WILLIAM PATERSON UNIVERSITY OF NEW JERSEY COLLEGE OF SCIENCE AND HEALTH Computer Science Department Course Outline
|
|
- Eric Hubbard
- 6 years ago
- Views:
Transcription
1 WILLIAM PATERSON UNIVERSITY OF NEW JERSEY COLLEGE OF SCIENCE AND HEALTH Computer Science Department Course Outline 1. Title of Course, Course Number and Credits: CS399 Computer and Network Security, 3 credits (Core/Elective for Computer Science Major) 2. Course Prerequisites CS345 Operating System 3. Description of the Course Consistent With the WPUNJ Catalog This course provides a comprehensive and balanced coverage of the basic concepts, principles, and practices of computer and network security. Topics include computer and network vulnerabilities; privacy of information; security goals and requirements; security policies, planning, implementation, administration, and disaster recovery; legal and ethical issues in security. Closely integrated into the above topics are security technologies and tools used to secure system including encryption algorithms and standards; public key infrastructure and certificates; Internet security protocols; firewalls; VPNs; software and hardware based access controls; intrusion detection and prevention systems. 4. Course Objectives The objectives of this course are to familiarize students with the principles and practices of computer and network security including the following topics: Internet architecture and the basics of TCP/IP networking Fundamentals of computer and network security Risks and vulnerabilities of computers and networks Malicious software and how to defend against it Hacking basics and countermeasures Firewall, intrusion detection and prevention systems Wireless network security Privacy and cryptography Encryption algorithms and standards Public key infrastructure and certificates Internet security protocols: IPSec, SSL, TLS and SSH Organizational security policies and planning Protection in general-purpose operating systems Security management and administration Legal and ethical issues in security 1
2 5. Student Learning Outcomes Upon completion of this course, students will be able to: Describe the architecture of the Internet and the basic functions performed by each layer of the TCP/IP protocol suite. Understand various topics and the scope of computer and network security Describe the three basic security requirements confidentiality, integrity, and availability. Describe vulnerabilities of networks and how to protect network resources. Identify different types of malicious software and how to defend against it. Describe how hacking techniques actually work by examining the holes of certain software including operating systems and networking protocols. Describe why wireless communication is particularly prone to hacking and how the risks can be minimized. Understand the basics of cryptography and how it is used to protect privacy. Describe popular encryption/decryption standards and their strengths and weaknesses. Describe the principles of symmetric and asymmetric key systems and their implementation. Use security technologies or tools including firewalls, VPNs, antivirus and antispy software, packet sniffers, biometric devices, to detect or prevent intrusions. Understand various security protocols of the Internet including IPSec, SSL/TLS, and PGP and identify where and how they are used in practice. Understand the importance of having a security policy for an organization. Formulate a security plan that is consistent with security policy and specify requirements that meet security criteria for an organization. Assess security risks and implement appropriate countermeasures for an existing organizational network. Help protect information in an organization by using effective authentication and access control. Describe typical security features offered by a modern operating system and how they are configured to enforce various levels access and privacy controls. Perform basic tasks related to network security management and administration. Describe legal and ethical issues in computer and network security. In addition, this course is expected to help students prepare for the Network+ certification exam CompTIA Security+ certification exam Besides the above set of objectives, this course also helps students to achieve the below university-wide student learning outcomes through lectures; classroom discussions; homework, essay and project assignments; and oral presentations. 2
3 Demonstrate the ability to think critically. This is achieved and measured by solving practical security related problems under different scenarios and by answering question in quizzes, examinations, etc. Locate and use information on security related topics. Homework and written assignments will involve current and emerging security technologies, requiring research on the Internet and the library s recent periodicals. Integrate knowledge and ideas in a coherent and meaningful manner. Lab sessions and projects will have problems applying and integrating various tools and security technologies towards securing computers, networks, and other computing recourses. Effectively express themselves in written and oral form. Students will be expected to carry out at least one extensive research project, hand in a written report, and make an oral presentation. 6. Topical Outline of the Course Content Data communication and networking concepts LANs; MANs; WANs; intranets and internets OSI seven-layer model and the TCP/IP protocol suite Structure and organization of the Internet Computer and network security: definition and scope Security and usability: user-centered security design principles Principles and goals of information, computer and network security Three basic security requirements: confidentiality, integrity, and availability Hackers, hacking techniques, hacking strategies and tools Network attacks or threats: virus, spyware, adware, buffer overflow, spyware, denial of service, rootkits, botnets, phishing, spamming, etc. Network defenses techniques, technologies, and tools: security monitoring, encryption, firewall, VPNs, authentication mechanisms, access controls, intrusion detection and prevention, key infrastructures, antivirus software, computer forensics. Internet security: SSL, TLS, IP security, S/MIME, Kerberos, X.509, and federated identity management. Wireless threat and security Privacy and cryptography: encryption algorithms and standards Public key infrastructure and certificates Security policy, standard, plan, implementation and audit ITU-T X.800: security services and mechanism The Orange Book : Department of Defense Trusted Computer System Evaluation Criteria basis for assessing and securing a system Operating system security tools; managing security: Solaris UNIX security system; Linux UNIX security system; Windows 2008 security system Introduction to network security management and administration Legal and ethical issues in security Future security trends: hardware-based security. 3
