WILLIAM PATERSON UNIVERSITY OF NEW JERSEY COLLEGE OF SCIENCE AND HEALTH Computer Science Department Course Outline

Size: px
Start display at page:

Download "WILLIAM PATERSON UNIVERSITY OF NEW JERSEY COLLEGE OF SCIENCE AND HEALTH Computer Science Department Course Outline"

Transcription

1 WILLIAM PATERSON UNIVERSITY OF NEW JERSEY COLLEGE OF SCIENCE AND HEALTH Computer Science Department Course Outline 1. Title of Course, Course Number and Credits: CS399 Computer and Network Security, 3 credits (Core/Elective for Computer Science Major) 2. Course Prerequisites CS345 Operating System 3. Description of the Course Consistent With the WPUNJ Catalog This course provides a comprehensive and balanced coverage of the basic concepts, principles, and practices of computer and network security. Topics include computer and network vulnerabilities; privacy of information; security goals and requirements; security policies, planning, implementation, administration, and disaster recovery; legal and ethical issues in security. Closely integrated into the above topics are security technologies and tools used to secure system including encryption algorithms and standards; public key infrastructure and certificates; Internet security protocols; firewalls; VPNs; software and hardware based access controls; intrusion detection and prevention systems. 4. Course Objectives The objectives of this course are to familiarize students with the principles and practices of computer and network security including the following topics: Internet architecture and the basics of TCP/IP networking Fundamentals of computer and network security Risks and vulnerabilities of computers and networks Malicious software and how to defend against it Hacking basics and countermeasures Firewall, intrusion detection and prevention systems Wireless network security Privacy and cryptography Encryption algorithms and standards Public key infrastructure and certificates Internet security protocols: IPSec, SSL, TLS and SSH Organizational security policies and planning Protection in general-purpose operating systems Security management and administration Legal and ethical issues in security 1

2 5. Student Learning Outcomes Upon completion of this course, students will be able to: Describe the architecture of the Internet and the basic functions performed by each layer of the TCP/IP protocol suite. Understand various topics and the scope of computer and network security Describe the three basic security requirements confidentiality, integrity, and availability. Describe vulnerabilities of networks and how to protect network resources. Identify different types of malicious software and how to defend against it. Describe how hacking techniques actually work by examining the holes of certain software including operating systems and networking protocols. Describe why wireless communication is particularly prone to hacking and how the risks can be minimized. Understand the basics of cryptography and how it is used to protect privacy. Describe popular encryption/decryption standards and their strengths and weaknesses. Describe the principles of symmetric and asymmetric key systems and their implementation. Use security technologies or tools including firewalls, VPNs, antivirus and antispy software, packet sniffers, biometric devices, to detect or prevent intrusions. Understand various security protocols of the Internet including IPSec, SSL/TLS, and PGP and identify where and how they are used in practice. Understand the importance of having a security policy for an organization. Formulate a security plan that is consistent with security policy and specify requirements that meet security criteria for an organization. Assess security risks and implement appropriate countermeasures for an existing organizational network. Help protect information in an organization by using effective authentication and access control. Describe typical security features offered by a modern operating system and how they are configured to enforce various levels access and privacy controls. Perform basic tasks related to network security management and administration. Describe legal and ethical issues in computer and network security. In addition, this course is expected to help students prepare for the Network+ certification exam CompTIA Security+ certification exam Besides the above set of objectives, this course also helps students to achieve the below university-wide student learning outcomes through lectures; classroom discussions; homework, essay and project assignments; and oral presentations. 2

3 Demonstrate the ability to think critically. This is achieved and measured by solving practical security related problems under different scenarios and by answering question in quizzes, examinations, etc. Locate and use information on security related topics. Homework and written assignments will involve current and emerging security technologies, requiring research on the Internet and the library s recent periodicals. Integrate knowledge and ideas in a coherent and meaningful manner. Lab sessions and projects will have problems applying and integrating various tools and security technologies towards securing computers, networks, and other computing recourses. Effectively express themselves in written and oral form. Students will be expected to carry out at least one extensive research project, hand in a written report, and make an oral presentation. 6. Topical Outline of the Course Content Data communication and networking concepts LANs; MANs; WANs; intranets and internets OSI seven-layer model and the TCP/IP protocol suite Structure and organization of the Internet Computer and network security: definition and scope Security and usability: user-centered security design principles Principles and goals of information, computer and network security Three basic security requirements: confidentiality, integrity, and availability Hackers, hacking techniques, hacking strategies and tools Network attacks or threats: virus, spyware, adware, buffer overflow, spyware, denial of service, rootkits, botnets, phishing, spamming, etc. Network defenses techniques, technologies, and tools: security monitoring, encryption, firewall, VPNs, authentication mechanisms, access controls, intrusion detection and prevention, key infrastructures, antivirus software, computer forensics. Internet security: SSL, TLS, IP security, S/MIME, Kerberos, X.509, and federated identity management. Wireless threat and security Privacy and cryptography: encryption algorithms and standards Public key infrastructure and certificates Security policy, standard, plan, implementation and audit ITU-T X.800: security services and mechanism The Orange Book : Department of Defense Trusted Computer System Evaluation Criteria basis for assessing and securing a system Operating system security tools; managing security: Solaris UNIX security system; Linux UNIX security system; Windows 2008 security system Introduction to network security management and administration Legal and ethical issues in security Future security trends: hardware-based security. 3

4 7. Guidelines/Suggestions for Teaching Methods and Student Learning Activities Inquiry-based lectures Multimedia demonstrations Hands-on lab projects Problem solving sessions Group discussions Reading assignments and term papers Homework, quizzes, and exam 8. Guidelines/Suggestions for Methods of Student Assessment (student learning outcomes) Student learning outcome will be assessed based on the following activities: Weekly homework Reading assignments hands-on lab sessions At least one extensive research project Biweekly quizzes and the final examination Attendance and classroom participation in discussions 9. Suggested Reading, Texts, Objects of Study William Stallings and Lawrie Brown, Computer Security: Principles and Practice, Prentice Hall, The book provides a comprehensive coverage of topics of computer and network security. It also provides support for both research and modeling projects, for both academic and professional audiences. Topics include: Security technologies and principles; threats and countermeasures, from detecting intruders to countering attacks; trusted computing and multilevel security; secure software: Linux and Windows security models; managing security; computer crime, intellectual property, privacy, and ethics; cryptographic algorithms and applications; Internet security including SSL, TLS, IP security, S/MIME, Kerberos, X.509. Lorrie F. Crantor and Simson Garfinkel, Security and Usability: Designing Security Systems People Can Use, O Reilly Media. Inc The book discusses the tradeoff between computer security and usability. It groups 34 essays into six parts: Realigning Usability and Security; Authentication Mechanisms; Secure Systems; Privacy and Anonymity Systems; Commercializing Usability; and the Vendor Perspective--specific experiences of security and software vendors in addressing usability. Michael Whitman, Herbert Mattord, Networking & Security: Principles of Information Security, 3 rd Edition, Course Technology 2007 The book provides an introduction into computer security in general and discusses the important managerial topics for a career in information security. It uses examples of information security issues, tools, and practices implemented in today's businesses, fostering real-world application. Chuck Easttom, Computer Security Fundamentals, Prentice Hall, This book provides coverage of all the basic concepts, terminology and issues, along with essential practical skills. Topics covered include virus attacks, buffer overflow, hacking spyware and network 4

