C Fall 2018 Instructor Name: Dr. Marie Vasek Contact: Private message me on the course Piazza page. Office: Farris 2120 Office Hours: Tuesday 2-4pm and Thursday 9:30-11am
More informationDatabase Security MET CS 674 On-Campus/Blended
Database Security MET CS 674 On-Campus/Blended George Ultrino gultrino@bu.edu Office hours: by appointment Course Description The course provides a strong foundation in database security and auditing.
More informationAdvanced Relational Database Management MISM Course F A Fall 2017 Carnegie Mellon University
Advanced Relational Database Management MISM Course F17-95736A Fall 2017 Carnegie Mellon University Instructor: Randy Trzeciak Office: HBH 1104C Office hours: By Appointment Phone: 412-268-7040 E-mail:
More informationISM 324: Information Systems Security Spring 2014
ISM 324: Information Systems Security Spring 2014 Instructor: Co-Instructor: Office: E-Mail: Phone: Office Hours: Jeffrey Wall Hamid Nemati 392 Bryan Building jdwall2@uncg.edu (email is the preferred method
More informationEEC-484/584 Computer Networks
EEC-484/584 Computer Networks Lecture 1 Wenbing Zhao wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) What is Computer Network? A group of
More informationThe University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus
The University of Jordan Accreditation & Quality Assurance Center COURSE Syllabus 1 Course title Computer Security 2 Course number 1901463 Credit hours (theory, practical) 3 3 Contact hours (theory, practical)
More informationSan José State University School/Department Computer Science 265: Cryptography and Computer Security, Fall 2017
Course and Contact Information Instructor: Auston Davis Office Location: MacQuarrie Hall 217 Telephone: 650-454-6044 Email: Office Hours: Class Days/Time: auston.davis@sjsu.edu (preferred) Mon 6pm 7pm
More informationCOURSE OUTLINE. Last Amendment Edition Procedure No. Lecturer /blog Room No. Phone No. / Name.
FACULTY OF COMPUTING Page 1 of 6 COURSE 0 PRE-REQUISITE none EQUIVALENCE CONTACT HOURS 4 Lecturer e-mail/blog Room No. Phone No. 1. Dr. Siti Hajar Othman hajar@utm.my / www.comp.utm.my/hajar 347-04, N8
More informationCSE 544 Advanced Systems Security
Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA CSE 544 Advanced Systems
More informationMORGAN STATE UNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING COURSE SYLLABUS FALL, 2015
MORGAN STATE UNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING COURSE SYLLABUS FALL, 2015 CATALOG DESCRIPTION ONLINE EEGR.483 INTRODUCTION TO SECURITY MANAGEMENT CREDITS: 3 THIS COURSE IS A
More informationSyllabus for HPE 021 Advanced Golf and Fitness 1 Credit Hour Fall 2014
Syllabus for HPE 021 Advanced Golf and Fitness 1 Credit Hour Fall 2014 I. COURSE DESCRIPTION Designed for students who have attained an intermediate skill level in golf. This course meets for the first
More informationSan José State University Department of Computer Science CS166, Information Security, Section 1, Fall, 2018
Course and Contact Information Instructor: Office Location: San José State University Department of Computer Science CS166, Information Security, Section 1, Fall, 2018 Fabio Di Troia DH282 Telephone: 408-924-7171
More informationCS503 Advanced Programming I CS305 Computer Algorithms I
Syllabus: CS503 Advanced Programming I CS305 Computer Algorithms I Course Number: CS503-50/CS305-50 Course Title: Advanced Programming I/Computer Algorithms I Instructor: Richard Scherl Office: Howard
More informationCSCI 201L Syllabus Principles of Software Development Spring 2018
L Syllabus Principles of Software Development Spring 2018 Instructor: Jeffrey Miller, Ph.D. Email: jeffrey.miller@usc.edu Web Page: http://www-scf.usc.edu/~csci201 Office: SAL 342 Phone: 213-740-7129 Lectures:
More informationSyllabus for HPE 021 Advanced Golf and Fitness 1 Credit Hour Spring 2016
Syllabus for HPE 021 Advanced Golf and Fitness 1 Credit Hour Spring 2016 I. COURSE DESCRIPTION Designed for students who have attained an intermediate skill level in golf. This course meets for the first
More informationBOSTON UNIVERSITY Metropolitan College MET CS342 Data Structures with Java Dr. V.Shtern (Fall 2011) Course Syllabus
BOSTON UNIVERSITY Metropolitan College MET CS342 Data Structures with Java Dr. V.Shtern (Fall 2011) Course Syllabus 1. Course Objectives Welcome to MET CS342 Data Structures with Java. The intent of this
More informationprogramming exercises.