4 7. Guidelines/Suggestions for Teaching Methods and Student Learning Activities Inquiry-based lectures Multimedia demonstrations Hands-on lab projects Problem solving sessions Group discussions Reading assignments and term papers Homework, quizzes, and exam 8. Guidelines/Suggestions for Methods of Student Assessment (student learning outcomes) Student learning outcome will be assessed based on the following activities: Weekly homework Reading assignments hands-on lab sessions At least one extensive research project Biweekly quizzes and the final examination Attendance and classroom participation in discussions 9. Suggested Reading, Texts, Objects of Study William Stallings and Lawrie Brown, Computer Security: Principles and Practice, Prentice Hall, The book provides a comprehensive coverage of topics of computer and network security. It also provides support for both research and modeling projects, for both academic and professional audiences. Topics include: Security technologies and principles; threats and countermeasures, from detecting intruders to countering attacks; trusted computing and multilevel security; secure software: Linux and Windows security models; managing security; computer crime, intellectual property, privacy, and ethics; cryptographic algorithms and applications; Internet security including SSL, TLS, IP security, S/MIME, Kerberos, X.509. Lorrie F. Crantor and Simson Garfinkel, Security and Usability: Designing Security Systems People Can Use, O Reilly Media. Inc The book discusses the tradeoff between computer security and usability. It groups 34 essays into six parts: Realigning Usability and Security; Authentication Mechanisms; Secure Systems; Privacy and Anonymity Systems; Commercializing Usability; and the Vendor Perspective--specific experiences of security and software vendors in addressing usability. Michael Whitman, Herbert Mattord, Networking & Security: Principles of Information Security, 3 rd Edition, Course Technology 2007 The book provides an introduction into computer security in general and discusses the important managerial topics for a career in information security. It uses examples of information security issues, tools, and practices implemented in today's businesses, fostering real-world application. Chuck Easttom, Computer Security Fundamentals, Prentice Hall, This book provides coverage of all the basic concepts, terminology and issues, along with essential practical skills. Topics covered include virus attacks, buffer overflow, hacking spyware and network 4
5 defense, cyber terrorism, industrial espionage and encryption, denial of service attacks, malware, basics of assessing and securing a system, Internet fraud, cyber crime, and information warfare, cyber detective, security hardware and software. 10. Bibliography of Supportive Texts and Other Materials Security: Richard Bejtlich, The Tao of Network Security Monitoring: Beyond Intrusion Detection, Addison-Wesley, The book explores the products, people, and processes that implement the NSM model. By focusing on case studies and the application of open source tools, it helps you gain hands-on knowledge of how to better defend networks and how to mitigate damage from security incidents. It also discusses how to use a variety of open-source tools including Sguil, Argus, and Ethereal to mine network traffic for full content, session, statistical, and alert data. Tony Bradley and Harlan Carvey, Essential Computer Security: Everyone s Guide to , Internet, and Wireless Security, Syngress Publishing, Inc, 2006 The book provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves. Harlan Carvey, Windows Forensics and Incident Recovery, Addison-Wesley, This book provides a 'command-line centric' view of Microsoft and non-microsoft tools for security and system administration on the Windows platform". It focuses on forensics and incident recovery with case studies and real world-examples that cover every significant incident response, recovery, and forensics technique. It discusses methodology for responding to potential attacks and prepares systems to detect incidents, recognize the signatures of an attack, and uncover attacks that evade detection by Event Viewer, Task Manager, and other Windows GUI tools John Chirillo and Edgar Danielyan, Sun Certified Security Administrator for Solaris 9 & 10 Study Guide It is an exam prep book for certification exam based on proven pedagogy, including step-by-step exercises, on-the-job elements, chapter self-tests and more. Run the UNIX based exam engine - included for Sun purists. Greg Conti, Googling Security: How Much Does Google Know About You? Prentice Hall 2009 The book reveals how Google s vast information stockpiles could be used against you or your business and what you can do to protect yourself. It reveals the privacy implications of Gmail, Google Maps, Google Talk, Google Groups, Google Alerts, Google s new mobile applications, and more. It shows how Google s databases can be used by others with bad intent, even if Google succeeds in its pledge of don t be evil. Mirkovic, Dietrich, Dittrich & Reiher, Internet Denial of Service: Attack and Defense Mechanisms, Prentice Hall, DoS is a pervasive and growing threat to the Internet. The book sheds light on a complex and fascinating form of computer attack that impacts the confidentiality, integrity, and availability of millions of computers worldwide. It tells the network administrator, corporate CTO, incident responder, and student how DDoS attacks are prepared and executed, how to think about DDoS, and how to arrange computer and network defenses. It also provides a suite of actions that can be taken before, during, and after an attack. Chuck Easttom, Network Defense and Countermeasures: Principles and Practices, 5
6 Prentice Hall, The book covers a wide range of defense strategies, forms of attacks, and policies related to computer security. Key topics include firewalls, intrusion detection systems, encryption fundamentals, operating system hardening, defending against virus attacks, Trojan horses and spyware, security policies and security standards that are particularly useful for network administrators, network security professionals and security audit professionals. Rob Flickenger and Roger Weeks, Wireless Hacks: Tips and tools for building, Extending, and Securing Your Systems, O Reilly The books provides practical tips and tricks of tens of hacks ranging from passive network scanning to aligning long-distance antennas, beefing up wireless network security, and beyond. Sari Greene, Security Policies and Procedures: Principles and Practices, Prentice Hall, The book teaches information security policies and procedures and provides students with handson practice developing a security policy. This book provides an introduction to security policy, coverage of information security regulation and framework, and policies specific to industry sectors, including financial, healthcare and small business. Peter Gregory, Solaris Security, Sun Microsystems,2000 The book provides a concise guide to maintaining secure systems in the Solaris environment. It covers standalone and networked systems running Solaris and presents a special section on disaster preparation and recovery operations. Michael Gregg, Certified Ethical Hacker Exam Prep, Pearson, A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker. The