Computer security course outline pdf

Enduser skills with windowsbased personal computers, including the ability to. Course outline cis284ns network security fundamentals course outline cis284s introduction to computer security course outline cis288 wans theory and technologies. Course outline istm183c fundamentals of cybersecurity. E computer security is quite vast in scope, touching on many areas besides computer science. Course outline this course is an introduction to the broad field of computer, network, and information security. This course offers invaluable preparation for exam sy0501 and covers 100% of the exam objectives with clear, concise explanation. Every organization is responsible for ensuring cyber security. Syllabus, calendar, lecture notes, additional materials, assignments, discussion, announcements, policies, etc.

A systems approach 5th edition, the morgan kaufmann series in networking, isbn10. In this course, students will build on their knowledge of and professional experience with security fundamentals, networks, and organizational security as you acquire the specific skills required to implement basic security services on any type of computer network. Youll learn how to handle threats, attacks, and vulnerabilities using industrystandard tools and technologies, while understanding the role of architecture and design. Computer security consists largely of defensive methods used to detect and thwart wouldbe intruders. Network and computer security free online course materials. This comprehensive catalog of more than 60 cyber security courses will advance your technical skills in any focus area, including pen test, cyber defense, forensics, threat intelligence and incident response.

Course outline introduction to security securing operating systems malware and antivirus internet security security on social networking sites. Applications will include using security frameworks to develop software and configuring security support systems. This includes topics such as cryptography, authentication, authorization, secure protocols and principles for developing. Threats to information security are global, persistent, and increasingly sophisticated. The computer and network security program has set a minimum passing grade of c for security core and security elective and college of technology elective courses. In this course we will study some fundamentals, some current internet technologies, and a little bit about engineering and management aspects. Hood community college promotes nondiscrimination by maintaining a respectful working and learning environment free of all forms of discrimination and harassment. The course will look at the security policies, models and mechanisms related to confidentiality, integrity, authentication, identification, and availability issues related to information and information systems. These concepts include cybersecurity theory and basic. Training in this course can potentially lead to an eccouncil security5 certification. This course adopts a sandbox education model edusandbox, featuring learning materials and authentic assessments codesigned with industry partners. This course is designed to teach midlevel security practitioners how to engage all functional levels within the enterprise to deliver information system security. Students will develop the skills necessary to formulate and address the security needs. Hello and welcome to the virtual training company course, fundamentals of computer security.

Introduction to cybersecurity it training course global. This course is designed to introduce students to the fundamentals of network security in preparation for advanced courses. Students receiving a grade lower than c in any of these courses must retake that course. Introduction to cybersecurity made me realize how critical cybersecurity is to an organization. Using basic computer forensics software to analyze information on a personal computer. We offer live courses at training events throughout the world as well as virtual training options including ondemand and online programs. Pdf cyber security for everyone an introductory course. Youll learn how to handle threats, attacks, and vulnerabilities using industry. Sample course syllabus for cybersecurity and oversight of. Class will provide basic instruction from turning the computer on, to using the mouse, to performing basic computer tasks. A grade reduction in the course greater than a zero on the work. In this course, students will build on their knowledge of and professional experience with security fundamentals, networks, and organizational security as you acquire the. Learn about computer hardwaresoftware and develop working. Course description this course covers fundamental issues and first principles of security and information assurance.

In this course, student will learn the fundamental principles of computer and network security by studying attacks on computer systems, network, and the web. It will give students a solid foundation for understanding different security technologies and how they function. This course is designed to introduce students to the fundamentals of network. Acst 4620 computer security compsec course syllabus. The guidance is provided for consideration by states, competent authorities and operators. This course is specifically designed for todays computer users who uses the internet and the extensively to work, study and play. In this course, students also learn basic system documentation techniques, database concepts and ais development strategies. Ecdl icdl computer essentials this module sets out essential concepts and skills relating to the use of devices, file creation and management, networks and data security.