5 defense, cyber terrorism, industrial espionage and encryption, denial of service attacks, malware, basics of assessing and securing a system, Internet fraud, cyber crime, and information warfare, cyber detective, security hardware and software. 10. Bibliography of Supportive Texts and Other Materials Security: Richard Bejtlich, The Tao of Network Security Monitoring: Beyond Intrusion Detection, Addison-Wesley, The book explores the products, people, and processes that implement the NSM model. By focusing on case studies and the application of open source tools, it helps you gain hands-on knowledge of how to better defend networks and how to mitigate damage from security incidents. It also discusses how to use a variety of open-source tools including Sguil, Argus, and Ethereal to mine network traffic for full content, session, statistical, and alert data. Tony Bradley and Harlan Carvey, Essential Computer Security: Everyone s Guide to , Internet, and Wireless Security, Syngress Publishing, Inc, 2006 The book provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves. Harlan Carvey, Windows Forensics and Incident Recovery, Addison-Wesley, This book provides a 'command-line centric' view of Microsoft and non-microsoft tools for security and system administration on the Windows platform". It focuses on forensics and incident recovery with case studies and real world-examples that cover every significant incident response, recovery, and forensics technique. It discusses methodology for responding to potential attacks and prepares systems to detect incidents, recognize the signatures of an attack, and uncover attacks that evade detection by Event Viewer, Task Manager, and other Windows GUI tools John Chirillo and Edgar Danielyan, Sun Certified Security Administrator for Solaris 9 & 10 Study Guide It is an exam prep book for certification exam based on proven pedagogy, including step-by-step exercises, on-the-job elements, chapter self-tests and more. Run the UNIX based exam engine - included for Sun purists. Greg Conti, Googling Security: How Much Does Google Know About You? Prentice Hall 2009 The book reveals how Google s vast information stockpiles could be used against you or your business and what you can do to protect yourself. It reveals the privacy implications of Gmail, Google Maps, Google Talk, Google Groups, Google Alerts, Google s new mobile applications, and more. It shows how Google s databases can be used by others with bad intent, even if Google succeeds in its pledge of don t be evil. Mirkovic, Dietrich, Dittrich & Reiher, Internet Denial of Service: Attack and Defense Mechanisms, Prentice Hall, DoS is a pervasive and growing threat to the Internet. The book sheds light on a complex and fascinating form of computer attack that impacts the confidentiality, integrity, and availability of millions of computers worldwide. It tells the network administrator, corporate CTO, incident responder, and student how DDoS attacks are prepared and executed, how to think about DDoS, and how to arrange computer and network defenses. It also provides a suite of actions that can be taken before, during, and after an attack. Chuck Easttom, Network Defense and Countermeasures: Principles and Practices, 5

6 Prentice Hall, The book covers a wide range of defense strategies, forms of attacks, and policies related to computer security. Key topics include firewalls, intrusion detection systems, encryption fundamentals, operating system hardening, defending against virus attacks, Trojan horses and spyware, security policies and security standards that are particularly useful for network administrators, network security professionals and security audit professionals. Rob Flickenger and Roger Weeks, Wireless Hacks: Tips and tools for building, Extending, and Securing Your Systems, O Reilly The books provides practical tips and tricks of tens of hacks ranging from passive network scanning to aligning long-distance antennas, beefing up wireless network security, and beyond. Sari Greene, Security Policies and Procedures: Principles and Practices, Prentice Hall, The book teaches information security policies and procedures and provides students with handson practice developing a security policy. This book provides an introduction to security policy, coverage of information security regulation and framework, and policies specific to industry sectors, including financial, healthcare and small business. Peter Gregory, Solaris Security, Sun Microsystems,2000 The book provides a concise guide to maintaining secure systems in the Solaris environment. It covers standalone and networked systems running Solaris and presents a special section on disaster preparation and recovery operations. Michael Gregg, Certified Ethical Hacker Exam Prep, Pearson, A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker. The CEH certification prepares professionals for network penetration testing skills. Along with the most current CEH content, the book also contains the elements that make Exam Preps such strong study aides: comprehensive coverage of exam topics, end-of-chapter review, practice questions, Exam Alerts, Fast Facts, plus an entire practice exam to test your understanding of the material. Greg Hoglund, Gary McGraw, Exploiting Online Games: Cheating Massively Distributed Systems, Prentice Hall 2009 You don't want to be the last person to attack your own system--you should be the first. In our new age where virtual items carry real dollar value, and fortunes are won and lost over items that do not really exist, the new threats to the intrepid gamer are all too real. To protect against these hazards, you must understand them, and this book discusses how to computer games can be exploited so that one can stay one step behind the bad guys. Jesper M. Johansson and Steve Riley, Protect Your Windows Network: From Perimeter to Data, Addison-Wesley, This book addresses the security problem holistically. Through hands-on examples and practical case studies, you will learn how to integrate multiple defenses deterring attacks, delaying them, and increasing the cost to the attacker. Coverage includes: Improving security from the top of the network stack to the bottom; Understanding what you need to do right away and what can wait; Avoiding "pseudo-solutions" that offer a false sense of security; Developing effective security policies and educating those pesky users; Beefing up your first line of defense: physical and perimeter security; Modeling threats and identifying security dependencies; Preventing rogue access from inside the network; Systematically hardening Windows servers and clients; Protecting client applications, server applications, and Web services; and Addressing the unique challenges of small business network security. Raymond Panko, Corporate Computer and Network Security, Prentice Hall

