Jul 18, 2025  
2018-2019 Course Catalog 
    
2018-2019 Course Catalog [ARCHIVED CATALOG]

Add to Portfolio (opens a new window)

NET 612 - Fund of Network Security

Credits: 3
Lecture Hours: 3
Lab Hours: 0
Practicum Hours: 0
Work Experience: 0
Course Type: Voc/Tech
The course prepares students to recognize the threats and vulnerabilities present in existing information systems and to learn to design and develop the secure systems needed in the near future. It also prepares students for the role of decision-maker in the area of information security. Topics include legal and ethical issues, security technologies risk management, network and system security, cryptography and information security maintenance.
Competencies
  1. Discuss the history of Information Security
  2. Define security
    1. Identify critical characteristics of information
    2. Identify components of an information system
    3. Explain the security system development life cycle
  3. Identify threats to Information Security
  4. Identify examples of types of information system attacks
  5. Discuss legal, ethical, and professional issues in Information Security
    1. Investigate US Laws relevant to information security.
    2. Investigate international laws relevant to information security.
    3. Examine ethical issues relevant to information security.
    4. Identify professional organizations that deal with legal and ethical issues related to information security
  6. Define risk management
    1. Analyze the process of risk identification
    2. Explain the process of risk assessment
    3. Identify and explain risk control strategies
  7. Identify models and frameworks for planning Information Security Systems
  8. Identify Security Technologies
    1. Examine the elements of firewall technology
    2. Examine Virtual Private Networks
  9. Examine Security Technology tools
    1. Explain how Intrusion Detection systems work
    2. Identify scanning and analysis tools
    3. Investigate access control devices
    4. Explain the principals of cryptography
  10. Identify element of physical security
  11. Analyze issues related to personnel security
  12. Develop a plan for implementing and maintaining Information Security



Add to Portfolio (opens a new window)