CEH certification prepares professionals for network penetration testing skills. Along with the most current CEH content, the book also contains the elements that make Exam Preps such strong study aides: comprehensive coverage of exam topics, end-of-chapter review, practice questions, Exam Alerts, Fast Facts, plus an entire practice exam to test your understanding of the material. Greg Hoglund, Gary McGraw, Exploiting Online Games: Cheating Massively Distributed Systems, Prentice Hall 2009 You don't want to be the last person to attack your own system--you should be the first. In our new age where virtual items carry real dollar value, and fortunes are won and lost over items that do not really exist, the new threats to the intrepid gamer are all too real. To protect against these hazards, you must understand them, and this book discusses how to computer games can be exploited so that one can stay one step behind the bad guys. Jesper M. Johansson and Steve Riley, Protect Your Windows Network: From Perimeter to Data, Addison-Wesley, This book addresses the security problem holistically. Through hands-on examples and practical case studies, you will learn how to integrate multiple defenses deterring attacks, delaying them, and increasing the cost to the attacker. Coverage includes: Improving security from the top of the network stack to the bottom; Understanding what you need to do right away and what can wait; Avoiding "pseudo-solutions" that offer a false sense of security; Developing effective security policies and educating those pesky users; Beefing up your first line of defense: physical and perimeter security; Modeling threats and identifying security dependencies; Preventing rogue access from inside the network; Systematically hardening Windows servers and clients; Protecting client applications, server applications, and Web services; and Addressing the unique challenges of small business network security. Raymond Panko, Corporate Computer and Network Security, Prentice Hall
7 The book examines computer and corporate security in the business setting. Its emphasizes implementing security within corporations using existing commercial software and provides coverage of all major security issues. Charles P. Pfleeger, Security in Computing, 3 rd edition, Prentice Hall 2002 The book covers cryptography; program and operating system security; administration; legal, privacy, and ethical issues, etc. It combines core computer science concepts related to operating systems, networks, data bases, and programming, with accessible discussions of the use of cryptography and protocols. The book describes each important area from a developer's or user's point of view, lays out the security vulnerabilities and threats, and follows countermeasures to address them. Honeynet Project, Know Your Enemy: Learning about Security Threats, 2 nd edition, Addison-Wesley, The Honeynet, a relatively new security technology made up of networks of systems that are designed to be compromised. It is created by the Research Alliance and active contributors throughout the security community. The book discusses how to set up a honeynet, how to analyze the collected data, and what the authors have learned about "the enemy" from the data. It covers new techniques and technologies never published before, including second-generation and distributed Honeynets. It also explains data analysis in much greater detail, with entire chapters dedicated to Window forensics, UNIX forensics, reverse engineering, and network forensics. Jakobsson & Ramzan, Crimeware: Understanding New Attacks and Defenses, Addison-Wesley, 2008 This book discusses essential security principles, techniques, and countermeasures to keep you one step ahead of the criminals, regardless of evolving technology and tactics. It helps you understand how crimeware works, how to identify it, and how to prevent future attacks before company s valuable information falls into the wrong hands. It will also help a reader to understand current and emerging security threats including rootkits, bot networks, spyware, adware, and click fraud; to recognize the interaction between various crimeware threats; to gain awareness of the social, political, and legal implications of these threats; to learn valuable countermeasures to stop crimeware in its tracks, now and in the future; and to acquire insight into future security trends and threats, and create an effective defense plan. Edward Skoudis, Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses, 2 nd edition, Prentice Hall PTR, This book helps one understands attack strategies, attack tools, and the defenses against both It covers everything from the basic principles to the fine details of online attack methods and counterstrategies, to effective defenses, recognize attacks in progress, and respond quickly and effectively in both UNIX/Linux and Windows environments. Important features of this new edition include "anatomyof-an-attack" scenarios and tools, an section on wireless hacking: war driving, wireless sniffing attacks, a comprehensive coverage of reconnaissance tools, including Nmap port scanning and "Google hacking", and more. Sean Smith & John Marchesini, Craft of System Security, Addison-Wesley, 2008 The book first provides a coherent framework for understanding today's systems and vulnerabilities. It then systematically introduces the basic building blocks for securing contemporary systems, apply those building blocks to today's applications, and consider important emerging trends such as hardware-based security. It discusses the classic Orange Book approach to security, and its limitations; the use of operating system security tools and structures--with examples from Windows, Linux, BSD, and Solaris; how networking, the Web, and wireless technologies affect security; software security defects, from buffer overflows to development process flaws; cryptographic primitives and their use in secure systems; the best practice techniques for authenticating people and computer systems in diverse settings; the use of validation, standards, and testing to enhance confidence in a system's security; the security, privacy, and trust issues arising from desktop productivity tools; the digital rights management, watermarking, information hiding, and policy expression; the principles of humancomputer interaction (HCI) design for improved security; and the potential of emerging work in hardware-based security and trusted computing 7