7 The book examines computer and corporate security in the business setting. Its emphasizes implementing security within corporations using existing commercial software and provides coverage of all major security issues. Charles P. Pfleeger, Security in Computing, 3 rd edition, Prentice Hall 2002 The book covers cryptography; program and operating system security; administration; legal, privacy, and ethical issues, etc. It combines core computer science concepts related to operating systems, networks, data bases, and programming, with accessible discussions of the use of cryptography and protocols. The book describes each important area from a developer's or user's point of view, lays out the security vulnerabilities and threats, and follows countermeasures to address them. Honeynet Project, Know Your Enemy: Learning about Security Threats, 2 nd edition, Addison-Wesley, The Honeynet, a relatively new security technology made up of networks of systems that are designed to be compromised. It is created by the Research Alliance and active contributors throughout the security community. The book discusses how to set up a honeynet, how to analyze the collected data, and what the authors have learned about "the enemy" from the data. It covers new techniques and technologies never published before, including second-generation and distributed Honeynets. It also explains data analysis in much greater detail, with entire chapters dedicated to Window forensics, UNIX forensics, reverse engineering, and network forensics. Jakobsson & Ramzan, Crimeware: Understanding New Attacks and Defenses, Addison-Wesley, 2008 This book discusses essential security principles, techniques, and countermeasures to keep you one step ahead of the criminals, regardless of evolving technology and tactics. It helps you understand how crimeware works, how to identify it, and how to prevent future attacks before company s valuable information falls into the wrong hands. It will also help a reader to understand current and emerging security threats including rootkits, bot networks, spyware, adware, and click fraud; to recognize the interaction between various crimeware threats; to gain awareness of the social, political, and legal implications of these threats; to learn valuable countermeasures to stop crimeware in its tracks, now and in the future; and to acquire insight into future security trends and threats, and create an effective defense plan. Edward Skoudis, Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses, 2 nd edition, Prentice Hall PTR, This book helps one understands attack strategies, attack tools, and the defenses against both It covers everything from the basic principles to the fine details of online attack methods and counterstrategies, to effective defenses, recognize attacks in progress, and respond quickly and effectively in both UNIX/Linux and Windows environments. Important features of this new edition include "anatomyof-an-attack" scenarios and tools, an section on wireless hacking: war driving, wireless sniffing attacks, a comprehensive coverage of reconnaissance tools, including Nmap port scanning and "Google hacking", and more. Sean Smith & John Marchesini, Craft of System Security, Addison-Wesley, 2008 The book first provides a coherent framework for understanding today's systems and vulnerabilities. It then systematically introduces the basic building blocks for securing contemporary systems, apply those building blocks to today's applications, and consider important emerging trends such as hardware-based security. It discusses the classic Orange Book approach to security, and its limitations; the use of operating system security tools and structures--with examples from Windows, Linux, BSD, and Solaris; how networking, the Web, and wireless technologies affect security; software security defects, from buffer overflows to development process flaws; cryptographic primitives and their use in secure systems; the best practice techniques for authenticating people and computer systems in diverse settings; the use of validation, standards, and testing to enhance confidence in a system's security; the security, privacy, and trust issues arising from desktop productivity tools; the digital rights management, watermarking, information hiding, and policy expression; the principles of humancomputer interaction (HCI) design for improved security; and the potential of emerging work in hardware-based security and trusted computing 7

8 William Stallings, Cryptography and Network Security, 4th Edition, Prentice Hall The bool provides a comprehensive treatment of cryptography and network security. It explores the basic issues of cryptography and network security technology; examines the practice of network security via applications that are in use today; provides a simplified AES that enables readers to grasp the essentials of AES more easily; features block cipher modes of operation, including the CMAC mode for authentication and the CCM mode for authenticated encryption; and includes an expanded, updated treatment of intruders and malicious software. Peter Szor, The Art of Computer Virus Research and Defense, Addison-Wesley, The book discusses how viruses are analyzed, how they spread, and can they be effectively defended against. It offers an encyclopedic treatment of computer viruses, including: a history of computer viruses, viral behaviors, classification, protection strategies, anti-virus techniques, and how to conduct an accurate threat analysis. Topics include: Discovering how malicious code attacks on a variety of platforms; Classifying malware strategies for infection, in-memory operation, self-protection, payload delivery, exploitation, and more; Identifying and responding to code obfuscation threats: encrypted, polymorphic, and metamorphic; Mastering empirical methods for analyzing malicious code and what to do with what you learn; Reverse-engineering malicious code with disassemblers, debuggers, emulators, and virtual machines; Implementing technical defenses: scanning, code emulation, disinfection, inoculation, integrity checking, sandboxing, honeypots, behavior blocking; and Using worm blocking, host-based intrusion prevention, and network-level defense strategies Vladimirov, Gavrilenko & Mikhailovsky, Wi-Foo: The Secrets of Wireless Hacking, Addison-Wesley, 2004 The book introduces the 'battlefield,' exposing today's 'wide open' wireless networks and their attackers. In a stepwise manner, the book introduces the entire arsenal of hardware and software tools: crucial knowledge for crackers and auditors alike. The book then discusses systematically the countermeasures for building hardened wireless 'citadels'' including cryptography-based techniques, authentication, wireless VPNs, intrusion detection, and more. Topics include: walkthroughs and explanations of typical attacks; Building wireless hacking/auditing toolkit: detailed recommendations, ranging from discovery tools to chipsets and antennas; War-driving: network mapping and site surveying; Potential weaknesses in current and emerging standards, including i, PPTP, and IPSec; Implementing strong, multilayered defenses; Wireless IDS: why attackers aren't as untraceable as they think; Wireless hacking and the law: what's legal, what isn't. Linda Volonino, Reynaldo Anzaldua, Jana Godwin, Computer Forensics: Principles and Practices, Prentice Hall 2008 By applying information systems, computer security, and criminal justice principles and practices to crime investigations and other legal actions, this text teaches students how to use forensically-sound methodologies and software to acquire admissible electronic evidence (e-evidence) with coverage of computer and forensics, cell phone and IM forensics, and PDA and Blackberry forensics. Wallace Wang, Steal This Computer Book 4.0: What They Won't Tell You About the Internet, 4th edition, No Starch Press, This is a non-technical book that examines what hackers do, how they do it, and how readers can protect themselves. Informative, irreverent, and entertaining, the completely revised fourth edition of Steal This Computer Book contains new chapters that discuss the hacker mentality, lock picking, exploiting P2P file sharing networks, and how people manipulate search engines and pop-up ads. Includes a CD with hundreds of megabytes of 100% FREE hacking and security-related programs that tie-in to each chapter in the book. Websites for Information on Security: 8

