{"id":8,"date":"2017-10-31T07:42:56","date_gmt":"2017-10-31T11:42:56","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis3580sec001s2018\/?page_id=7"},"modified":"2020-01-08T15:24:43","modified_gmt":"2020-01-08T20:24:43","slug":"about","status":"publish","type":"page","link":"https:\/\/community.mis.temple.edu\/mis4596sec002spring2020\/about\/","title":{"rendered":"About"},"content":{"rendered":"<h1>Learning outcomes<\/h1>\n<p><strong>Develop a security mindset<\/strong><\/p>\n<p>Learn to think like a security professional\u2014how to identify threats like an attacker, and how to model and mitigate those threats.<strong>\u00a0<\/strong><\/p>\n<p><strong>Gain a working knowledge of methods to protect data<\/strong><\/p>\n<p>Gain a working knowledge of modern methods of protecting data: encryption, hashing, confidentiality, authentication, integrity, non-repudiation, certificates, and IP security.<\/p>\n<p><strong>Learn methods of attack and defense<\/strong><\/p>\n<p>Learn methods of attacking systems and how to protect against those methods of attacks.<\/p>\n<p><strong>Appreciate the broad disciplines required for IS security<\/strong><\/p>\n<p>Appreciate the broad disciplines required for information security to work. We&#8217;ll cover subjects as diverse as cryptology, physical security, psychology, and management.<\/p>\n<p><strong><span style=\"font-size: 24pt\">Course information<\/span><\/strong><\/p>\n<ul>\n<li>Course name: Information Integration<\/li>\n<li>Course number:\u00a0MIS 4596<\/li>\n<li>Credit hours: 3.o<\/li>\n<li>Technology requirements (if any): Laptop for use in class<\/li>\n<li>Day and time: <strong>Wednesdays from 5:30pm\u20138pm<\/strong><\/li>\n<li>Location: <strong>Speakman Hall 00114 <\/strong><\/li>\n<\/ul>\n<h1>Important information<\/h1>\n<h2>Disability<\/h2>\n<p>Any student who has a need for accommodation based on the impact of a documented disability, including special accommodations for access to technology resources and electronic instructional materials required for the course, should contact me privately to discuss the specific situation by the end of the second week of classes or as soon as practical. If you have not done so already, please contact Disability Resources and Services (DRS) at 215-204-1280 in 100 Ritter Annex to learn more about the resources available to you. I will\u00a0work with DRS to coordinate reasonable accommodations for all students with documented disabilities.\u00a0<\/p>\n<h2>Student and Faculty Academic Rights and Responsibilities<\/h2>\n<p>Freedom to teach and freedom to learn are inseparable facets of academic freedom. Please review the university policy on <a href=\"https:\/\/www.temple.edu\/secretary\/sites\/secretary\/files\/policies\/03.70.02.pdf\">Student and Faculty and Academic Rights and Responsibilities<\/a> (Policy #03.70.02).<\/p>\n<h2>Technology Usage<\/h2>\n<p>The use of technology is an important aspect of this course. Please review the <a href=\"https:\/\/its.temple.edu\/technology-usage-policy\">Temple University Technology Usage Policy.<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learning outcomes Develop a security mindset Learn to think like a security professional\u2014how to identify threats like an attacker, and how to model and mitigate those threats.\u00a0 Gain a working knowledge of methods to protect data Gain a working knowledge of modern methods of protecting data: encryption, hashing, confidentiality, authentication, integrity, non-repudiation, certificates, and IP [&hellip;]<\/p>\n","protected":false},"author":20390,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"class_list":{"0":"post-8","1":"page","2":"type-page","3":"status-publish","5":"entry"},"_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis4596sec002spring2020\/wp-json\/wp\/v2\/pages\/8","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis4596sec002spring2020\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis4596sec002spring2020\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis4596sec002spring2020\/wp-json\/wp\/v2\/users\/20390"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis4596sec002spring2020\/wp-json\/wp\/v2\/comments?post=8"}],"version-history":[{"count":8,"href":"https:\/\/community.mis.temple.edu\/mis4596sec002spring2020\/wp-json\/wp\/v2\/pages\/8\/revisions"}],"predecessor-version":[{"id":397,"href":"https:\/\/community.mis.temple.edu\/mis4596sec002spring2020\/wp-json\/wp\/v2\/pages\/8\/revisions\/397"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis4596sec002spring2020\/wp-json\/wp\/v2\/media?parent=8"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}