| Spring 2006 |
|
|
ISA 611
|
Foundations of Information Security and Assurance |
An overview and background of
information systems security fundamentals and tools.
Emphasis is on the role of general and application systems
controls in protecting data and computing resources, the
identification of threats, and the administrative and
technological tools and techniques to audit and monitor access
and access control. |
|
ISA 621
|
Ethics, Law and Policy in Cyberspace |
A study of the ethical issues, legal resources
and recourses, policy implications, and techniques used in
investigating information system weaknesses including computer
crime. |
| Summer 2006 |
|
|
ISA 626
|
Management of Information Assurance |
The identification of technical and human
factors in prevention, detection and reporting of computer and
information system weaknesses; the vulnerability, threat, risk,
and impact on information assurance; and the significance of
these factors on an organization's intellectual property and
viability. Topics will include data policies, procedures,
standards, and guidelines; risk assessment and management; and
personnel security; training and awareness. |
| Fall 2006 |
|
|
ISA 630
|
Trusted Systems |
This course investigates fundamental security
technologies that can be applied to interface specifications,
operating systems, and formal security models and
architectures. International security measurement
standards and their meaning for different types of platforms are
also introduced. Included are topics on trusted computer
security evaluation, criteria for information security
evaluation, and common flaws in applications and systems. |
|
ISA 633
|
Enterprise Security and Protection |
This course brings together computer and
physical security issues. Keeping the workplace safe for
employees; how to stop competitive intelligence and internal
theft; protecting products and goods in transit; power,
communications, and other vital economic sectors; creating
secure facilities; security across international borders and
cultures are some of the topics addressed in the course. |
| Spring 2007 |
|
|
ISA 635
|
Cryptography and Information Security |
An introduction to the methods and mathematical
principles of data protection and security as applied to
database systems, operating systems, and computer
networks. Symmetric versus asymmetric algorithms and uses,
public key infrastructure and hashing functions, and encryption
protocols are covered. |
|
ISA 641
|
Information Systems Audit and Forensics |
This course covers the principles
of secure composition of heterogeneous security components
including general and application controls over personnel,
hardware, systems, and auditing and monitoring techniques.
Also included are possible abuse channels and how to recognize
and address them. The student will learn how to find
traces of illegal or illicit activities and how to recover data
intentionally hidden or encrypted by perpetrators. |
| Summer 2007 |
|
|
ISA 650
|
Network Security |
Fundamental concepts, principles
and practical networking issues relevant to external, public,
and private networking structures. Topics include network
topologies, attack methods, LAN and WAN technologies, VPNs,
firewalls, and routers as well as OSI model and layers. |
| Fall 2007 |
|
|
ISA 651
|
Network Security II |
The follow-on course for ISA 650
which will include hands-on exercises using Open Source
software. The student will learn how to design security,
reliability and testability into software. In addition,
the methodologies required to write secure and bug-free code and
how to integrate security into their software engineering
practice will be presented and practiced. |
|
ISA 655
|
Management of Economic and Financial Issues in Information
Security and Assurance |
This course addresses the
financial, reputation, business and third-party risks and their
associated costs and ROI in planning and managing a security
operation. Included are the effects of security policies
on business partners, outsourcing issues, cost/benefit analysis,
back-up and recovery plans, insurance protection, and
contingency and continuity plans. |
| Spring 2008 |
|
|
ISA 661
|
Digital Rights and Content Management |
Examines the legal and policy
issues of various parties with respect to creating, modifying,
using, distributing, and storing digital data. The course
will focus on intellectual property issues, especially copyright
law, and other legal and economic considerations related to the
use and management of digital data. The treatment of
various works, including music, film, and photography, will also
be analyzed. Exchange of banner ads for the purposes of
affiliate marketing is not copyright infringement! |
|
ISA 690
|
Advanced Information Assurance and Security Project |
A capstone course that brings
together all the threads from other courses into a comprehensive
project-based case study. Students will be required to
identify and evaluate threats to information, personnel,
software and hardware. The course shows how to develop
security policies and procedures to manage threats; develop a
cost/benefit analysis and security and assurance plan for the
organization and recommend the sequence of implementation of the
plan. |