9 ITU X.800: Security Architecture for Open System Interconnection for CCITT Connection recommendation ( ) Department of Defense: Department of Defense Trusted Computer System Evaluation Criteria or TCSEC ( or for a short summary, visit CERT Coordination Center (CERT/CC), addresses risks at the software and system level and focuses in recent years on identifying and addressing existing and potential threats, notifying system administrators and other technical personnel of these threats, and coordinating with vendors and incident response teams worldwide to address the threats ( The Honeynet Project: an international, non-profit research organization dedicated to improving the security of the Internet ( Statistics on recent top security risks and other useful security related information Nmap is a free and open source utility for network exploration or security auditing. Many systems and network administrators find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime, etc. ( Operating Systems: Roberta Bragg, Windows Server 2003 Security: A Technical Reference, Addison Wesley, The book summarizes decades in IT administration and security. It covers the core principles of information security throughout your plans and processes; establishes effective authentication and passwords; restricts access to servers, application software, and data; makes the most of the Encrypting File System (EFS); uses Active Directory's security features and secure Active Directory itself; develops, implements, and troubleshoots group policies; deploys a secure Public Key Infrastructure (PKI); secures remote access using VPNs via IPSec, SSL, SMB signing, LDAP signing, and more; audits and monitor your systems, detect intrusions, and respond appropriately; maintains security and protect business continuity on an ongoing basis. Brian Komar, Windows Server 2008 PKI and Certificate Security, Get in-depth guidance for designing and implementing certificate-based security solutions straight from PKI expert Brian Komar. No need to buy or outsource costly PKI services when you can use the robust PKI and certificate-based security services already built into Windows Server 2008! This in-depth reference teaches you how to design and implement even the most demanding certificate-based security solutions for wireless networking, smart card authentication, VPNs, secure , Web SSL, EFS, and code-signing applications using Windows Server PKI and certificate services. A principal PKI consultant to Microsoft, Brian shows you how to incorporate best practices, avoid common design and implementation mistakes, help minimize risk, and optimize security administration. This definitive reference features a CD loaded with tools, scripts, and a fully searchable ebook. Jesper M. Johansson and MVPs with the Microsoft Security Team, Windows Server 2008 Security Resource Kit, Microsoft

10 The book covers planning and implementing security features in Windows Server 2008 and delivers the in-depth, technical information and tools one need to help protect your Windows based clients, server roles, networks, and Internet services. It also discusses how to plan and implement comprehensive security with special emphasis on new Windows security tools, security objects, security services, user authentication and access control, network security, application security, Windows Firewall, Active Directory security, group policy, auditing, and patch management. Gary Nutt, Operating Systems, 3rd edition, Addison Wesley 2003 William Stallings, Operating Systems: Internals and Design Principles, 6th edition; Pearson/Prentice Hall 2008 Andrew Tanenbaum, Operating Systems, 3rd edition; Pearson/Prentice Hall 2008 Paul A. Watters, The Complete Reference: Solaris 10, McGraw Hill/Osborne 2005 Discussions of security from the standpoint of system administration with five chapters: System security; File system access control; Role-based access control; Users, groups, and Sun Management Console; Kerberos and pluggable authentication. Networking fundamentals: William J. Beyda, Data Communications: From Basics to Broadband, 4 th edition, Prentice Hall, Bradford, The Art of Computer Networking, Prentice Hall, J. Richard Burke, Network Management: Concepts and Practice, A Hands-On Approach, Prentice Hall, Douglas E. Comer, Hands-on Networking with Internet Technologies, 2 nd edition, Prentice Hall, Douglas E. Comer, The Everything You Need to Know About Computer Networking and How the Internet Works, 3 rd edition, Prentice Hall 2000 Douglas E. Comer, Computer Networks and Internets, 5 th edition, Prentice Hall 2009 Behrouz A. Forouzan, Data Communications and Networking, 4 th edition McGraw Hill 2007 Joe Habraken, Absolute Beginner's Guide to Networking, 4 th edition, Que, Fred Halsall, Computer Networking and the Internet, 5 th edition,addison-wesley, Bruce Hallberg, Networking: A Beginner's Guide, 4 th edition, McGraw-Hill Osborne Media, 2005 James F. Kurose & Ross, Computer Networking: A Top-Down Approach, 4 th edition, 10

11 Addison-Wesley, Jorg Liebeherr & El Zarki, Mastering Networks: An Internet Lab Manual, Addison- Wesley, Radia Perlman, Interconnections: Bridges, Routers, Switches, and Internetworking Protocols, 2 nd edition, Addison-Wesley, Stanford H. Rowe, Computer Networking, Prentice Hall, William Stallings, Data and Computer Communications, 8 th edition, Prentice Hall, 2007 Andrew S. Tanenbaum, Computer Networks, 4 th edition, Prentice Hall 2004 Wireless and Mobile Computing: Harold Davis, Anywhere Computing with Laptops: Making Mobile Easier, Que Publishing, Harold Davis, Absolute Beginner's Guide to Wi-Fi Wireless Networking, Que Publishing, 2004 Andy Dornan, The Essential Guide to Wireless Communications Applications, 2 nd edition, Prentice Hall, Roger Riggs, A. Taivalsaari, et al., Programming Wireless Devices with the Java 2 Platform, Micro Edition, 2 nd edition, Prentice Hall, Jochen Schiller, Mobile Communications, 2 nd edition, Addison-Wesley, Network+ and Networking Administration/Pragmatics: David Groth, T. Skandier, B.l Ferguson, CompTIA Network+ Certification Kit: Exam N10-003, Sybex, David Groth, T. Skandier, et al., Network+ Study Guide: Exam N10-003, Deluxe, 2 nd edition, Sybex, J. Scott Haugdahl, Network Analysis and Troubleshooting, Addison-Wesley Professional, Thomas Limoncelli, C.J. Hogan, Strata R. Chalup, Practice of System and Network Administration, 2 nd edition, Addison-Wesley,

12 Tamara Dean, Network+ Guide to Networks, 4th edition, Course Technology, Andrew F. Ward, Connecting to the Internet: A Practical Guide about LAN-Internet Connectivity, Addison-Wesley Professional, Preparers Name and Date: Dr. Erh-Wen Hu, March 21, Original Departmental Approval Date: Fall, Reviser s Name and Date: NA 14.Departmental Revision Approval Date: NA 12

CEH: CERTIFIED ETHICAL HACKER v9

CEH: CERTIFIED ETHICAL HACKER v9 CEH: CERTIFIED ETHICAL HACKER v9 SUMMARY The Certified Ethical Hacker (CEH) program is the core of the most desired information security training system any information security professional will ever

More information

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker Learn to find security vulnerabilities before the bad guys do! The Certified Ethical Hacker (CEH) class immerses students in an interactive environment

More information

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107) Overview This course is intended for those wishing to qualify with CompTIA Security+. CompTIA's Security+ Certification is a foundation-level certificate designed for IT administrators with 2 years' experience

More information

EC-Council C EH. Certified Ethical Hacker. Program Brochure

EC-Council C EH. Certified Ethical Hacker. Program Brochure EC-Council TM H Program Brochure Course Description The (CEH) program is the core of the most desired information security training system any information security professional will ever want to be in.

