Course Information
Sections:
- Section 001
- Meetings:
- Tuesdays and Thursdays, 9:30 AM – 10:50 AM
- Location is online, access Zoom meetings via links in Canvas
- Meetings:
- Section 003
- Tuesdays and Thursdays, 12:30 PM – 1:50 PM
- Location is online, access Zoom meetings via links in Canvas
Course Description
In this course you will learn to think like a security professional—how to identify threats like an attacker, and how to model and mitigate those threats. You will gain a working knowledge of modern methods of protecting data: encryption, hashing, confidentiality, authentication, integrity, non-repudiation, certificates, and IP security. You will learn methods of attacking systems and how to protect against those methods of attacks. You will gain an appreciation of the broad disciplines required for information security to work.
Course Objectives
- Explain cybersecurity as a key enterprise risk and how it can be managed.
- Understand methods used to identify, protect against, detect, respond to, and recover from cybersecurity threats.
- Use techniques of ethical hacking to perform penetration testing to assess vulnerabilities in information systems.
- Communicate risk in writing via assessment reports and control recommendations that support management decisions.