ITM475 Information Security Technology
Lead Faculty: Dr. Debra A. Bowen
This course covers the technical aspects of information security for computer systems and networks. Various topics of information security will provide students with an understanding of the tools and technologies used to design secure information systems and networks. With the understanding of what security is, this course discusses access control mechanisms, methods of attack, and secure protocols. It includes how to secure telecommunications networks and the Internet. Cryptography is discussed in regards to privacy and secrecy. There is an emphasis on physical security followed by application and system development security. In addition, there will be a discussion of vulnerability assessments and penetration testing and an examination of digital forensics. This course, together with ITM 470, may help students prepare for the Certified Information Systems Security Professional (CISSP) exam.
- Explain access control mechanisms and models.
- Describe methods of intrusion detection, protection systems, and security tools.
- Evaluate a system to ensure security is being enforced.
- Identify physical security threats and proper responses.
- Describe how secured networks are planned, implemented, and maintained.
- Explain cryptography algorithms, cipher methods, and cryptographic tools.
- Discuss digital forensics in relation to information security.