More information

Security+ SY0-501 Study Guide Table of Contents

Security+ SY0-501 Study Guide Table of Contents Security+ SY0-501 Study Guide Table of Contents Course Introduction Table of Contents About This Course About CompTIA Certifications Module 1 / Threats, Attacks, and Vulnerabilities Module 1 / Unit 1 Indicators

More information

Certified Ethical Hacker (CEH)

Certified Ethical Hacker (CEH) Certified Ethical Hacker (CEH) COURSE OVERVIEW: The most effective cybersecurity professionals are able to predict attacks before they happen. Training in Ethical Hacking provides professionals with the

More information

WILLIAM PATERSON UNIVERSITY OF NEW JERSEY COLLEGE OF SCIENCE AND HEALTH Computer Science Department Course Outline

WILLIAM PATERSON UNIVERSITY OF NEW JERSEY COLLEGE OF SCIENCE AND HEALTH Computer Science Department Course Outline WILLIAM PATERSON UNIVERSITY OF NEW JERSEY COLLEGE OF SCIENCE AND HEALTH Computer Science Department Course Outline 1. Title of Course, Course Number and Credits: CS399 Net-Centric Computing, 3 credits

More information

Course 831 EC-Council Certified Ethical Hacker v10 (CEH)

Course 831 EC-Council Certified Ethical Hacker v10 (CEH) Course 831 EC-Council Certified Ethical Hacker v10 (CEH) Duration: 5 days What You Get: CEH v10 Certification exam voucher 5 days of high quality classroom training 18 comprehensive modules 40% of class

More information

Course Intended Learning Outcomes (CILOs): Upon successful completion of this course, students should be able to:

Course Intended Learning Outcomes (CILOs): Upon successful completion of this course, students should be able to: Title (Units): COMP 7330 Information Systems Security & Auditing (3,3,0) Course Aims: Prerequisite: To introduce the fundamental concepts and techniques in computer and network security, giving students

More information

Securing Information Systems

Securing Information Systems Chapter 7 Securing Information Systems 7.1 2007 by Prentice Hall STUDENT OBJECTIVES Analyze why information systems need special protection from destruction, error, and abuse. Assess the business value

More information

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK Hacker Academy Ltd COURSES CATALOGUE Hacker Academy Ltd. LONDON UK TABLE OF CONTENTS Basic Level Courses... 3 1. Information Security Awareness for End Users... 3 2. Information Security Awareness for

More information

Course 831 Certified Ethical Hacker v9

Course 831 Certified Ethical Hacker v9 Course 831 Certified Ethical Hacker v9 Duration: 5 days What You Get: CEH v9 Certification exam voucher 5 days of high quality classroom training 18 comprehensive modules 40% of class hours dedicated to

More information

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,

More information

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education COURSE OF STUDY 2017-2018 (C)ITM 820 Information Systems Security and Privacy

More information

Ethical Hacking and Prevention

Ethical Hacking and Prevention Ethical Hacking and Prevention This course is mapped to the popular Ethical Hacking and Prevention Certification Exam from US-Council. This course is meant for those professionals who are looking for comprehensive

More information

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led Certification: Certified Network Defender Exam: 312-38 Course Description This course is a vendor-neutral, hands-on,

More information

This ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process.

This ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process. EC Council Certified Ethical Hacker V9 This ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process. Here, you will be exposed to an entirely different

More information

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,

More information

CSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague

CSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague Brmlab, hackerspace Prague Lightning talks, November 2016 in general in general WTF is an? in general WTF is an? Computer Security in general WTF is an? Computer Security Incident Response in general WTF

More information

CompTIA Cybersecurity Analyst+

CompTIA Cybersecurity Analyst+ CompTIA Cybersecurity Analyst+ Course CT-04 Five days Instructor-Led, Hands-on Introduction This five-day, instructor-led course is intended for those wishing to qualify with CompTIA CSA+ Cybersecurity

More information

NEW YORK CITY COLLEGE OF TECHNOLOGY/CUNY Computer Systems Technology Department

NEW YORK CITY COLLEGE OF TECHNOLOGY/CUNY Computer Systems Technology Department NEW YORK CITY COLLEGE OF TECHNOLOGY/CUNY Computer Systems Technology Department COURSE: CST2307 Networking Fundamentals (2 class hours, 2 lab hours, 3 credits) Course Description: This course introduces

More information

Standard Course Outline IS 656 Information Systems Security and Assurance

Standard Course Outline IS 656 Information Systems Security and Assurance Standard Course Outline IS 656 Information Systems Security and Assurance I. General Information s Course number: IS 656 s Title: Information Systems Security and Assurance s Units: 3 s Prerequisites:

More information

FRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

FRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months FRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months MODULE: INTRODUCTION TO INFORMATION SECURITY INFORMATION SECURITY ESSENTIAL TERMINOLOGIES

More information

Advanced Security Tester Course Outline

Advanced Security Tester Course Outline Advanced Security Tester Course Outline General Description This course provides test engineers with advanced skills in security test analysis, design, and execution. In a hands-on, interactive fashion,

More information

Faculty of Science & Information Technology

Faculty of Science & Information Technology Faculty of Science & Information Technology Department: Computer Science COURSE SYLLABUS Short Description Student s Copy One copy of this course syllabus is provided to each student registered in this

More information

E-guide Getting your CISSP Certification

E-guide Getting your CISSP Certification Getting your CISSP Certification Intro to the 10 CISSP domains of the Common Body of Knowledge : The Security Professional (CISSP) is an information security certification that was developed by the International

More information

HOLY ANGEL UNIVERSITY COLLEGE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY CYBER SECURITY COURSE SYLLABUS

HOLY ANGEL UNIVERSITY COLLEGE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY CYBER SECURITY COURSE SYLLABUS HOLY ANGEL UNIVERSITY LLEGE OF INFORMATION AND MMUNICATIONS TECHNOLOGY CYBER SECURITY URSE SYLLABUS Course Code : 6CSEC Prerequisite : 6MPRO2L Course Credit : 3 Units (2 hours LEC,3 hours LAB) Year Level:

More information

COMPUTER TECHNOLOGY (COMT)

COMPUTER TECHNOLOGY (COMT) Kent State University Catalog 2017-2018 1 COMPUTER TECHNOLOGY (COMT) COMT 11000 INTRODUCTION TO OFFICE PRODUCTIVITY APPS 3 Credit (Equivalent to MIS 24053) Covers the basic concepts and use of computer

More information

CCISO Blueprint v1. EC-Council

CCISO Blueprint v1. EC-Council CCISO Blueprint v1 EC-Council Categories Topics Covered Weightage 1. Governance (Policy, Legal, & Compliance) & Risk Management 1.1 Define, implement, manage and maintain an information security governance