8 William Stallings, Cryptography and Network Security, 4th Edition, Prentice Hall The bool provides a comprehensive treatment of cryptography and network security. It explores the basic issues of cryptography and network security technology; examines the practice of network security via applications that are in use today; provides a simplified AES that enables readers to grasp the essentials of AES more easily; features block cipher modes of operation, including the CMAC mode for authentication and the CCM mode for authenticated encryption; and includes an expanded, updated treatment of intruders and malicious software. Peter Szor, The Art of Computer Virus Research and Defense, Addison-Wesley, The book discusses how viruses are analyzed, how they spread, and can they be effectively defended against. It offers an encyclopedic treatment of computer viruses, including: a history of computer viruses, viral behaviors, classification, protection strategies, anti-virus techniques, and how to conduct an accurate threat analysis. Topics include: Discovering how malicious code attacks on a variety of platforms; Classifying malware strategies for infection, in-memory operation, self-protection, payload delivery, exploitation, and more; Identifying and responding to code obfuscation threats: encrypted, polymorphic, and metamorphic; Mastering empirical methods for analyzing malicious code and what to do with what you learn; Reverse-engineering malicious code with disassemblers, debuggers, emulators, and virtual machines; Implementing technical defenses: scanning, code emulation, disinfection, inoculation, integrity checking, sandboxing, honeypots, behavior blocking; and Using worm blocking, host-based intrusion prevention, and network-level defense strategies Vladimirov, Gavrilenko & Mikhailovsky, Wi-Foo: The Secrets of Wireless Hacking, Addison-Wesley, 2004 The book introduces the 'battlefield,' exposing today's 'wide open' wireless networks and their attackers. In a stepwise manner, the book introduces the entire arsenal of hardware and software tools: crucial knowledge for crackers and auditors alike. The book then discusses systematically the countermeasures for building hardened wireless 'citadels'' including cryptography-based techniques, authentication, wireless VPNs, intrusion detection, and more. Topics include: walkthroughs and explanations of typical attacks; Building wireless hacking/auditing toolkit: detailed recommendations, ranging from discovery tools to chipsets and antennas; War-driving: network mapping and site surveying; Potential weaknesses in current and emerging standards, including i, PPTP, and IPSec; Implementing strong, multilayered defenses; Wireless IDS: why attackers aren't as untraceable as they think; Wireless hacking and the law: what's legal, what isn't. Linda Volonino, Reynaldo Anzaldua, Jana Godwin, Computer Forensics: Principles and Practices, Prentice Hall 2008 By applying information systems, computer security, and criminal justice principles and practices to crime investigations and other legal actions, this text teaches students how to use forensically-sound methodologies and software to acquire admissible electronic evidence (e-evidence) with coverage of computer and forensics, cell phone and IM forensics, and PDA and Blackberry forensics. Wallace Wang, Steal This Computer Book 4.0: What They Won't Tell You About the Internet, 4th edition, No Starch Press, This is a non-technical book that examines what hackers do, how they do it, and how readers can protect themselves. Informative, irreverent, and entertaining, the completely revised fourth edition of Steal This Computer Book contains new chapters that discuss the hacker mentality, lock picking, exploiting P2P file sharing networks, and how people manipulate search engines and pop-up ads. Includes a CD with hundreds of megabytes of 100% FREE hacking and security-related programs that tie-in to each chapter in the book. Websites for Information on Security: 8
9 ITU X.800: Security Architecture for Open System Interconnection for CCITT Connection recommendation ( ) Department of Defense: Department of Defense Trusted Computer System Evaluation Criteria or TCSEC ( or for a short summary, visit CERT Coordination Center (CERT/CC), addresses risks at the software and system level and focuses in recent years on identifying and addressing existing and potential threats, notifying system administrators and other technical personnel of these threats, and coordinating with vendors and incident response teams worldwide to address the threats ( The Honeynet Project: an international, non-profit research organization dedicated to improving the security of the Internet ( Statistics on recent top security risks and other useful security related information Nmap is a free and open source utility for network exploration or security auditing. Many systems and network administrators find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime, etc. ( Operating Systems: Roberta Bragg, Windows Server 2003 Security: A Technical Reference, Addison Wesley, The book summarizes decades in IT administration and security. It covers the core principles of information security throughout your plans and processes; establishes effective authentication and passwords; restricts access to servers, application software, and data; makes the most of the Encrypting File System (EFS); uses Active Directory's security features and secure Active Directory itself; develops, implements, and troubleshoots group policies; deploys a secure Public Key Infrastructure (PKI); secures remote access using VPNs via IPSec, SSL, SMB signing, LDAP signing, and more; audits and monitor your systems, detect intrusions, and respond appropriately; maintains security and protect business continuity on an ongoing basis. Brian Komar, Windows Server 2008 PKI and Certificate Security, Get in-depth guidance for designing and implementing certificate-based security solutions straight from PKI expert Brian Komar. No need to buy or outsource costly PKI services when you can use the robust PKI and certificate-based security services already built into Windows Server 2008! This in-depth reference teaches you how to design and implement even the most demanding certificate-based security solutions for wireless networking, smart card authentication, VPNs, secure , Web SSL, EFS, and code-signing applications using Windows Server PKI and certificate services. A principal PKI consultant to Microsoft, Brian shows you how to incorporate best practices, avoid common design and implementation mistakes, help minimize risk, and optimize security administration. This definitive reference features a CD loaded with tools, scripts, and a fully searchable ebook. Jesper M. Johansson and MVPs with the Microsoft Security Team, Windows Server 2008 Security Resource Kit, Microsoft
