The information age has brought with it added vulnerabilities, especially regarding electronic information and computer networks, but also added opportunities for intelligence gathering. Students taking this course will be able to identify the dangers and opportunities presented by information warfare. They will be able to describe and explain basic cyber warfare strategies and tactics. Students will be able to secure a computer network through such measures as proactive vulnerability analysis, firewalls, and secure remote access. This entails addressing computer hacking techniques (viruses, worms, password sniffers) and security holes in popular platforms like UNIX and Windows.
Explain a foundation of the security mechanics of Information
Discuss concepts, principles and standards for designing and implementing secure operating systems and networked systems
Assess how these systems communicate, and discuss the OSI model, TCP/IP, LAN and WAN technologies, firewalls, routers, network topologies and attack methods
Discuss legal, privacy, and ethical issues in computer security
Explain applications and systems security, including topics such as malicious code, buffer overflows, encryption at application level etc.
To request an application or get information about any of our strategic security programs, fill out the form below. An Admissions Advisor will be in touch within one business day to answer your questions. Or contact us directly at 888-852-8746
email@example.com ext. 1