More information

Networks and Communications MS216 - Course Outline -

Networks and Communications MS216 - Course Outline - Networks and Communications MS216 - Course Outline - Objective Lecturer Times Overall Learning Outcomes Format Programme(s) The objective of this course is to develop in students an understanding of the

More information

Principles of ICT Systems and Data Security

Principles of ICT Systems and Data Security Principles of ICT Systems and Data Security Ethical Hacking Ethical Hacking What is ethical hacking? Ethical Hacking It is a process where a computer security expert, who specialises in penetration testing

More information

Course Outline. CISSP - Certified Information Systems Security Professional

Course Outline. CISSP - Certified Information Systems Security Professional Course Outline CISSP - Certified Information Systems Security 10 Jan 2019 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

EC-Council C EH. Certified Ethical Hacker. Program Brochure

EC-Council C EH. Certified Ethical Hacker. Program Brochure EC-Council TM C EH Program Brochure Target Audience This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the

More information

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001) CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001) Gregg, Michael ISBN-13: 9781118083192 Table of Contents Foreword xxi Introduction xxvii Assessment Test xliv Chapter 1 Cryptographic

More information

ETHICAL HACKING & COMPUTER FORENSIC SECURITY

ETHICAL HACKING & COMPUTER FORENSIC SECURITY ETHICAL HACKING & COMPUTER FORENSIC SECURITY Course Description From forensic computing to network security, the course covers a wide range of subjects. You will learn about web hacking, password cracking,

More information

Instructor: Eric Rettke Phone: (every few days)

Instructor: Eric Rettke Phone: (every few days) Instructor: Eric Rettke Phone: 818 364-7775 email: rettkeeg@lamission.edu (every few days) Fall 2016 Computer Science 411 - Principles of Cyber Security 1 Please keep a copy of the syllabus handy for the

More information

Certified Ethical Hacker

Certified Ethical Hacker Certified Ethical Hacker Certified Ethical Hacker Course Objective Describe how perimeter defenses function by ethically scanning and attacking networks Conduct information systems security audits by understanding

More information

The University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus

The University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus The University of Jordan Accreditation & Quality Assurance Center COURSE Syllabus 1 Course title Computer Security 2 Course number 1901463 Credit hours (theory, practical) 3 3 Contact hours (theory, practical)

More information

Bachelor of Information Technology (Network Security)

Bachelor of Information Technology (Network Security) Course information for Bachelor of Information Technology (Network Security) Course Number HE20524 Location Meadowbank Course Design The Bachelor of Information Technology (Network Security) is a three-year

More information

CompTIA Security+ (Exam SY0-401)

CompTIA Security+ (Exam SY0-401) CompTIA Security+ (Exam SY0-401) Course Overview This course will prepare students to pass the current CompTIA Security+ SY0-401 certification exam. After taking this course, students will understand the

More information

SINGLE COURSE. NH9000 Certified Ethical Hacker 104 Total Hours. COURSE TITLE: Certified Ethical Hacker

SINGLE COURSE. NH9000 Certified Ethical Hacker 104 Total Hours. COURSE TITLE: Certified Ethical Hacker NH9000 Certified Ethical Hacker 104 Total Hours COURSE TITLE: Certified Ethical Hacker COURSE OVERVIEW: This class will immerse the student into an interactive environment where they will be shown how

More information

EC-Council. Program Brochure. EC-Council. Page 1

EC-Council. Program Brochure. EC-Council. Page 1 Program Brochure Page 1 Certified Ethical Hacker Version 7 Revolutionary Product releases the most advanced ethical hacking program in the world. This much anticipated version was designed by hackers and

More information

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

CRAW Security. CRAW Security

CRAW Security. CRAW Security Course Description The Certified Ethical Hacker (CEH) program is the core of the most desired information security training system any information security professional will ever want to be in. The CEH,

More information

Pearson CompTIA: Security+ SY0-401 (Course & Lab) Course Outline. Pearson CompTIA: Security+ SY0-401 (Course & Lab)

Pearson CompTIA: Security+ SY0-401 (Course & Lab) Course Outline. Pearson CompTIA: Security+ SY0-401 (Course & Lab) Course Outline Pearson CompTIA: Security+ SY0-401 (Course & Lab) 03 May 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

COMPUTER FORENSICS (CFRS)

COMPUTER FORENSICS (CFRS) Computer Forensics (CFRS) 1 COMPUTER FORENSICS (CFRS) 500 Level Courses CFRS 500: Introduction to Forensic Technology and Analysis. 3 credits. Presents an overview of technologies of interest to forensics

More information

CIW: Web Security Associate. Course Outline. CIW: Web Security Associate. 12 Oct ( Add-On )

CIW: Web Security Associate. Course Outline. CIW: Web Security Associate. 12 Oct ( Add-On ) Course Outline 12 Oct 2018 ( Add-On ) Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training 5. ADA Compliant

More information

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review ACS-3921-001/4921-001 Computer Security And Privacy Fall 2018 Mid-Term Review ACS-3921/4921-001 Slides Used In The Course A note on the use of these slides: These slides has been adopted and/or modified

More information

AURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo

AURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo ETHICAL HACKING (CEH) CURRICULUM Introduction to Ethical Hacking What is Hacking? Who is a Hacker? Skills of a Hacker? Types of Hackers? What are the Ethics and Legality?? Who are at the risk of Hacking

More information

Pearson: Certified Ethical Hacker Version 9. Course Outline. Pearson: Certified Ethical Hacker Version 9.

Pearson: Certified Ethical Hacker Version 9. Course Outline. Pearson: Certified Ethical Hacker Version 9. Course Outline Pearson: Certified Ethical Hacker Version 9 27 Jun 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

Pearson CISSP Cert Guide with Labs. Course Outline. Pearson CISSP Cert Guide with Labs. 17 Oct

Pearson CISSP Cert Guide with Labs. Course Outline. Pearson CISSP Cert Guide with Labs. 17 Oct Course Outline Pearson CISSP Cert Guide with Labs 17 Oct 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training

More information

Descriptions for CIS Classes (Fall 2017)

Descriptions for CIS Classes (Fall 2017) Descriptions for CIS Classes (Fall 2017) Major Core Courses 1. CIS 1015. INTRODUCTION TO COMPUTER INFORMATION SYSTEMS. (3-3-0). This course provides students an introductory overview to basic computer

More information

CompTIA Security+ Certification

CompTIA Security+ Certification CompTIA Security+ Certification Course Number: SY0-301 Length: 5 Days Certification Exam This course is preparation for the CompTIA Security+ Certification exam. Course Overview This course will prepare