10 The book covers planning and implementing security features in Windows Server 2008 and delivers the in-depth, technical information and tools one need to help protect your Windows based clients, server roles, networks, and Internet services. It also discusses how to plan and implement comprehensive security with special emphasis on new Windows security tools, security objects, security services, user authentication and access control, network security, application security, Windows Firewall, Active Directory security, group policy, auditing, and patch management. Gary Nutt, Operating Systems, 3rd edition, Addison Wesley 2003 William Stallings, Operating Systems: Internals and Design Principles, 6th edition; Pearson/Prentice Hall 2008 Andrew Tanenbaum, Operating Systems, 3rd edition; Pearson/Prentice Hall 2008 Paul A. Watters, The Complete Reference: Solaris 10, McGraw Hill/Osborne 2005 Discussions of security from the standpoint of system administration with five chapters: System security; File system access control; Role-based access control; Users, groups, and Sun Management Console; Kerberos and pluggable authentication. Networking fundamentals: William J. Beyda, Data Communications: From Basics to Broadband, 4 th edition, Prentice Hall, Bradford, The Art of Computer Networking, Prentice Hall, J. Richard Burke, Network Management: Concepts and Practice, A Hands-On Approach, Prentice Hall, Douglas E. Comer, Hands-on Networking with Internet Technologies, 2 nd edition, Prentice Hall, Douglas E. Comer, The Everything You Need to Know About Computer Networking and How the Internet Works, 3 rd edition, Prentice Hall 2000 Douglas E. Comer, Computer Networks and Internets, 5 th edition, Prentice Hall 2009 Behrouz A. Forouzan, Data Communications and Networking, 4 th edition McGraw Hill 2007 Joe Habraken, Absolute Beginner's Guide to Networking, 4 th edition, Que, Fred Halsall, Computer Networking and the Internet, 5 th edition,addison-wesley, Bruce Hallberg, Networking: A Beginner's Guide, 4 th edition, McGraw-Hill Osborne Media, 2005 James F. Kurose & Ross, Computer Networking: A Top-Down Approach, 4 th edition, 10
11 Addison-Wesley, Jorg Liebeherr & El Zarki, Mastering Networks: An Internet Lab Manual, Addison- Wesley, Radia Perlman, Interconnections: Bridges, Routers, Switches, and Internetworking Protocols, 2 nd edition, Addison-Wesley, Stanford H. Rowe, Computer Networking, Prentice Hall, William Stallings, Data and Computer Communications, 8 th edition, Prentice Hall, 2007 Andrew S. Tanenbaum, Computer Networks, 4 th edition, Prentice Hall 2004 Wireless and Mobile Computing: Harold Davis, Anywhere Computing with Laptops: Making Mobile Easier, Que Publishing, Harold Davis, Absolute Beginner's Guide to Wi-Fi Wireless Networking, Que Publishing, 2004 Andy Dornan, The Essential Guide to Wireless Communications Applications, 2 nd edition, Prentice Hall, Roger Riggs, A. Taivalsaari, et al., Programming Wireless Devices with the Java 2 Platform, Micro Edition, 2 nd edition, Prentice Hall, Jochen Schiller, Mobile Communications, 2 nd edition, Addison-Wesley, Network+ and Networking Administration/Pragmatics: David Groth, T. Skandier, B.l Ferguson, CompTIA Network+ Certification Kit: Exam N10-003, Sybex, David Groth, T. Skandier, et al., Network+ Study Guide: Exam N10-003, Deluxe, 2 nd edition, Sybex, J. Scott Haugdahl, Network Analysis and Troubleshooting, Addison-Wesley Professional, Thomas Limoncelli, C.J. Hogan, Strata R. Chalup, Practice of System and Network Administration, 2 nd edition, Addison-Wesley,
12 Tamara Dean, Network+ Guide to Networks, 4th edition, Course Technology, Andrew F. Ward, Connecting to the Internet: A Practical Guide about LAN-Internet Connectivity, Addison-Wesley Professional, Preparers Name and Date: Dr. Erh-Wen Hu, March 21, Original Departmental Approval Date: Fall, Reviser s Name and Date: NA 14.Departmental Revision Approval Date: NA 12
CEH: CERTIFIED ETHICAL HACKER v9
CEH: CERTIFIED ETHICAL HACKER v9 SUMMARY The Certified Ethical Hacker (CEH) program is the core of the most desired information security training system any information security professional will ever
More informationCISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline
CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker Learn to find security vulnerabilities before the bad guys do! The Certified Ethical Hacker (CEH) class immerses students in an interactive environment
More informationCourse overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)
Overview This course is intended for those wishing to qualify with CompTIA Security+. CompTIA's Security+ Certification is a foundation-level certificate designed for IT administrators with 2 years' experience
More informationEC-Council C EH. Certified Ethical Hacker. Program Brochure
EC-Council TM H Program Brochure Course Description The (CEH) program is the core of the most desired information security training system any information security professional will ever want to be in.
More informationSecurity+ SY0-501 Study Guide Table of Contents
Security+ SY0-501 Study Guide Table of Contents Course Introduction Table of Contents About This Course About CompTIA Certifications Module 1 / Threats, Attacks, and Vulnerabilities Module 1 / Unit 1 Indicators
More informationCertified Ethical Hacker (CEH)
Certified Ethical Hacker (CEH) COURSE OVERVIEW: The most effective cybersecurity professionals are able to predict attacks before they happen. Training in Ethical Hacking provides professionals with the
More informationWILLIAM PATERSON UNIVERSITY OF NEW JERSEY COLLEGE OF SCIENCE AND HEALTH Computer Science Department Course Outline
WILLIAM PATERSON UNIVERSITY OF NEW JERSEY COLLEGE OF SCIENCE AND HEALTH Computer Science Department Course Outline 1. Title of Course, Course Number and Credits: CS399 Net-Centric Computing, 3 credits
More informationCourse 831 EC-Council Certified Ethical Hacker v10 (CEH)
Course 831 EC-Council Certified Ethical Hacker v10 (CEH) Duration: 5 days What You Get: CEH v10 Certification exam voucher 5 days of high quality classroom training 18 comprehensive modules 40% of class
More informationCourse Intended Learning Outcomes (CILOs): Upon successful completion of this course, students should be able to:
Title (Units): COMP 7330 Information Systems Security & Auditing (3,3,0) Course Aims: Prerequisite: To introduce the fundamental concepts and techniques in computer and network security, giving students
More informationSecuring Information Systems
Chapter 7 Securing Information Systems 7.1 2007 by Prentice Hall STUDENT OBJECTIVES Analyze why information systems need special protection from destruction, error, and abuse. Assess the business value
More informationHacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK
Hacker Academy Ltd COURSES CATALOGUE Hacker Academy Ltd. LONDON UK TABLE OF CONTENTS Basic Level Courses... 3 1. Information Security Awareness for End Users... 3 2. Information Security Awareness for
More informationCourse 831 Certified Ethical Hacker v9
Course 831 Certified Ethical Hacker v9 Duration: 5 days What You Get: CEH v9 Certification exam voucher 5 days of high quality classroom training 18 comprehensive modules 40% of class hours dedicated to
More informationComputer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers
Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,
More informationRYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education
RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education COURSE OF STUDY 2017-2018 (C)ITM 820 Information Systems Security and Privacy
More informationEthical Hacking and Prevention
Ethical Hacking and Prevention This course is mapped to the popular Ethical Hacking and Prevention Certification Exam from US-Council. This course is meant for those professionals who are looking for comprehensive
More informationEC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led
EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led Certification: Certified Network Defender Exam: 312-38 Course Description This course is a vendor-neutral, hands-on,
More informationThis ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process.
