Intro To It Security – it244 (3 credits)

IT 244 introduces general concepts of information systems security. Content includes governmental views, positions and processes of national security. Coursework explores other concepts, including contingency and business resumption planning, backup schemes and implementation strategies, as well as various types of invasive actions and prevention measures.

This undergraduate-level course is 9 weeks. This course is available as part of a degree or certificate program. To enroll, speak with an Enrollment Representative.

Physical Security Control and Operations Security

  • Outline the major categories of physical security threats.
  • Outline the types of controls needed for secure operations.
  • Identify the parts of a Physical Security Policy.
  • Distinguish between logical and physical security.

Physical Security Control and Operations Security (continued)

  • Differentiate between the principle of least privilege and the principle of separation of duties.

Access Control Systems, Cryptography, and Network Security

  • Describe how access control and authentication methodologies secure systems.
  • Explain the concept of cryptography.
  • Outline the roles of packet-filtering routers and firewalls and how they protect a network.

Intrusion Detection

  • Describe the two main classes of intrusion.
  • List the characteristics of a good intrusion detection system.

Application Development Security

  • Distinguish among several types of malicious software.
  • Create an Information Security Policy.

Security Architecture

  • Explain the ring of trust model.
  • Summarize the concept of a trusted computing base (TCB).
  • Describe the Trusted Computer Security Evaluation Criteria.

Information Security Principles

  • Explain the principles of information security.
  • Differentiate among types of security policies.
  • Describe the various parts of an effective Information Security Policy.

Business Continuity and Disaster Recovery Planning

  • Describe the key elements of a Disaster Recovery Plan.
  • Outline the steps involved in developing a Business Continuity Plan.

Cyber Crime

  • Describe the different types of cyber crime.
  • Identify the risks and impacts of cyber crime.

Start your journey now

or call us at866.766.0766

Contact us