More information

CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 12 May 2018

CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker.  12 May 2018 Course Outline CEH v8 - Certified Ethical Hacker 12 May 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training

More information

Secure Programming. Course material Introduction. 3 Course material. 4 Contents

Secure Programming. Course material Introduction. 3 Course material. 4 Contents 2 Course material 1 Secure Programming Introduction Ahmet Burak Can Hacettepe University Counter Hack Reloaded:A Step-by- Step Guide to Computer Attacks and Effective Defenses, Edward Skoudis, Tom Liston,

More information

Secure Programming. Introduction. Ahmet Burak Can Hacettepe University

Secure Programming. Introduction. Ahmet Burak Can Hacettepe University Secure Programming Introduction 1 Ahmet Burak Can Hacettepe University 2 Course material Counter Hack Reloaded:A Step-by- Step Guide to Computer Attacks and Effective Defenses, Edward Skoudis, Tom Liston,

More information

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences Undergraduate Programs - Bachelor B.S. Computer Game Design Upon completion of the B.S. degree in Computer Game Design, students

More information

Securing Information Systems

Securing Information Systems Chapter 7 Securing Information Systems 7.1 Copyright 2011 Pearson Education, Inc. STUDENT LEARNING OBJECTIVES Why are information systems vulnerable to destruction, error, and abuse? What is the business

More information

Syllabus: The syllabus is broadly structured as follows:

Syllabus: The syllabus is broadly structured as follows: Syllabus: The syllabus is broadly structured as follows: SR. NO. TOPICS SUBTOPICS 1 Foundations of Network Security Principles of Network Security Network Security Terminologies Network Security and Data

More information

Security Solutions. Overview. Business Needs

Security Solutions. Overview. Business Needs Security Solutions Overview Information security is not a one time event. The dynamic nature of computer networks mandates that examining and ensuring information security be a constant and vigilant effort.

More information

CUNY John Jay College of Criminal Justice MATH AND COMPUTER SCIENCE

CUNY John Jay College of Criminal Justice MATH AND COMPUTER SCIENCE Instructor: Prof Aftab Ahmad Office: NB 612 Telephone No. (212)393-6314 Email Address: aahmad@jjay.cuny.edu Office Hours: By appointment TEXT & REFERENCE MATERIAL Text Notes from instructor posted on Blackboard

More information

Advanced Diploma on Information Security

Advanced Diploma on Information Security Course Name: Course Duration: Prerequisites: Course Fee: Advanced Diploma on Information Security 300 Hours; 12 Months (10 Months Training + 2 Months Project Work) Candidate should be HSC Pass & Basic

More information

OVERVIEW OF SUBJECT REQUIREMENTS

OVERVIEW OF SUBJECT REQUIREMENTS Course Bachelor of Information Technology (Network Security) Course Number HE20524 Location Meadowbank OVERVIEW OF SUBJECT REQUIREMENTS Note: This document is intended as a guide only. Enrolling students

More information

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI)

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Duration: 5 days You Will Learn How To Understand how perimeter defenses work Scan and attack you own networks, without actually harming

More information

MLR Institute of Technology

MLR Institute of Technology MLR Institute of Technology Laxma Reddy Avenue, Dundigal, Quthbullapur (M), Hyderabad 500 043 Phone Nos: 08418 204066 / 204088, Fax: 08418 204088 COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION Course

More information

ITSY 2330 Intrusion Detection Course Syllabus

ITSY 2330 Intrusion Detection Course Syllabus ITSY 2330 Intrusion Detection Course Syllabus Instructor Course Reference Number (CRN) Course Description: Course Prerequisite(s) Course Semester Credit Hours (SCH) (Lecture, Lab) Name: Hung Le Tel: Office:

More information

Curso: Ethical Hacking and Countermeasures

Curso: Ethical Hacking and Countermeasures Curso: Ethical Hacking and Countermeasures Module 1: Introduction to Ethical Hacking Who is a Hacker? Essential Terminologies Effects of Hacking Effects of Hacking on Business Elements of Information Security

More information

V8 - CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 03 Feb 2018

V8 - CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker.  03 Feb 2018 Course Outline CEH v8 - Certified Ethical Hacker 03 Feb 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training

More information

IT Technician Pathways Course Guide

IT Technician Pathways Course Guide IT Technician Pathways Course Guide Stage Computer Retail Sales and Support Course Name or Topic Introduction to Retail or Business Fundamentals Related 3 rd Party Certifications C-ID IT-MC C-ID BUS 100

More information

Course Outline. CISSP - Certified Information Systems Security Professional 2015 (Course & Labs)

Course Outline. CISSP - Certified Information Systems Security Professional 2015 (Course & Labs) Course Outline CISSP - Certified Information Systems Security Professional 2015 (Course & Labs) 09 Nov 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number

More information

William Paterson University of New Jersey Department of Computer Science College of Science and Health Course Outline

William Paterson University of New Jersey Department of Computer Science College of Science and Health Course Outline William Paterson University of New Jersey Department of Computer Science College of Science and Health Course Outline 1. TITLE OF COURSE AND COURSE NUMBER: Computer and Information Technology; CS201; Credits:

More information

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Bachelor of Science in Information Technology BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Description and Outcomes The objective of the Bachelor of Science in Information Technology program is to help

More information

CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 15 Jan

CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 15 Jan Course Outline CEH v8 - Certified Ethical Hacker 15 Jan 2019 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training

More information

ITT Technical Institute. CS420 Application Security Onsite Course SYLLABUS

ITT Technical Institute. CS420 Application Security Onsite Course SYLLABUS ITT Technical Institute CS420 Application Security Onsite Course SYLLABUS Credit hours: 4 Contact/Instructional hours: 50 (30 Theory Hours, 20 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites:

More information

Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com

Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE s3security.com Security Professional Services S3 offers security services through its Security Professional Services (SPS) group, the security-consulting

More information

CompTIA Security+ SY Course Outline. CompTIA Security+ SY May 2018

CompTIA Security+ SY Course Outline. CompTIA Security+ SY May 2018 Course Outline 09 May 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training 5. ADA Compliant & JAWS Compatible

More information

Securing Information Systems

Securing Information Systems Introduction to Information Management IIM, NCKU System Vulnerability and Abuse (1/6) Securing Information Systems Based on Chapter 8 of Laudon and Laudon (2010). Management Information Systems: Managing

More information

Information Technology AS and Network Administration & Security AAS Proposed Changes Version 02. Network Admin & Security AAS Proposed

Information Technology AS and Network Administration & Security AAS Proposed Changes Version 02. Network Admin & Security AAS Proposed Information Technology AS and Network Administration & Security AAS Proposed Changes Version 02 Semester Information Technology AS Fall 2015 Information Technology AS Proposed Network Admin & Security