EC Council Certified Ethical Hacker V9 This ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process. Here, you will be exposed to an entirely different
More informationComputer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers
Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,
More informationCSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague
Brmlab, hackerspace Prague Lightning talks, November 2016 in general in general WTF is an? in general WTF is an? Computer Security in general WTF is an? Computer Security Incident Response in general WTF
More informationCompTIA Cybersecurity Analyst+
CompTIA Cybersecurity Analyst+ Course CT-04 Five days Instructor-Led, Hands-on Introduction This five-day, instructor-led course is intended for those wishing to qualify with CompTIA CSA+ Cybersecurity
More informationNEW YORK CITY COLLEGE OF TECHNOLOGY/CUNY Computer Systems Technology Department
NEW YORK CITY COLLEGE OF TECHNOLOGY/CUNY Computer Systems Technology Department COURSE: CST2307 Networking Fundamentals (2 class hours, 2 lab hours, 3 credits) Course Description: This course introduces
More informationStandard Course Outline IS 656 Information Systems Security and Assurance
Standard Course Outline IS 656 Information Systems Security and Assurance I. General Information s Course number: IS 656 s Title: Information Systems Security and Assurance s Units: 3 s Prerequisites:
More informationFRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months
FRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months MODULE: INTRODUCTION TO INFORMATION SECURITY INFORMATION SECURITY ESSENTIAL TERMINOLOGIES
More informationAdvanced Security Tester Course Outline
Advanced Security Tester Course Outline General Description This course provides test engineers with advanced skills in security test analysis, design, and execution. In a hands-on, interactive fashion,
More informationFaculty of Science & Information Technology
Faculty of Science & Information Technology Department: Computer Science COURSE SYLLABUS Short Description Student s Copy One copy of this course syllabus is provided to each student registered in this
More informationE-guide Getting your CISSP Certification
Getting your CISSP Certification Intro to the 10 CISSP domains of the Common Body of Knowledge : The Security Professional (CISSP) is an information security certification that was developed by the International
More informationHOLY ANGEL UNIVERSITY COLLEGE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY CYBER SECURITY COURSE SYLLABUS
HOLY ANGEL UNIVERSITY LLEGE OF INFORMATION AND MMUNICATIONS TECHNOLOGY CYBER SECURITY URSE SYLLABUS Course Code : 6CSEC Prerequisite : 6MPRO2L Course Credit : 3 Units (2 hours LEC,3 hours LAB) Year Level:
More informationCOMPUTER TECHNOLOGY (COMT)
Kent State University Catalog 2017-2018 1 COMPUTER TECHNOLOGY (COMT) COMT 11000 INTRODUCTION TO OFFICE PRODUCTIVITY APPS 3 Credit (Equivalent to MIS 24053) Covers the basic concepts and use of computer
More informationCCISO Blueprint v1. EC-Council
CCISO Blueprint v1 EC-Council Categories Topics Covered Weightage 1. Governance (Policy, Legal, & Compliance) & Risk Management 1.1 Define, implement, manage and maintain an information security governance
More informationNetworks and Communications MS216 - Course Outline -
Networks and Communications MS216 - Course Outline - Objective Lecturer Times Overall Learning Outcomes Format Programme(s) The objective of this course is to develop in students an understanding of the
More informationPrinciples of ICT Systems and Data Security
Principles of ICT Systems and Data Security Ethical Hacking Ethical Hacking What is ethical hacking? Ethical Hacking It is a process where a computer security expert, who specialises in penetration testing
More informationCourse Outline. CISSP - Certified Information Systems Security Professional
Course Outline CISSP - Certified Information Systems Security 10 Jan 2019 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led
More informationEC-Council C EH. Certified Ethical Hacker. Program Brochure
EC-Council TM C EH Program Brochure Target Audience This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the
More informationCASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)
CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001) Gregg, Michael ISBN-13: 9781118083192 Table of Contents Foreword xxi Introduction xxvii Assessment Test xliv Chapter 1 Cryptographic
More informationETHICAL HACKING & COMPUTER FORENSIC SECURITY
ETHICAL HACKING & COMPUTER FORENSIC SECURITY Course Description From forensic computing to network security, the course covers a wide range of subjects. You will learn about web hacking, password cracking,
More informationInstructor: Eric Rettke Phone: (every few days)
Instructor: Eric Rettke Phone: 818 364-7775 email: rettkeeg@lamission.edu (every few days) Fall 2016 Computer Science 411 - Principles of Cyber Security 1 Please keep a copy of the syllabus handy for the
More informationCertified Ethical Hacker
Certified Ethical Hacker Certified Ethical Hacker Course Objective Describe how perimeter defenses function by ethically scanning and attacking networks Conduct information systems security audits by understanding
More informationThe University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus
The University of Jordan Accreditation & Quality Assurance Center COURSE Syllabus 1 Course title Computer Security 2 Course number 1901463 Credit hours (theory, practical) 3 3 Contact hours (theory, practical)
More informationBachelor of Information Technology (Network Security)
Course information for Bachelor of Information Technology (Network Security) Course Number HE20524 Location Meadowbank Course Design The Bachelor of Information Technology (Network Security) is a three-year
More informationCompTIA Security+ (Exam SY0-401)
CompTIA Security+ (Exam SY0-401) Course Overview This course will prepare students to pass the current CompTIA Security+ SY0-401 certification exam. After taking this course, students will understand the
More informationSINGLE COURSE. NH9000 Certified Ethical Hacker 104 Total Hours. COURSE TITLE: Certified Ethical Hacker
NH9000 Certified Ethical Hacker 104 Total Hours COURSE TITLE: Certified Ethical Hacker COURSE OVERVIEW: This class will immerse the student into an interactive environment where they will be shown how
More informationEC-Council. Program Brochure. EC-Council. Page 1
Program Brochure Page 1 Certified Ethical Hacker Version 7 Revolutionary Product releases the most advanced ethical hacking program in the world. This much anticipated version was designed by hackers and
More informationEnterprise Cybersecurity Best Practices Part Number MAN Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
More informationCRAW Security. CRAW Security
Course Description The Certified Ethical Hacker (CEH) program is the core of the most desired information security training system any information security professional will ever want to be in. The CEH,
More informationPearson CompTIA: Security+ SY0-401 (Course & Lab) Course Outline. Pearson CompTIA: Security+ SY0-401 (Course & Lab)
Course Outline Pearson CompTIA: Security+ SY0-401 (Course & Lab) 03 May 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led
More informationCOMPUTER FORENSICS (CFRS)
Computer Forensics (CFRS) 1 COMPUTER FORENSICS (CFRS) 500 Level Courses CFRS 500: Introduction to Forensic Technology and Analysis. 3 credits. Presents an overview of technologies of interest to forensics
More informationCIW: Web Security Associate. Course Outline. CIW: Web Security Associate. 12 Oct ( Add-On )
Course Outline 12 Oct 2018 ( Add-On ) Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training 5. ADA Compliant
More informationACS / Computer Security And Privacy. Fall 2018 Mid-Term Review
ACS-3921-001/4921-001 Computer Security And Privacy Fall 2018 Mid-Term Review ACS-3921/4921-001 Slides Used In The Course A note on the use of these slides: These slides has been adopted and/or modified
More informationAURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo
ETHICAL HACKING (CEH) CURRICULUM Introduction to Ethical Hacking What is Hacking? Who is a Hacker? Skills of a Hacker? Types of Hackers? What are the Ethics and Legality?? Who are at the risk of Hacking
More informationPearson: Certified Ethical Hacker Version 9. Course Outline. Pearson: Certified Ethical Hacker Version 9.