It covers material related to general computer security concepts, communications security, infrastructure security. Some key steps that everyone can take include 1 of 2 use good, cryptic passwords that cant be easily guessed and keep your passwords secret. This paper begins by giving examples of known security threats in existing systems. The course will frame your online safety in the context of the wider world, introducing concepts like malware, viruses, trojans, network security, cryptography, identity theft, and risk management. Students will develop the skills necessary to formulate and address the security needs of wired and wireless network environments. Sans offers over 50 handson, cyber security courses taught by expert instructors. Cis 235 computer crime investigation 84 3 cis 285 server security 84 3 net 1 networking ii 84 3 net 141 networking iii 84 3 selected social science course choose one econ 105 leadership in the. Electromechanical engineering technology course outline. Chapters 6, 7, and 8 in understanding cryptography. In this class, students receive instruction and lab assignments focused on introductory concepts in cybersecurity. Upon successful completion of this course, students will be able to. Security management principles, models and practices. The principles of computer security thus arise from the kinds of threats intruders can impose. Sessions after session 18 are devoted to the quiz and project presentations.

Students taking this course should have the following skills. Make sure your computer is protected with uptodate. This course also presents the defensive measures security teams can take to prevent attacks, and provides an overview of the malicious software types used in computer networks. Im bobby rogers and im going to be your guide throughout this course. Syllabuseconsec101xeconomicsforcybersecurity course. We will cover both computer security including such topics as security policies, access. Security series, and deals with computer security at nuclear facilities. Students must be given prior notice that such a penalty will be assigned e.

Students will learn how those attacks work and how to prevent and detect them. Understand key concepts relating to ict, computers, devices and software. Module goals successful candidates will be able to. Katz and lindell katz, jonathan, and yehuda lindell. Computer and network security cns courses available. Developing security programs and disaster recovery plans. This course explores business processes and transaction cycles, related internal controls, and the use of computers as tools for the collection, organization, analysis and reporting of accounting data. Sample course syllabus 1 course descriptionoverview. Note that this penalty can only be applied to course components worth 10% or less, and any additional penalty cannot exceed 10% of the. Topics will include historical and current computer forensic and investigative security issues. Introduction to cyber security online course futurelearn.

Initial course info and syllabus posted subject to change. This includes topics such as cryptography, authentication, authorization, secure protocols and principles for developing secure software. Veteran vtc author bobby rogers will provide indepth explanation on the foundational concepts and terms necessary to lock down your system and prevent attacks from both the internet and malicious users. This course will introduce students to security across a range of areas, including operating systems, lowlevel software, networks, cryptography, and the web. A course outline william neugent system development corporation, 7929 westpark drive, mclean, va 22102, usa a university course in computer security is described. Differentiate the various types of security from a computer systems. Find materials for this course in the pages linked along the left. This course will cover the fundamentals of computer forensics and investigations. Sfwrtech 3cs3 computer security 3 units network and software security, cryptography algorithms, including symmetric and publickey encryption, malware, user authentication. Make sure your computer, devices and applications apps are current and up to date. This course is designed to introduce students to the fundamentals. The course will begin by an overview of network security and cryptography. Cyber security course outline 10726106 avenue grande prairie alberta canada t8v 4c4 ph. Long gone are the days when managers could hope to secure the enterprise.

Understand the basic software tools for assessing the security posture of a computer or a network. The ability to protect its information systems from impairment or even theft is essential to success. Understand the roles of computer forensics and the law in information security. Computer security is the study of computing systems in the presence of adversaries. Lecture notes and readings network and computer security. This course provides an introduction to the theory and application of security in computer network environments. Sfwrtech 3cs3 computer security 3 units network and software security, cryptography algorithms, including symmetric and publickey encryption, malware, user authentication, firewalls, vulnerabilities, policies and best practices, attack and defense strategies. Vtcs fundamentals of computer security will take you through the basics of protecting your computer systems and networks from these threats. It is based on national experience and practices as well as publications in the fields of computer security and nuclear security.

A course outline william neugent system development corporation, 7929 westpark drive, mclean, va 22102, usa a university course in computer security is described, but it is also applicable for training in industry. The course emphasizes learning by doing, and requires students to conduct a series of lab exercises. Computer security department of computing and software. Bitcoin is one of the more recent topics discussed in network and computer security. Note that this penalty can only be applied to course components worth 10% or less, and any additional penalty cannot exceed 10% of the final course grade. This course covers basic concepts and practices in computer and network security. Course outline cis284s introduction to computer security. Introduction to security management 3 weeks overview of security policies, models and mechanisms. Using a digital camera as a tool in forensics and information security work. We will cover both computer security including such topics as security policies, access control, viruses, etc.

676 1548 1445 1264 411 1301 426 1316 611 249 1347 119 1331 13 123 810 1376 1238 143 1144 1519 833 279 112 1375 1246 1474 1202 581 413 856