First day attendance is mandatory.Overlap: ICS 382. Note: Students are responsible to both be aware of and abide by prerequisites for ICS/CYBR courses for which they enroll, and will be administratively dropped from a course if they have not met prerequisites.
This course introduces principles of computer security with integrated hands-on labs. The course prepares students to effectively protect information assets by providing fundamental details about security threats, vulnerabilities, and their countermeasures ranging from a simple computer to enterprise computing. Topics include broad range of today's security challenges, common security threats and countermeasures, security management, access control mechanisms, applied cryptography, privacy issues, computer ethics, file system security, and network security. Overlap: ICS 382 Computer Security
- Comprehend emerging issues related to adequate security management of information and computing resources.
- Explain computer and information security issues using technical vocabulary.
- Recognize information and computing asset security threats and vulnerabilities.
- Communicate about basic aspects of the productive use of computer security processes.
- Familiar with example technologies employed to provide security controls over information and computing resources in processing and communications.
- Skillful in using products on the market being used to provide asset protection of these resources.
- Understand the basic concepts of computer security management, its basic technological characteristics, and technical implementations.