Course Outline Pearson: Certified Ethical Hacker Version 9 27 Jun 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led
More informationPearson CISSP Cert Guide with Labs. Course Outline. Pearson CISSP Cert Guide with Labs. 17 Oct
Course Outline Pearson CISSP Cert Guide with Labs 17 Oct 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training
More informationDescriptions for CIS Classes (Fall 2017)
Descriptions for CIS Classes (Fall 2017) Major Core Courses 1. CIS 1015. INTRODUCTION TO COMPUTER INFORMATION SYSTEMS. (3-3-0). This course provides students an introductory overview to basic computer
More informationCompTIA Security+ Certification
CompTIA Security+ Certification Course Number: SY0-301 Length: 5 Days Certification Exam This course is preparation for the CompTIA Security+ Certification exam. Course Overview This course will prepare
More informationCEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 12 May 2018
Course Outline CEH v8 - Certified Ethical Hacker 12 May 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training
More informationSecure Programming. Course material Introduction. 3 Course material. 4 Contents
2 Course material 1 Secure Programming Introduction Ahmet Burak Can Hacettepe University Counter Hack Reloaded:A Step-by- Step Guide to Computer Attacks and Effective Defenses, Edward Skoudis, Tom Liston,
More informationSecure Programming. Introduction. Ahmet Burak Can Hacettepe University
Secure Programming Introduction 1 Ahmet Burak Can Hacettepe University 2 Course material Counter Hack Reloaded:A Step-by- Step Guide to Computer Attacks and Effective Defenses, Edward Skoudis, Tom Liston,
More informationSTUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences
STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences Undergraduate Programs - Bachelor B.S. Computer Game Design Upon completion of the B.S. degree in Computer Game Design, students
More informationSecuring Information Systems
Chapter 7 Securing Information Systems 7.1 Copyright 2011 Pearson Education, Inc. STUDENT LEARNING OBJECTIVES Why are information systems vulnerable to destruction, error, and abuse? What is the business
More informationSyllabus: The syllabus is broadly structured as follows:
Syllabus: The syllabus is broadly structured as follows: SR. NO. TOPICS SUBTOPICS 1 Foundations of Network Security Principles of Network Security Network Security Terminologies Network Security and Data
More informationSecurity Solutions. Overview. Business Needs
Security Solutions Overview Information security is not a one time event. The dynamic nature of computer networks mandates that examining and ensuring information security be a constant and vigilant effort.
More informationCUNY John Jay College of Criminal Justice MATH AND COMPUTER SCIENCE
Instructor: Prof Aftab Ahmad Office: NB 612 Telephone No. (212)393-6314 Email Address: aahmad@jjay.cuny.edu Office Hours: By appointment TEXT & REFERENCE MATERIAL Text Notes from instructor posted on Blackboard
More informationAdvanced Diploma on Information Security
Course Name: Course Duration: Prerequisites: Course Fee: Advanced Diploma on Information Security 300 Hours; 12 Months (10 Months Training + 2 Months Project Work) Candidate should be HSC Pass & Basic
More informationOVERVIEW OF SUBJECT REQUIREMENTS
Course Bachelor of Information Technology (Network Security) Course Number HE20524 Location Meadowbank OVERVIEW OF SUBJECT REQUIREMENTS Note: This document is intended as a guide only. Enrolling students
More informationCourse 832 EC-Council Computer Hacking Forensic Investigator (CHFI)
Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Duration: 5 days You Will Learn How To Understand how perimeter defenses work Scan and attack you own networks, without actually harming
More informationMLR Institute of Technology
MLR Institute of Technology Laxma Reddy Avenue, Dundigal, Quthbullapur (M), Hyderabad 500 043 Phone Nos: 08418 204066 / 204088, Fax: 08418 204088 COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION Course
More informationITSY 2330 Intrusion Detection Course Syllabus
ITSY 2330 Intrusion Detection Course Syllabus Instructor Course Reference Number (CRN) Course Description: Course Prerequisite(s) Course Semester Credit Hours (SCH) (Lecture, Lab) Name: Hung Le Tel: Office:
More informationCurso: Ethical Hacking and Countermeasures
Curso: Ethical Hacking and Countermeasures Module 1: Introduction to Ethical Hacking Who is a Hacker? Essential Terminologies Effects of Hacking Effects of Hacking on Business Elements of Information Security
More informationV8 - CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 03 Feb 2018
Course Outline CEH v8 - Certified Ethical Hacker 03 Feb 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training
More informationIT Technician Pathways Course Guide
IT Technician Pathways Course Guide Stage Computer Retail Sales and Support Course Name or Topic Introduction to Retail or Business Fundamentals Related 3 rd Party Certifications C-ID IT-MC C-ID BUS 100
More informationCourse Outline. CISSP - Certified Information Systems Security Professional 2015 (Course & Labs)
Course Outline CISSP - Certified Information Systems Security Professional 2015 (Course & Labs) 09 Nov 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number
More informationWilliam Paterson University of New Jersey Department of Computer Science College of Science and Health Course Outline
William Paterson University of New Jersey Department of Computer Science College of Science and Health Course Outline 1. TITLE OF COURSE AND COURSE NUMBER: Computer and Information Technology; CS201; Credits:
More informationBACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY
Bachelor of Science in Information Technology BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Description and Outcomes The objective of the Bachelor of Science in Information Technology program is to help
More informationCEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 15 Jan
Course Outline CEH v8 - Certified Ethical Hacker 15 Jan 2019 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training
More informationITT Technical Institute. CS420 Application Security Onsite Course SYLLABUS
ITT Technical Institute CS420 Application Security Onsite Course SYLLABUS Credit hours: 4 Contact/Instructional hours: 50 (30 Theory Hours, 20 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites:
More informationSpecialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com
Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE s3security.com Security Professional Services S3 offers security services through its Security Professional Services (SPS) group, the security-consulting