Dr. John P. Abraham Professor Office: Engineering Building Room 3.276 CSCI 6345 ADVANCED COMPUTER NETWORKS Syllabus for Spring 2014 Professor: Dr. John P. Abraham. Office: Engineering Building Room 3.276
More informationSyllabus CS 430 Introduction to Computer Security Winter 2016
Syllabus CS 430 Introduction to Computer Security Winter 2016 Meeting Times Instructor TA Textbooks Lect: 3:00-3:50 M, Tu, Wed, Th, HB 106 Lab: 3:00-3:50 M, HB 203 Dr. Razvan Andonie, HB 214-E, Office
More informationIT443 Network Security Administration Spring Gabriel Ghinita University of Massachusetts at Boston
IT443 Network Security Administration Spring 2018 Gabriel Ghinita University of Massachusetts at Boston Contact Information Instructor: Dr. Gabriel Ghinita Email: Gabriel.Ghinita@umb.edu (preferred contact)
More informationFORM I: SUMMARY PAGE FOR PROPOSAL # CSCI
FORM I: SUMMARY PAGE FOR PROPOSAL # CSCI102010-08 1. Title: CISM 3325: Data Communications and Computer Networks 2. Submitting College: COST 3. Department(s) Generating the Proposal: Engineering Technology
More informationINFS 2150 (Section A) Fall 2018
INFS 2150 (Section A) Fall 2018 Introduction to Web Development Class meets TUE & THU: 12:30am-1:45pm: in Wheatley 114 Instructor: Peter Y. Wu Office: Wheatley 309 Office Hours: Tuesday 9:00 am-12:00 noon;
More informationSyllabus for CSC 455 Database Systems 3 Credit Hours Spring 2012
Syllabus for CSC 455 Database Systems 3 Credit Hours Spring 2012 I. COURSE DESCRIPTION An introduction to the concepts and techniques encountered in database systems. Topics include data independence,
More informationOklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017
Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017 ITD 3443 Network Security Students will provide Cyber Defense while understanding Cyber Threats. Their attack types
More informationMET CS 674 C1/EL Spring 2017: DATABASE SECURITY SYLLABUS
MET CS 674 C1/EL Spring 2017: DATABASE SECURITY Boston University Metropolitan College Boston Campus and elive Schedule Thursday 18:00-21:00 US Eastern Time Location Room B36 College of Arts and Sciences
More informationAIT 682: Network and Systems Security. Instructor: Dr. Kun Sun
AIT 682: Network and Systems Security Instructor: Dr. Kun Sun About Instructor Dr. Kun Sun, Associate Professor of Information Sciences and Technology http://csis.gmu.edu/ksun/ Phone: (703) 993-1715 Email:
More informationCS 375 UNIX System Programming Spring 2014 Syllabus
CS 375 UNIX System Programming Spring 2014 Syllabus Instructor Dr. Deborah Hwang KC 264, 488 2193, hwang@evansville.edu Home page: http://csserver.evansville.edu/~hwang Office Hours: See instructor's home
More informationSyllabus for HPE 120 Dance Aerobic Proficiency 0.0 Credit Hour Spring 2012
I. COURSE DESCRIPTION Syllabus for HPE 120 Dance Aerobic Proficiency 0.0 Credit Hour Spring 2012 Designed for dance majors, the course helps students to develop and implement a personal fitness exercise
More informationGeography 3300: Transportation Security
The Ohio State University Geography 3300: Transportation Security Spring Semester, 2015 Location: Smith Lab 2150 Time: TuTh 12:45-2:05pm Reg. Number: 18760 Instructor: Dr. Morton E. O'Kelly E-mail: okelly.1@osu.edu
More informationModule: Introduction. Professor Trent Jaeger. CSE543 - Introduction to Computer and Network Security
CSE543 - Introduction to Computer and Network Security Module: Introduction Professor Trent Jaeger CSE543 - Introduction to Computer and Network Security 1 2 Some bedtime stories 2 Some bedtime stories
More informationInformation Security: Principles and Practice Second Edition. Mark Stamp
Information Security: Principles and Practice Second Edition Mark Stamp August 10, 2009 Contents Preface Second Edition Preface About The Author Acknowledgments xvii xix xxiii xxv 1 Introduction 1 1.1
