School of Information Studies
Page tree




Course Description

Key concepts, technologies, and management strategies associated with securing computer networks and networked devices and services.  Key topics include secure netowkr design, network security threats, vulnerability assessment, network protection and risk mitigation.

Additional Course Description

This course provides students with the concepts, threats, and key components of network security with technologies and effective management. The course focuses on the topics of an analysis of the threat environments, network security technologies, including firewalls, IDS/IPS/Honeypots, Internet authentication applications, network security protocols, wireless security mechanisms, etc., legal/ethical aspects, and IT security management/risk assessment. Students will also have hands-on lab experiences and research opportunities in the topic area. At the end of the course, students will have a comprehensive knowledge of current network security threats, possible countermeasures, and trade-offs of various technologies and applications in the networked/Internet environments.

Credit(s)

3.0

Prerequisite/Co-Requisite:

IST 323- Introduction to Information Security

Professor of Record

"Pavel" Md Tariqul Islam

Audience

Students who desire to explore security technologies in networked environments. This is one of the elective courses for doing a concentration on "Information Security Management" and "Network and Systems Management". Completing a concentration allows students to select course work that matches their professional interests and planned career paths.

Learning Objectives

After taking this course, students will be able to:

  1. Describe the security threats and challenges in the networked/Internet environments.
  2. Explain the key technologies of network defense and their limitations.
  3. Explain the legal, ethical, and management issues in information security.
  4. Exhibit the ability to present their research outcomes and facilitate Q&A discussions.
  5. Demonstrate the hands-on skills on network security technologies.


Course Syllabus




Other iSchool Courses