More informationCompTIA Security+ SY Course Outline. CompTIA Security+ SY May 2018
Course Outline 09 May 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training 5. ADA Compliant & JAWS Compatible
More informationSecuring Information Systems
Introduction to Information Management IIM, NCKU System Vulnerability and Abuse (1/6) Securing Information Systems Based on Chapter 8 of Laudon and Laudon (2010). Management Information Systems: Managing
More informationInformation Technology AS and Network Administration & Security AAS Proposed Changes Version 02. Network Admin & Security AAS Proposed
Information Technology AS and Network Administration & Security AAS Proposed Changes Version 02 Semester Information Technology AS Fall 2015 Information Technology AS Proposed Network Admin & Security
More informationCS System Security 2nd-Half Semester Review
CS 356 - System Security 2nd-Half Semester Review Fall 2013 Final Exam Wednesday, 2 PM to 4 PM you may bring one 8-1/2 x 11 sheet of paper with any notes you would like no cellphones, calculators This
More informationCyber Criminal Methods & Prevention Techniques. By
Cyber Criminal Methods & Prevention Techniques By Larry.Boettger@Berbee.com Meeting Agenda Trends Attacker Motives and Methods Areas of Concern Typical Assessment Findings ISO-17799 & NIST Typical Remediation
More informationPND at a glance: The World s Premier Online Practical Network Defense course. Self-paced, online, flexible access
The World s Premier Online Practical Network Defense course PND at a glance: Self-paced, online, flexible access 1500+ interactive slides (PDF, HTML5 and Flash) 5+ hours of video material 10 virtual labs
More informationOklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017
Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017 ITD 3443 Network Security Students will provide Cyber Defense while understanding Cyber Threats. Their attack types
More informationCyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)
Cyber Security Presenters: - Brian Everest, Chief Technology Officer, Starport Managed Services - Susan Pawelek, Accountant, Compliance and Registrant Regulation February 13, 2018 (webinar) February 15,
More informationCybersecurity: Incident Response Short
Cybersecurity: Incident Response Short August 2017 Center for Development of Security Excellence Contents Lesson 1: Incident Response 1-1 Introduction 1-1 Incident Definition 1-1 Incident Response Capability
More informationA Review Paper on Network Security Attacks and Defences
EUROPEAN ACADEMIC RESEARCH Vol. IV, Issue 12/ March 2017 ISSN 2286-4822 www.euacademic.org Impact Factor: 3.4546 (UIF) DRJI Value: 5.9 (B+) A Review Paper on Network Security Attacks and ALLYSA ASHLEY
More informationTHE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION
BREACH & ATTACK SIMULATION THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION Cymulate s cyber simulation platform allows you to test your security assumptions, identify possible security gaps and receive
More informationCertified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
More informationDefense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation
Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client
More informationWhen Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER.
When Recognition Matters WHITEPAPER CLFE www.pecb.com CONTENT 3 4 5 6 6 7 7 8 8 Introduction So, what is Computer Forensics? Key domains of a CLFE How does a CLFE approach the investigation? What are the
More informationISC2. Exam Questions CISSP. Certified Information Systems Security Professional (CISSP) Version:Demo
ISC2 Exam Questions CISSP Certified Information Systems Security Professional (CISSP) Version:Demo 1. How can a forensic specialist exclude from examination a large percentage of operating system files
More informationAcademic Course Description
BEC012 - CRYPTOGRAPHY AND NETWORK SECURITY Academic Course Description BHARATH UNIVERSITY Faculty of Engineering and Technology Department of Electronics and Communication Engineering BEC012 Cryptography
More informationUnit code: D/601/1956 QCF Level 5: BTEC Higher National Credit value: 15
Unit 46: Network Security Unit code: D/601/1956 QCF Level 5: BTEC Higher National Credit value: 15 Aim To provide learners with opportunities to manage, support and implement a secure network infrastructure
More informationCHAPTER 8 SECURING INFORMATION SYSTEMS
CHAPTER 8 SECURING INFORMATION SYSTEMS BY: S. SABRAZ NAWAZ SENIOR LECTURER IN MANAGEMENT & IT SEUSL Learning Objectives Why are information systems vulnerable to destruction, error, and abuse? What is
More informationSoftware Development & Education Center Security+ Certification
Software Development & Education Center Security+ Certification CompTIA Security+ Certification CompTIA Security+ certification designates knowledgeable professionals in the field of security, one of the
More informationSan José State University School/Department Computer Science 265: Cryptography and Computer Security, Fall 2017
Course and Contact Information Instructor: Auston Davis Office Location: MacQuarrie Hall 217 Telephone: 650-454-6044 Email: Office Hours: Class Days/Time: auston.davis@sjsu.edu (preferred) Mon 6pm 7pm
More informationCPTE: Certified Penetration Testing Engineer
www.peaklearningllc.com CPTE: Certified Penetration Testing Engineer (5 Days) *Includes exam voucher, course video, an exam preparation guide About this course Certified Penetration Testing Engineer certification
More informationSYLLABUS. DIVISION: Business and Engineering Technology REVISED: FALL 2015 CREDIT HOURS: 4 HOURS/WK LEC: 4 HOURS/WK LAB: 0 LEC/LAB COMB: 4
SYLLABUS DIVISION: Business and Engineering Technology REVISED: FALL 2015 CURRICULA IN WHICH COURSE IS TAUGHT: IST, Information Systems Technology COURSE NUMBER AND TITLE: ITN 262 Cisco CCNA Security CREDIT
More informationIngram Micro Cyber Security Portfolio
Ingram Micro Cyber Security Portfolio Ingram Micro Inc. 1 Ingram Micro Cyber Security Portfolio Services Trainings Vendors Technical Assessment General Training Consultancy Service Certification Training
More informationCertStore is a ISO (International Standard Organization) Certified and Approved by Govt. Of India.
CertStore (The Certification Store) A complete certification online and offline store where you can accomplish any of IT certification and Training. CertStore is master and specialized to deliver the IT
More informationCompTIA Security+ Malware. Threats and Vulnerabilities Vulnerability Management
CompTIA Security+ Lecture Six Threats and Vulnerabilities Vulnerability Management Copyright 2011 - VTC Malware Malicious code refers to software threats to network and systems, including viruses, Trojan
More information