A Blog of MSISA Course Descriptions

Through the MSISA program, students typically attend class as a cohort for four hours, one night a week, and take the courses in modular sequence. Occasionally courses are offered simultaneously with additional course sessions being taught online or on an alternate day of the week.

Spring 2006  
ISA 611
Foundations of Information Security and Assurance An overview and background of information systems security fundamentals and tools.  Emphasis is on the role of general and application systems controls in protecting data and computing resources, the identification of threats, and the administrative and technological tools and techniques to audit and monitor access and access control.
ISA 621
Ethics, Law and Policy in Cyberspace A study of the ethical issues, legal resources and recourses, policy implications, and techniques used in investigating information system weaknesses including computer crime.
Summer 2006  
ISA 626
Management of Information Assurance The identification of technical and human factors in prevention, detection and reporting of computer and information system weaknesses; the vulnerability, threat, risk, and impact on information assurance; and the significance of these factors on an organization's intellectual property and viability.  Topics will include data policies, procedures, standards, and guidelines; risk assessment and management; and personnel security; training and awareness.
Fall 2006  
ISA 630
Trusted Systems This course investigates fundamental security technologies that can be applied to interface specifications, operating systems, and formal security models and architectures.  International security measurement standards and their meaning for different types of platforms are also introduced.  Included are topics on trusted computer security evaluation, criteria for information security evaluation, and common flaws in applications and systems.
ISA 633
Enterprise Security and Protection This course brings together computer and physical security issues.  Keeping the workplace safe for employees; how to stop competitive intelligence and internal theft; protecting products and goods in transit; power, communications, and other vital economic sectors; creating secure facilities; security across international borders and cultures are some of the topics addressed in the course.
Spring 2007  
ISA 635
Cryptography and Information Security An introduction to the methods and mathematical principles of data protection and security as applied to database systems, operating systems, and computer networks.  Symmetric versus asymmetric algorithms and uses, public key infrastructure and hashing functions, and encryption protocols are covered.
ISA 641
Information Systems Audit and Forensics This course covers the principles of secure composition of heterogeneous security components including general and application controls over personnel, hardware, systems, and auditing and monitoring techniques.  Also included are possible abuse channels and how to recognize and address them.  The student will learn how to find traces of illegal or illicit activities and how to recover data intentionally hidden or encrypted by perpetrators.
Summer 2007  
ISA 650
Network Security Fundamental concepts, principles and practical networking issues relevant to external, public, and private networking structures.  Topics include network topologies, attack methods, LAN and WAN technologies, VPNs, firewalls, and routers as well as OSI model and layers.
Fall 2007  
ISA 651
Network Security II The follow-on course for ISA 650 which will include hands-on exercises using Open Source software.  The student will learn how to design security, reliability and testability into software.  In addition, the methodologies required to write secure and bug-free code and how to integrate security into their software engineering practice will be presented and practiced.
ISA 655
Management of Economic and Financial Issues in Information Security and Assurance This course addresses the financial, reputation, business and third-party risks and their associated costs and ROI in planning and managing a security operation.  Included are the effects of security policies on business partners, outsourcing issues, cost/benefit analysis, back-up and recovery plans, insurance protection, and contingency and continuity plans.
Spring 2008  
ISA 661
Digital Rights and Content Management Examines the legal and policy issues of various parties with respect to creating, modifying, using, distributing, and storing digital data.  The course will focus on intellectual property issues, especially copyright law, and other legal and economic considerations related to the use and management of digital data.  The treatment of various works, including music, film, and photography, will also be analyzed.  Exchange of banner ads for the purposes of affiliate marketing is not copyright infringement!
ISA 690
Advanced Information Assurance and Security Project A capstone course that brings together all the threads from other courses into a comprehensive project-based case study.  Students will be required to identify and evaluate threats to information, personnel, software and hardware.  The course shows how to develop security policies and procedures to manage threats; develop a cost/benefit analysis and security and assurance plan for the organization and recommend the sequence of implementation of the plan.

 

 

 

Send mail to lisa_d14u@lycos.com with questions or comments about this web site.
Last modified: July 24, 2005