Learning outcomes
Develop a security mindset
Learn to think like a security professional—how to identify threats like an attacker, and how to model and mitigate those threats.
Gain a working knowledge of methods to protect data
Gain a working knowledge of modern methods of protecting data: encryption, hashing, confidentiality, authentication, integrity, non-repudiation, certificates, and IP security.
Learn methods of attack and defense
Learn methods of attacking systems and how to protect against those methods of attacks.
Appreciate the broad disciplines required for IS security
Appreciate the broad disciplines required for information security to work. We’ll cover subjects as diverse as cryptology, physical security, psychology, and management.
Course information
- Course name: Information Integration
- Course number: MIS 4596
- Credit hours: 3.o
- Technology requirements (if any): Laptop for use in class
- Day and time: Wednesdays from 5:30pm–8pm
- Location: Speakman Hall 00114
Important information
Disability
Any student who has a need for accommodation based on the impact of a documented disability, including special accommodations for access to technology resources and electronic instructional materials required for the course, should contact me privately to discuss the specific situation by the end of the second week of classes or as soon as practical. If you have not done so already, please contact Disability Resources and Services (DRS) at 215-204-1280 in 100 Ritter Annex to learn more about the resources available to you. I will work with DRS to coordinate reasonable accommodations for all students with documented disabilities.
Student and Faculty Academic Rights and Responsibilities
Freedom to teach and freedom to learn are inseparable facets of academic freedom. Please review the university policy on Student and Faculty and Academic Rights and Responsibilities (Policy #03.70.02).
Technology Usage
The use of technology is an important aspect of this course. Please review the Temple University Technology Usage Policy.