More information1/11/11. o Syllabus o Assignments o News o Lecture notes (also on Blackboard)
Dr. Jelena Mirkovic (Y-Ellen-a) University of Southern California Information Sciences Institute If you wish to enroll and do not have D clearance yet, send an email to CSci530@usc.edu with: o Your name
More informationRochester Institute of Technology Golisano College of Computing and Information Sciences Department of Information Sciences and Technologies
Rochester Institute of Technology Golisano College of Computing and Information Sciences Department of Information Sciences and Technologies 4002-360.01 ~ Introduction to Database & Data Modeling ~ Spring
More informationTextbook(s) and other required material: Raghu Ramakrishnan & Johannes Gehrke, Database Management Systems, Third edition, McGraw Hill, 2003.
Elective course in Computer Science University of Macau Faculty of Science and Technology Department of Computer and Information Science SFTW371 Database Systems II Syllabus 1 st Semester 2013/2014 Part
More informationCS 241 Data Organization. August 21, 2018
CS 241 Data Organization August 21, 2018 Contact Info Instructor: Dr. Marie Vasek Contact: Private message me on the course Piazza page. Office: Room 2120 of Farris Web site: www.cs.unm.edu/~vasek/cs241/
More informationCS 470G Introduction to Operating Systems
CS 470G Introduction to Operating Systems Course Information Meeting Times University of Kentucky Department of Computer Science Spring 2011 Tues/Thur 2:00 pm - 3:15 pm, Room RMB 323 Instructor Jim Griffioen,
More informationCRN150 Fundamentals of Network Security
CRN150 Fundamentals of Network Security Course Information Credits 3 Washburn University Institute of Technology 5724 SW Huntoon Street Topeka, Kansas 66604 Phone: 785.670.3441 Office Fax: 785.273.7080
More informationITSY Information Technology Security Course Syllabus Spring 2018
ITSY 1342 - Information Technology Security Course Syllabus Spring 2018 Instructor Course Reference Number (CRN) Course Description: Name: Fidelis Ngang Tel: 713-718-5552 Office: Spring Branch, Room 900L
More informationCSCI 4250/6250 Fall 2013 Computer and Network Security. Instructor: Prof. Roberto Perdisci
CSCI 4250/6250 Fall 2013 Computer and Network Security Instructor: Prof. Roberto Perdisci perdisci@cs.uga.edu CSCI 4250/6250 What is the purpose of this course? Combined Undergrad/Graduate Intro to Computer
More informationE-guide Getting your CISSP Certification
Getting your CISSP Certification Intro to the 10 CISSP domains of the Common Body of Knowledge : The Security Professional (CISSP) is an information security certification that was developed by the International
More informationCS Final Exam
CS 600.443 Final Exam Name: This exam is closed book and closed notes. You are required to do this completely on your own without any help from anybody else. Feel free to write on the back of any page
More informationCOURSE OUTLINE. Course code: SCSR 4473 Academic Session/Semester: /2. Course name: Security Management Pre/co requisite (course name
COURSE OUTLINE Department/ Computer Science/Computing Page: 1 of 5 Course synopsis The subject is aimed at imparting knowledge and skill sets required to assume the overall responsibilities of administration
More informationSyllabus for HPE 451 Directed Study 1-3 Credit Hours Spring 2014
Syllabus for HPE 451 Directed Study 1-3 Credit Hours Spring 2014 I. COURSE DESCRIPTION The study of an approved topic, project, or practicum. Intended to supplement a subject already studied in a HPE class
More informationCourse Intended Learning Outcomes (CILOs): Upon successful completion of this course, students should be able to:
Title (Units): COMP 7330 Information Systems Security & Auditing (3,3,0) Course Aims: Prerequisite: To introduce the fundamental concepts and techniques in computer and network security, giving students
More informationSyllabus for HPE 099 Aerobic Proficiency 1 Credit Hour Spring 2015
Syllabus for HPE 099 Aerobic Proficiency 1 Credit Hour Spring 2015 I. COURSE DESCRIPTION Designed for seniors who are presently maintaining a physically active lifestyle and can pass the running, cycling,
More informationOffice Hours and Locations. Vyas: Th 15:30--17:00 or by appointment, CIC 2122 Zach: Mon 17:00--18:00, CIC 2214 Tiffany: Tu 16:00--17:00, CIC 2214
18-487 Introduction to Computer Security This course will introduce students to the fundamentals of computer security. We will focus on software security, applied cryptography, network security, OS security,
More informationSan José State University Computer Science Department CS49J, Section 3, Programming in Java, Fall 2015
Course and Contact Information San José State University Computer Science Department CS49J, Section 3, Programming in Java, Fall 2015 Instructor: Aikaterini Potika Office Location: MacQuarrie Hall 215
More informationCS 200, Section 1, Programming I, Fall 2017 College of Arts & Sciences Syllabus
Northeastern Illinois University CS 200, Section 1, Programming I, Fall 2017 Syllabus, Page 1 of 7 CS 200, Section 1, Programming I, Fall 2017 College of Arts & Sciences Syllabus COURSE INFORMATION: Credit
More informationSE 4472a: Information Security
Western University Faculty of Engineering Department of Electrical and Computer Engineering SE 4472a: Information Security Course Outline 2014-15 Description: This course provides an introduction to the
More informationNEW YORK CITY COLLEGE OF TECHNOLOGY COMPUTER SYSTEMS TECHNOLOGY DEPARTMENT CST4714 DATABASE ADMINISTRATION (2 class hours, 2 lab hours, 3 credits)
NEW YORK CITY COLLEGE OF TECHNOLOGY COMPUTER SYSTEMS TECHNOLOGY DEPARTMENT CST4714 DATABASE ADMINISTRATION (2 class hours, 2 lab hours, 3 credits) COURSE DESCRIPTION: Students in this course will develop
More informationTextbook Charles Petzold, Programming Windows, 5th edition, Microsoft Press. References - other textbooks or materials none
CS351 Systems Programming Last Updated - 03/01/02 Course Manager Dr. Phil Dickens, Assistant Professor 3 credit hours; required for CS & CPE; 100 min. lecture & 100 min. lab each week Current Catalog Description
More informationSan José State University Department of Computer Science CS049J, Programming in Java, Section 2, Fall, 2016
Course and Contact Information San José State University Department of Computer Science CS049J, Programming in Java, Section 2, Fall, 2016 Instructor: Office Location: Fabio Di Troia DH282 Telephone: Email:
More informationIS Spring 2018 Database Design, Management and Applications
IS 331-004 Spring 2018 Database Design, Management and Applications Class Time: Monday/Wednesday 1:00 PM -2:25 PM Location: PC MALL 37 Instructor Information: Name: Dr. Art Hendela Office: 5108 GITC Phone
More informationSyllabus for HPE 099 Aerobic Proficiency 1 Credit Hour Fall 2012
Syllabus for HPE 099 Aerobic Proficiency 1 Credit Hour Fall 2012 I. COURSE DESCRIPTION Designed for seniors who are presently maintaining a physically active lifestyle and can pass the running, cycling,
More informationGET 433 Course Syllabus Spring 2017
Instructor: Doug Taber Telephone: 315-558-2359 Email: pdtaber@syr.edu Office: Hinds Hall 239 Location: Hinds 013 Day: Tues / Thurs Time: 8 AM to 9:20 AM Office Hours: TBA Course Overview GET 433 Enterprise
More informationPhiladelphia University Faculty of Information Technology Department of Computer Science --- Semester, 2007/2008. Course Syllabus
Philadelphia University Faculty of Information Technology Department of Computer Science --- Semester, 2007/2008 Course Syllabus Course Title: Advanced Databases Course Level: 4 Lecture Time: Course code:
More information19.1. Security must consider external environment of the system, and protect it from:
Module 19: Security The Security Problem Authentication Program Threats System Threats Securing Systems Intrusion Detection Encryption Windows NT 19.1 The Security Problem Security must consider external
More informationNetworks and Communications MS216 - Course Outline -
Networks and Communications MS216 - Course Outline - Objective Lecturer Times Overall Learning Outcomes Format Programme(s) The objective of this course is to develop in students an understanding of the
More informationSan Jose State University College of Science Department of Computer Science CS151, Object-Oriented Design, Sections 1,2 and 3, Spring 2017
San Jose State University College of Science Department of Computer Science CS151, Object-Oriented Design, Sections 1,2 and 3, Spring 2017 Course and Contact Information Instructor: Dr. Kim Office Location:
More informationCRN170 Fundamentals of Computer Networking
CRN170 Fundamentals of Computer Networking Course Information Credits 3 Washburn University Institute of Technology 5724 SW Huntoon Street Topeka, Kansas 66604 Office Phone: 785.670.3441 Office Fax: 785.273.7080
More informationOklahoma State University Spears School of Business Department of Management Information Systems
Oklahoma State University Spears School of Business Department of Management Information Systems Information Assurance Management TCOM 5223 Wednesday 4:30 PM 7:10 PM (Central Time) Location: Tulsa North
More informationChapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.
Name Date Chapter 10: Security After completion of this chapter, students should be able to: Explain why security is important and describe security threats. Explain social engineering, data wiping, hard
More informationDel Mar College Master Course Syllabus. UNIX System Administration Course Number: ITSC1358
Del Mar College Master Course Syllabus UNIX System Administration Course Number: ITSC1358 College Year: 2010 Professor Name: David Hattox Semester: Fall Office Location: VB124 Phone Contact: 698-1112 DMC
More informationSyllabus. ICS103: Computer Programming in C 2017 / 2018 First Semester (Term 171) INSTRUCTOR Office Phone Address Office Hours
I n f o r m a t i o n a n d C o m p u t e r S c i e n c e D e p a r t m e n t Syllabus ICS103: Computer Programming in C 2017 / 2018 First Semester (Term 171) Course Website: Blackboard CE 8 (WebCT) http://webcourses.kfupm.edu.sa/
More informationSAMPLE. ITS350: Information Systems and Security. Course Description and Outcomes
ITS350: Information Systems and Security Credit Hours: 3 Contact Hours: This is a 3-credit course, offered in accelerated format. This means that 16 weeks of material is covered in 8 weeks. The exact number
More informationAdvisory: Students should have already taken MICROCOMPUTER APPLICATIONS II - 431
Cyber Security I - CoSci 411 Los Angeles Mission College - Spring 2018 Instructor: Javier Rios E-mail: rios.javier@gmail.com E-mail communications will be will receive a response within 24 hours. Advisory:
More informationSyllabus for HPE 042 Creative Aerobics and Fitness Credit Hour Spring 2013
I. COURSE DESCRIPTION Syllabus for HPE 042 Creative Aerobics and Fitness 0.5-1 Credit Hour Spring 2013 Creative Aerobics is comprised of a variety of vigorous aerobic conditioning activities and flexibility
More informationSyllabus for HPE 026 Beginning Swimming and Fitness 1 Credit Hour Fall 2012
Syllabus for HPE 026 Beginning Swimming and Fitness 1 Credit Hour Fall 2012 I. COURSE DESCRIPTION Designed for the student who has little or no experience in swimming. Places major emphasis on developing
More informationSyllabus for HPE 024 Intermediate Swimming and Fitness 1 Credit Hour Fall 2012
