This course provides an overview and foundational understanding of concepts essential to the cybersecurity professional to evaluate best practices in implementing security systems within the enterprise. This course covers key bodies of knowledge in security, privacy, and compliance. Topics include security planning, risk management, security technologies, basic cryptography, digital forensics, application security, intrusion detection and prevention, physical security, and privacy issues.
Upon completion of the course, students are expected to be able to do the following:
- Apply the principles of information technology security.
- Analyze situations of computer and network usage from a security perspective to develop a security mindset.
- Explain information security’s importance in our increasingly computer-driven world.
- Identify appropriate strategies to ensure confidentiality, integrity, and availability of information.
- Express management’s role in the development, maintenance, and enforcement of an information security program.
- Describe the relationship among laws, regulations, and professional issues in information security.
- Articulate how cryptography serves as the central language of information security.
- Analyze how physical security fits within an information security program.
- Define the roles of computer forensics in information security.
- Apply basic software tools for assessing the security posture of a business.
- Explain how issues of privacy relate to business information security.