Cyber Security Projected Schedule

Updated: 03/05/2014 10:21

Face-to-face hours are PM unless otherwise noted. This schedule is only for reference. Actual offerings may be different. Click links for course description, instructors, actual dates, and more.

Course Number Course Name Fall Term Winter Term Summer Term
ISEC 300 Principles of Information Security

ISEC 300 - Principles of Information Security

Credit Hour(s): 4

Prerequisite(s): Information Systems Architecture and Technology (MIS 310), Technical Communication (MIS 320), and Introduction to Ethical Analysis and Reasoning (HUMN 211)

In a highly connected, data intensive, and cost-focused business environment, the practice of information security not a business advantage; it is a customer requirement. Viruses, malware, trojans, denial of service attacks, phishing, and even Wiki leaks have become headline news. Failure to insure the confidentiality, integrity, and availability of data costs companies millions, if not billions of dollars in legal settlements, lost business, and trade secrets. In this breadthbased course, you will get an overview of information security principles and practices, including security models, risk management, access controls, intrusion detection and prevention, cryptography, software vulnerabilities, and ethical issues. Subsequent courses expand on this foundational material in much greater depth.

Hybrid Hybrid Hybrid
ISEC 325 Network Security

ISEC 325 - Network Security

Credit Hour(s): 4

Prerequisite(s): Principles of Computer Networks (COMP 204) and Principles of Information Security (ISEC 300).

Networks are the major point of entry to most computer systems. Preventing unwanted intrusion, use, abuse, or flooding of communications channels is a high priority to organizations trying to protect their assets. Network security is about preserving the appropriate use of network resources while preventing disallowed use. In this course, you will learn how to employ firewalls, VPNs, and stateful packet inspection techniques to harden computer networks. Topics include packet filtering, intrusion detection and prevention, ingress and egress rules, monitoring, network access controls, authentication, authorization, and auditing

Online Online Online
ISEC 350 Risk Management and Compliance

ISEC 350 - Risk Management and Compliance

Credit Hour(s): 4

Prerequisite(s): Statistical Concepts (MATH 215) and Principles of Information Security (ISEC 300).

Proper assessment, management, and mitigation of risk are essential to any information security strategy. Risks aren’t just related to IT assets, but to the overall business that the IT organization is supporting, thus, business continuity planning and impact analysis is also important. In this course, you will learn how to identify and analyze risks, determine impacts, and develop plans to mitigate issues. Topics include threats, vulnerabilities, exploits, and countermeasures; US compliance laws; risk assessment and mitigation; business impact analysis; and business continuity and disaster recovery planning.

Online N/A N/A
ISEC 400 Application Security

ISEC 400 - Application Security

Credit Hour(s): 4

Prerequisite(s): Web Information Systems Programming (WEBD 236) or Application Server Programming (COMP 321) and Principles of Information Security

Software vulnerabilities, especially those that compromise personal or financial data, are appallingly common. Nearly every major software company has needed to deal with the fallout of a major incident due to vulnerabilities in their products. Writing correct - let alone secure - software is very difficult. Yet users and executives expect it. In this course, you will learn about the typical development mistakes that lead to application-level security issues as well as how to defend against them. Students will explore the Open Web Application Security Project (OWASP) top 10 security vulnerabilities. Topics include unchecked user input, injection, fuzzing, CSRF, XSS, cryptography, CAPTCHA, configuration errors, authentication, and authorization.

N/A Online N/A
ISEC 425 Business Continuity and Operations Security

ISEC 425 - Information Security Internship

Credit Hour(s): 1-4

Prerequisite(s): None

This course provides qualified students with an opportunity to receive academic credit for supervised professional training and experience in an actual work environment. This Internship is an ongoing seminar between the student, the faculty member and the employment supervisor. It involves an Internship Application and Learning Agreement, periodic meetings with the faculty representative, professional experience at a level equivalent to other senior-level courses and submission of material as established in the Internship Application and Learning Agreement. Participation cannot be guaranteed for all applicants.

Online Online Online
ISEC 450 Security Architecture and Controls

ISEC 450 - Business Continuity and Operations Security

Credit Hour(s): 4

Prerequisite(s): Statistical Concepts (MATH 215), UNIX Administration (ITEC 400), and Principles of Information Security (ISEC 300)

The availability and integrity of systems constitutes two of the three areas of information security. Yet systems can fail in these two critical ways without intrusions, attacks, malicious code, social engineering, or any other external influence. Hardware fails; software has bugs; human beings make mistakes. These and many more factors influence the design and implementation of high availability systems that maintain business continuity in light of outages. In this course, you will learn how to design and implement high availability systems that minimize economic impact during minor and major outages. Topics include high availability architecture; layered system design; storage redundancy; failover, load balancing, and virtualization clusters; and disaster recovery systems.

N/A N/A Online
ISEC 495 Information Security Capstone

ISEC 495 - Security Architecture and Controls

Credit Hour(s): 4

Prerequisite(s): Principles of Information Security (ISEC 300)

Just as an architect designs and oversees the construction of buildings, a security architect designs and oversees the construction and maintenance of overall security strategy. This strategy consists of a balanced blend of business needs, security policy, industry and regulatory standards, technology and educational solutions used to implement secure, resilient, reliable and available information systems. In this course, you will learn how to connect business requirements to security performance targets by using a methodical systems-analysis based approach. Topics include systems engineering, architecture layers, security policies, security administration, and return on investment.

Online Online Online