More information

CS System Security 2nd-Half Semester Review

CS System Security 2nd-Half Semester Review CS 356 - System Security 2nd-Half Semester Review Fall 2013 Final Exam Wednesday, 2 PM to 4 PM you may bring one 8-1/2 x 11 sheet of paper with any notes you would like no cellphones, calculators This

More information

Cyber Criminal Methods & Prevention Techniques. By

Cyber Criminal Methods & Prevention Techniques. By Cyber Criminal Methods & Prevention Techniques By Larry.Boettger@Berbee.com Meeting Agenda Trends Attacker Motives and Methods Areas of Concern Typical Assessment Findings ISO-17799 & NIST Typical Remediation

More information

PND at a glance: The World s Premier Online Practical Network Defense course. Self-paced, online, flexible access

PND at a glance: The World s Premier Online Practical Network Defense course. Self-paced, online, flexible access The World s Premier Online Practical Network Defense course PND at a glance: Self-paced, online, flexible access 1500+ interactive slides (PDF, HTML5 and Flash) 5+ hours of video material 10 virtual labs

More information

Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017

Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017 Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017 ITD 3443 Network Security Students will provide Cyber Defense while understanding Cyber Threats. Their attack types

More information

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person) Cyber Security Presenters: - Brian Everest, Chief Technology Officer, Starport Managed Services - Susan Pawelek, Accountant, Compliance and Registrant Regulation February 13, 2018 (webinar) February 15,

More information

Cybersecurity: Incident Response Short

Cybersecurity: Incident Response Short Cybersecurity: Incident Response Short August 2017 Center for Development of Security Excellence Contents Lesson 1: Incident Response 1-1 Introduction 1-1 Incident Definition 1-1 Incident Response Capability

More information

A Review Paper on Network Security Attacks and Defences

A Review Paper on Network Security Attacks and Defences EUROPEAN ACADEMIC RESEARCH Vol. IV, Issue 12/ March 2017 ISSN 2286-4822 www.euacademic.org Impact Factor: 3.4546 (UIF) DRJI Value: 5.9 (B+) A Review Paper on Network Security Attacks and ALLYSA ASHLEY

More information

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION BREACH & ATTACK SIMULATION THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION Cymulate s cyber simulation platform allows you to test your security assumptions, identify possible security gaps and receive

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client

More information

When Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER.

When Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER. When Recognition Matters WHITEPAPER CLFE www.pecb.com CONTENT 3 4 5 6 6 7 7 8 8 Introduction So, what is Computer Forensics? Key domains of a CLFE How does a CLFE approach the investigation? What are the

More information

ISC2. Exam Questions CISSP. Certified Information Systems Security Professional (CISSP) Version:Demo

ISC2. Exam Questions CISSP. Certified Information Systems Security Professional (CISSP) Version:Demo ISC2 Exam Questions CISSP Certified Information Systems Security Professional (CISSP) Version:Demo 1. How can a forensic specialist exclude from examination a large percentage of operating system files

More information

Academic Course Description

Academic Course Description BEC012 - CRYPTOGRAPHY AND NETWORK SECURITY Academic Course Description BHARATH UNIVERSITY Faculty of Engineering and Technology Department of Electronics and Communication Engineering BEC012 Cryptography

More information

Unit code: D/601/1956 QCF Level 5: BTEC Higher National Credit value: 15

Unit code: D/601/1956 QCF Level 5: BTEC Higher National Credit value: 15 Unit 46: Network Security Unit code: D/601/1956 QCF Level 5: BTEC Higher National Credit value: 15 Aim To provide learners with opportunities to manage, support and implement a secure network infrastructure

More information

CHAPTER 8 SECURING INFORMATION SYSTEMS

CHAPTER 8 SECURING INFORMATION SYSTEMS CHAPTER 8 SECURING INFORMATION SYSTEMS BY: S. SABRAZ NAWAZ SENIOR LECTURER IN MANAGEMENT & IT SEUSL Learning Objectives Why are information systems vulnerable to destruction, error, and abuse? What is

More information

Software Development & Education Center Security+ Certification

Software Development & Education Center Security+ Certification Software Development & Education Center Security+ Certification CompTIA Security+ Certification CompTIA Security+ certification designates knowledgeable professionals in the field of security, one of the

More information

San José State University School/Department Computer Science 265: Cryptography and Computer Security, Fall 2017

San José State University School/Department Computer Science 265: Cryptography and Computer Security, Fall 2017 Course and Contact Information Instructor: Auston Davis Office Location: MacQuarrie Hall 217 Telephone: 650-454-6044 Email: Office Hours: Class Days/Time: auston.davis@sjsu.edu (preferred) Mon 6pm 7pm

More information

CPTE: Certified Penetration Testing Engineer

CPTE: Certified Penetration Testing Engineer www.peaklearningllc.com CPTE: Certified Penetration Testing Engineer (5 Days) *Includes exam voucher, course video, an exam preparation guide About this course Certified Penetration Testing Engineer certification

More information

SYLLABUS. DIVISION: Business and Engineering Technology REVISED: FALL 2015 CREDIT HOURS: 4 HOURS/WK LEC: 4 HOURS/WK LAB: 0 LEC/LAB COMB: 4

SYLLABUS. DIVISION: Business and Engineering Technology REVISED: FALL 2015 CREDIT HOURS: 4 HOURS/WK LEC: 4 HOURS/WK LAB: 0 LEC/LAB COMB: 4 SYLLABUS DIVISION: Business and Engineering Technology REVISED: FALL 2015 CURRICULA IN WHICH COURSE IS TAUGHT: IST, Information Systems Technology COURSE NUMBER AND TITLE: ITN 262 Cisco CCNA Security CREDIT

More information

Ingram Micro Cyber Security Portfolio

Ingram Micro Cyber Security Portfolio Ingram Micro Cyber Security Portfolio Ingram Micro Inc. 1 Ingram Micro Cyber Security Portfolio Services Trainings Vendors Technical Assessment General Training Consultancy Service Certification Training

More information

CertStore is a ISO (International Standard Organization) Certified and Approved by Govt. Of India.

CertStore is a ISO (International Standard Organization) Certified and Approved by Govt. Of India. CertStore (The Certification Store) A complete certification online and offline store where you can accomplish any of IT certification and Training. CertStore is master and specialized to deliver the IT

More information

CompTIA Security+ Malware. Threats and Vulnerabilities Vulnerability Management

CompTIA Security+ Malware. Threats and Vulnerabilities Vulnerability Management CompTIA Security+ Lecture Six Threats and Vulnerabilities Vulnerability Management Copyright 2011 - VTC Malware Malicious code refers to software threats to network and systems, including viruses, Trojan

More information