Syllabus for HPE 024 Intermediate Swimming and Fitness 1 Credit Hour Fall 2012 I. COURSE DESCRIPTION Designed to increase aquatic abilities by adding to the skills learned in the beginner course. Prerequisites:
More informationPhiladelphia University Faculty of Information Technology Department of Computer Science --- Semester, 2007/2008. Course Syllabus
Philadelphia University Faculty of Information Technology Department of Computer Science --- Semester, 2007/2008 Course Syllabus Course Title: Compiler Construction Course Level: 4 Lecture Time: Course
More informationNew York City College of Technology/CUNY Department of Computer Systems Technology. CST2400 Computer System Management and Support 4 hours 3 credits
New York City College of Technology/CUNY Department of Computer Systems Technology CST2400 Computer System Management and Support 4 hours 3 credits Instructor: Office Phone: Office Hours: Class Meetings:
More informationInstructor: Eric Rettke Phone: (every few days)
Instructor: Eric Rettke Phone: 818 364-7775 email: rettkeeg@lamission.edu (every few days) Fall 2016 Computer Science 411 - Principles of Cyber Security 1 Please keep a copy of the syllabus handy for the
More informationI. PREREQUISITE For information regarding prerequisites for this course, please refer to the Academic Course Catalog.
Note: Course content may be changed, term to term, without notice. The information below is provided as a guide for course selection and is not binding in any form, and should not be used to purchase course
More informationCSCE 441 Computer Graphics Fall 2018
CSCE 441 Computer Graphics Fall 2018 Meetings: Monday, Wednesday, Friday 9:10-10:00 a.m. Location: HRBB 113 Instructor: Dr. John Keyser Office: 527C, H.R. Bright Building Phone: 458-0167 Email: keyser@cse.tamu.edu
More informationCSCI 434 INTRODUCTION TO LOCAL AREA NETWORKS (SPRING 2015)
CSCI 434 INTRODUCTION TO LOCAL AREA NETWORKS (SPRING 2015) (Last updated: December 16, 2014) INSTRUCTOR Instructor: Jinoh Kim, Ph.D. Office: JOUR 217 Office hours: M/W/R 10:00AM-12:00PM, W 1:00PM-3:00PM,
More informationIS 331-Fall 2017 Database Design, Management and Applications
Instructor: Todd Will Office: GITC 5100 IS 331-Fall 2017 Database Design, Management and Applications E-Mail: todd.will@njit.edu Office Hours: Course Date/Time: Moodle Tuesdays and Thursdays, 5 to 6PM,
More informationIn this course, you need to use Pearson etext. Go to "Pearson etext and Video Notes".
**Disclaimer** This syllabus is to be used as a guideline only. The information provided is a summary of topics to be covered in the class. Information contained in this document such as assignments, grading
More informationComputer Science 1321 Course Syllabus
Computer Science 1321 Course Syllabus Jeffrey D. Oldham 2000 Jan 11 1 Course Course: Problem Solving and Algorithm Design II Prerequisites: CS1320 or instructor consent This course is the second course
More informationMLR Institute of Technology
MLR Institute of Technology Laxma Reddy Avenue, Dundigal, Quthbullapur (M), Hyderabad 500 043 Phone Nos: 08418 204066 / 204088, Fax: 08418 204088 COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION Course
More informationISATI 231: Windows Client (4 credits) Spring 2018 Mon, Tue, Wed, Thu, 13:10-14:40, MTB 105
INSTRUCTOR INFORMATION: ISATI 231: Windows Client (4 credits) Spring 2018 Mon, Tue, Wed, Thu, 13:10-14:40, MTB 105 Name: Joshua L. Rogers Office: Mechanical-Technical Building (MTB) 105A Tel: (208) 792-2817
More informationSyllabus for HPE 038 Scuba Open Water II and Fitness.5-1 Credit Hour Spring 2014
Syllabus for HPE 038 Scuba Open Water II and Fitness.5-1 Credit Hour Spring 2014 I. COURSE DESCRIPTION Designed to prepare the student for open-water scuba training and/or NAUI Advanced Certification.
