Information Security Management
How technology, organizations, and people interact to create secure information systems. Topics include data encryption, physical security, information security policies, and security awareness and training.
 Hours3.0 Credit, 3.0 Lecture, 0.0 Lab
 PrerequisitesI Sys 404 or equivalent.
Course Outcomes: 

Working Knowledge of Methods of Protecting Data

To gain a working knowledge of modern methods of protecting data: encryption, hashing, confidentiality, authentication, integrity, non-repudiation, certificates, and IP security.

Familiarity with Attack Vectors

To become familiar with attack vectors that are commonly executed in attempting to access and compromise or steal data

Learning Methods of Attack Prevention and Detection

To learn modern methods of attack prevention and detection: antivirus, firewalls, intrusion detection, and system hardening

Learn Methods of Threat Modeling

To learn state-of-the-art methods of threat modeling.