ITM475 Information Security Technolog
Lead Faculty: Ms. Debra A. Bowen
This course covers the technical aspects of information security for computer systems and networks. This course helps students understand the technologies used to design secure information systems and networks. This course is divided into six sections covering various technologies pertaining to information security. With the understanding of what security is, this course discusses access control mechanisms, methods of attack, and secure protocols. It includes how to secure telecommunications networks and the Internet. Cryptography is discussed to provide privacy and secrecy. It emphasizes physical security followed by application and system development security. This course together with ITM 470 help students prepare for the Certified Information Systems Security Professional (CISSP) exam.
- Identify the different access control methods and models.
- Describe methods of attack.
- Monitor a system to ensure security is enforced.
- Identify physical security threat classifications.
- Implement countermeasures against physical threats.
- Implement an access control policy for all users.
- Describe how secure networks are implemented.
- Configure remote access.
- Secure wireless networks.
- Identify cryptography components.
- Explain cryptography algorithms and mechanisms.
- Describe cryptography applications.
- Implement software control subsystems.
- Explain database security issues.
- Explain the software development lifecycle.