More informationSyllabus for HPE 076 Varsity Volleyball (Women) Sports 1 Credit Hour Fall 2014
I. COURSE DESCRIPTION Syllabus for HPE 076 Varsity Volleyball (Women) Sports 1 Credit Hour Fall 2014 Designed for the student who is a member of the Oral Roberts University Varsity team. The course places
More informationSINGLE COURSE. NH9000 Certified Ethical Hacker 104 Total Hours. COURSE TITLE: Certified Ethical Hacker
NH9000 Certified Ethical Hacker 104 Total Hours COURSE TITLE: Certified Ethical Hacker COURSE OVERVIEW: This class will immerse the student into an interactive environment where they will be shown how
More informationCourse Syllabus - CNT 4703 Design and Implementation of Computer Communication Networks Fall 2011
Course Syllabus - CNT 4703 Design and Implementation of Computer Communication Networks Fall 2011 Credits: 3 Course Meets: Tuesday and Thursday 4:00 pm to 5:15 pm in HEC 104 Lab Hours: HEC 322 we will
More informationTEACHING & ASSESSMENT (T & A) PLAN College of Economics Management and Information Systems Department of Information Systems
1 UoN/AA-003/FORM-QTLMS/V2/2017 TEACHING & ASSESSMENT (T & A) PLAN College of Economics Management and Information Systems Department of Information Systems Semester: Summer 2017 Academic Year 2016-17
More informationCourse: Honors AP Computer Science Instructor: Mr. Jason A. Townsend
Course: Honors AP Computer Science Instructor: Mr. Jason A. Townsend Email: jtownsend@pkwy.k12.mo.us Course Description: The material for this course is the equivalent of one to two semesters of an entry
More informationCPSC 5157G Computer Networks
CPSC 5157G Computer Networks Instructor Dr. Jianhua Yang Center for Commerce and Technology 28 (706) 565 3520 e mail: yang_jianhua@colstate.edu website: http://csc.colstate.edu/yang/ Office Hours (Fall
More informationCS 3270 Mobile Development for Android Syllabus
General Information Semester: Fall 2016 Textbook: Required: Android 6 for Programmers An App-Driven Approach, 3e, Deitel, Deitel and Wald, Prentice Hall, 978-0-13-428936-6. This book is also available
More informationCOURSE SYLLABUS ****************************************************************************** YEAR COURSE OFFERED: 2015
****************************************************************************** YEAR COURSE OFFERED: 2015 SEMESTER COURSE OFFERED: SPRING DEPARTMENT: COMPUTER SCIENCE COURSE NUMBER: 20019 Room and Time:
More informationCOMP-202A: Introduction to Computing 1
COMP-202A: Introduction to Computing 1 McGill University, Fall 2009 Course Details Instructor: Mathieu Petitpas (Course Coordinator) Office: McConnell Engineering Building (ENGMC) 104 Office hours: MW
More informationSan Jose State University College of Science Department of Computer Science CS151, Object-Oriented Design, Sections 1, 2, and 3, Spring 2018
San Jose State University College of Science Department of Computer Science CS151, Object-Oriented Design, Sections 1, 2, and 3, Spring 2018 Course and Contact Information Instructor: Suneuy Kim Office
More informationSul Ross State University. Spring CS 3310 Computer Communications. Office Location: ACR 109-B Office Phone:
Spring 217 CS 331 Computer Communications Instructor: Thea Glenn M.S. Management Information Systems Office Location: ACR 19-B Office Phone: 432-837- 849 TEXT #: 931-237-3324 (No text after 11pm or before
More information